LFISuite icon indicating copy to clipboard operation
LFISuite copied to clipboard

Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner

Results 28 LFISuite issues
Sort by recently updated
recently updated
newest added

Hello! Is your tool able to scan via POST requests? I cannot find a workable tool that can perform LFI scanning via POST. It will be cool if you implement...

I found the pathtotest files (both of them) were missing the[ FreeBSD Apache default log location](https://unix.stackexchange.com/questions/38978/where-are-apache-file-access-logs-stored); `/var/log/httpd-access.log` I recommend adding this, as it can be a crucial when attempting/discovering potential...

Also some error occured . ``` .:: phpinfo Injection ::. [*] Enter the website without path (ex: 'http://justsitename') -> http://172.16.0.16:8888 [*] Enter the vulnerable LFI path (ex: '/lfi.php?file=../..') -> /vulnerabilities/fi/?page=...

url = "%sphp://input%%00" %(inputurl)

I found an LFI that didn't require a parameter in the URL to be exploited. basically, it looked like this: `http://www.example.com//etc/passwd` Is it possible to add a feature where this...

Hi there, This code nomore works in python2 Version, and with Python3 too. I'll Update the codes,so that it will run with python3

Traceback (most recent call last): File "lfisuite.py", line 68, in from termcolor import colored File "/usr/lib/python2.7/dist-packages/termcolor.py", line 35 def __getattr__(name: str) -> list[str]: ^ SyntaxError: invalid syntax