Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/jsmoreira02/lfi-hunter
Automated tool to bypass filtering systems and exploit Local File Inclusion, created for Bug Bounty tests and better optimization during the hack (and with special attention to CTFs)
https://github.com/jsmoreira02/lfi-hunter
bugbounty ctf-tools cybersecurity hacking-tool lfi-exploitation
Last synced: about 10 hours ago
JSON representation
Automated tool to bypass filtering systems and exploit Local File Inclusion, created for Bug Bounty tests and better optimization during the hack (and with special attention to CTFs)
- Host: GitHub
- URL: https://github.com/jsmoreira02/lfi-hunter
- Owner: Jsmoreira02
- License: gpl-2.0
- Created: 2024-03-16T12:51:38.000Z (8 months ago)
- Default Branch: main
- Last Pushed: 2024-04-02T04:14:20.000Z (8 months ago)
- Last Synced: 2024-04-02T05:24:36.942Z (8 months ago)
- Topics: bugbounty, ctf-tools, cybersecurity, hacking-tool, lfi-exploitation
- Language: Python
- Homepage:
- Size: 14.6 KB
- Stars: 0
- Watchers: 2
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Hunt for LFI (Local File Inclusion)
Simple Automated brute force attack tool for exploiting local file inclusion, using GET requests (with special attention to CTFs and bug bounty). Designed to optimize time spent searching for injections that bypass site security and filtering.-------
# Local File Inclusion:
``The File Inclusion vulnerability allows an attacker to include a file, usually exploiting a “dynamic file inclusion” mechanisms implemented in the target application. The vulnerability occurs due to the use of user-supplied input without proper validation. This can lead to something as outputting the contents of the file``- The script will use all the most commonly used techniques to bypass a filtering system or protections on the potentially vulnerable target and will show all successful payloads. If you know of an additional more effective technique, feel free to modify the code or add other payloads.
![video](https://github.com/Jsmoreira02/LFI-Hunter/assets/103542430/4df2df13-d3a9-4421-a755-36f40370d21a)
## Optionals:
`-o/--output` --> Prints the results of the exploit
`-s/--saveToFile` --> Save the results to a file
# Warning:
> I am not responsible for any illegal use or damage caused by this tool. It was written for fun, not evil and is intended to raise awareness about cybersecurity