LFISuite
LFISuite copied to clipboard
Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner
File "lfisuite.py", line 27 print "[!] pipper not found in the current directory.. Downloading pipper.." ^ SyntaxError: Missing parentheses in call to 'print'. Did you mean print("[!] pipper not found...
Can we make this tool take multiple urls at a time and aso suport post method switching and scan paths wothout parameters like for example example.com/archive/../../../../../etc/passwd like some lfi vulns...
Traceback (most recent call last): File "lfisuite.py", line 1881, in run_autoHack() File "lfisuite.py", line 1765, in run_autoHack run_data() File "lfisuite.py", line 1374, in run_data content = send_data_cmd_default(cmd,odataurl,i) File "lfisuite.py", line...
just updated documentation
[*] Installing module 'termcolor' DEPRECATION: Python 2.7 will reach the end of its life on January 1st, 2020. Please upgrade your Python as Python 2.7 won't be maintained after that...
I encountered the following error when attempting to run the script against a website with a self-signed or expired certificate (redacted the host ip) : ``` Traceback (most recent call...
Would be useful if you could specify what OS your attacking
hi, has the output to a file feature been implemented? If so , how can you do this? thanks
hello, it looks like it does not crawl website?
Hello, I noticed that during exploitation that there is no option to use the reverse shell instead of bind shell initially. This has been causing a problem since in this...