Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/codexlynx/nayra

LFI Exploitation Tool
https://github.com/codexlynx/nayra

hacking lfi-exploitation msfvenom red-team web-security webshell

Last synced: 7 days ago
JSON representation

LFI Exploitation Tool

Awesome Lists containing this project

README

        

## Nayra - LFI Exploitation Tool
--------

![python](https://img.shields.io/badge/python-2.7-green.svg?style=flat)

This is a small tool to exploit a LFI (Local File Inclusion) web vulnerability.
The tool provide a functional shell prompt. In the future, I will add some very useful extra options.

### Disclaimer

* __Legal__:
This tool is designed only for __educational__ purposes and __ethical__ hacking. Use it at your own responsibility. Damages or legal problems caused by the tool are the responsibility of the user.

* __License__:
This tool is subject under the following license:

>Creative Commons Attribution-ShareAlike 3.0

![](https://licensebuttons.net/l/by-sa/3.0/88x31.png "Creative Commons")

More Info: [Here](https://creativecommons.org/licenses/by-sa/3.0/ "Legal Description")

### Usage
* __Required Parameters__:

```
-t, --type Specifies the type of action
-u, --url URL vulnerable to LFI (Local File Inclusion)
```

* __List of types__:

```
shell Exploit the vulnerability to get a shell
upload Upload a file to remote server
msfvenom Upload payload generated by msfvenom
```

* __Optional Parameters__:

```
-m, --method (=GET) It can be -> [GET|POST]
-n, --name (=php_1) Used to specify the corresponding attack
payload in "data.json"

-f, --file File to upload (Only "upload" or "msfvenom" types)
-a, --argvs Secondary parameters (Only "msfvenom" type)

-c, --cookies Session cookies
-x, --proxy Using a proxy -> [http://user:passwd@host:port]
-p, --path When it is necessary to make a directory traversal
-b, --null-byte Add Poison Null Byte (%00)
```

* __Other Parameters__:

```
-h, --help Display this message
```

### Demo

![nayra](https://cloud.githubusercontent.com/assets/12601189/8551306/a78ded2c-24cd-11e5-8493-a71824533352.gif)

### About
This tool was created by: __@codexlynx__.

* Twitter: [https://twitter.com/codexlynx](https://twitter.com/codexlynx)
* GitHub: [https://github.com/codexlynx](https://github.com/codexlynx)

----------------
About the tool name:

__In Spanish:__ [https://es.wikipedia.org/wiki/Nayra](https://es.wikipedia.org/wiki/Nayra)