LFISuite icon indicating copy to clipboard operation
LFISuite copied to clipboard

Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner

Results 28 LFISuite issues
Sort by recently updated
recently updated
newest added

File "lfisuite.py", line 27 print "[!] pipper not found in the current directory.. Downloading pipper.." ^ SyntaxError: Missing parentheses in call to 'print'. Did you mean print("[!] pipper not found...

Can we make this tool take multiple urls at a time and aso suport post method switching and scan paths wothout parameters like for example example.com/archive/../../../../../etc/passwd like some lfi vulns...

Traceback (most recent call last): File "lfisuite.py", line 1881, in run_autoHack() File "lfisuite.py", line 1765, in run_autoHack run_data() File "lfisuite.py", line 1374, in run_data content = send_data_cmd_default(cmd,odataurl,i) File "lfisuite.py", line...

just updated documentation

[*] Installing module 'termcolor' DEPRECATION: Python 2.7 will reach the end of its life on January 1st, 2020. Please upgrade your Python as Python 2.7 won't be maintained after that...

I encountered the following error when attempting to run the script against a website with a self-signed or expired certificate (redacted the host ip) : ``` Traceback (most recent call...

Would be useful if you could specify what OS your attacking

hi, has the output to a file feature been implemented? If so , how can you do this? thanks

hello, it looks like it does not crawl website?

Hello, I noticed that during exploitation that there is no option to use the reverse shell instead of bind shell initially. This has been causing a problem since in this...