LFISuite
LFISuite copied to clipboard
Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner
Hello! Is your tool able to scan via POST requests? I cannot find a workable tool that can perform LFI scanning via POST. It will be cool if you implement...
I found the pathtotest files (both of them) were missing the[ FreeBSD Apache default log location](https://unix.stackexchange.com/questions/38978/where-are-apache-file-access-logs-stored); `/var/log/httpd-access.log` I recommend adding this, as it can be a crucial when attempting/discovering potential...
Also some error occured . ``` .:: phpinfo Injection ::. [*] Enter the website without path (ex: 'http://justsitename') -> http://172.16.0.16:8888 [*] Enter the vulnerable LFI path (ex: '/lfi.php?file=../..') -> /vulnerabilities/fi/?page=...
url = "%sphp://input%%00" %(inputurl)
I found an LFI that didn't require a parameter in the URL to be exploited. basically, it looked like this: `http://www.example.com//etc/passwd` Is it possible to add a feature where this...
Hi there, This code nomore works in python2 Version, and with Python3 too. I'll Update the codes,so that it will run with python3
Traceback (most recent call last): File "lfisuite.py", line 68, in from termcolor import colored File "/usr/lib/python2.7/dist-packages/termcolor.py", line 35 def __getattr__(name: str) -> list[str]: ^ SyntaxError: invalid syntax