Cyber security

Hunt For LFI (Local File Inclusion) – Automating The Discovery Of Security Vulnerabilities

In the vast expanse of cybersecurity, the Hunt for LFI (Local File Inclusion) stands out as a pivotal tool for ethical hackers and security enthusiasts.

This automated brute force attack tool is specially designed for exploiting local file inclusion vulnerabilities, primarily through GET requests.

Tailored for both Capture The Flag (CTF) competitions and bug bounty hunting, it significantly reduces the time spent searching for exploitable injections that can bypass sophisticated site security and filtering systems.

The tool embodies a proactive approach to identifying and mitigating vulnerabilities, ensuring the digital fortification of web applications.

Simple Automated brute force attack tool for exploiting local file inclusion, using GET requests (with special attention to CTFs and bug bounty).

Designed to optimize time spent searching for injections that bypass site security and filtering.

Local File Inclusion:

The File Inclusion vulnerability allows an attacker to include a file, usually exploiting a “dynamic file inclusion” mechanisms implemented in the target application. The vulnerability occurs due to the use of user-supplied input without proper validation. This can lead to something as outputting the contents of the file

  • The script will use all the most commonly used techniques to bypass a filtering system or protections on the potentially vulnerable target and will show all successful payloads.
  • If you know of an additional more effective technique, feel free to modify the code or add other payloads.

Tamil S

Tamil has a great interest in the fields of Cyber Security, OSINT, and CTF projects. Currently, he is deeply involved in researching and publishing various security tools with Kali Linux Tutorials, which is quite fascinating.

Recent Posts

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

2 weeks ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

3 weeks ago

Red Team Certification – A Comprehensive Guide To Advancing In Cybersecurity Operations

Embark on the journey of becoming a certified Red Team professional with our definitive guide.…

3 weeks ago

CVE-2024-5836 / CVE-2024-6778 : Chromium Sandbox Escape via Extension Exploits

This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…

4 weeks ago

Rust BOFs – Unlocking New Potentials In Cobalt Strike

This took me like 4 days (+2 days for an update), but I got it…

4 weeks ago

MaLDAPtive – Pioneering LDAP SearchFilter Parsing And Security Framework

MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…

4 weeks ago