A Powerful Local File Inclusion (LFI) Exploitation Tool
Project description
LFIMap - Advanced Local File Inclusion Exploitation Framework
Advanced Local File Inclusion Exploitation Framework
The most comprehensive Local File Inclusion exploitation framework with 18+ attack techniques, 30+ bypass plugins, and advanced post-exploitation capabilities.
Features • Installation • Quick Start • Documentation • Contributing
🚀 Features
🎯 18+ Exploitation Techniques
- Basic LFI - Directory traversal and file enumeration
- PHP Filter - Source code disclosure via
php://filterwith multiple encodings - Log Poisoning - Code injection through web server logs
- Session Poisoning - PHP session file manipulation with ID bruteforcing
- Proc/Self/Environ - Unix environment variable exploitation
- Data URI - Code execution via
data://scheme - Timing-Based Blind LFI - Statistical analysis for blind vulnerabilities
- Advanced Wrappers -
expect://,file://,phar://,zip://,glob://,ftp://,gopher:// - Race Condition LFI - Temporary file exploitation
- Proc Symlink -
/proc/self/fd/Xandcwdsymlink attacks - Remote File Inclusion - External file inclusion capabilities
- PHP Input Wrapper - POST data inclusion attacks
🛡️ 30+ Bypass Plugins
🔓 WAF & Filter Evasion
403- 12+ HTTP 403 bypass techniqueswaf-detection- Identifies Cloudflare, Sucuri, ModSecurity, etc.unicodetrick- Overlong UTF-8 encoding bypassesmulti-encoding- Double/triple URL encodingpath-normalization- Directory traversal variationscase-variation- Case-sensitive filter bypassxforwardedfor- X-Forwarded-For header spoofingspoofhost-header- Host header manipulation
🎭 Advanced Obfuscation
questionmark- Query parameter injectionextra-dot- Dot notation bypassessemicolon-injection- Semicolon-based evasiondoubleslash2slash- Path normalization trickstab-trick- Tab character injectioncomment-trick- Comment-based bypassesdotdot-trick- Enhanced directory traversalfat-dot- Unicode dot variationsutf7-bypass- UTF-7 encoding evasionbase64-in-path- Base64 path encodingiis-double-slash- IIS-specific bypassesclrf-injection- CRLF injection techniques
🔍 Detection & Exploitation
lfi-error-fingerprint- Error message analysismimetype-check- MIME type validation bypasswrapper-data- Data wrapper exploitationsession-id-bruteforce- Automated session enumerationexfil-data- Data exfiltration assistancerace-condition-lfi- Race condition exploitationrate-limit-adapter- Rate limiting evasion
🎛️ Advanced Capabilities
- Interactive Wizard - Beginner-friendly guided setup
- Parameter Fuzzing - Automatic vulnerable parameter discovery
- Multi-Target Support - Batch scanning from file input
- Post-Exploitation Shell - Interactive command execution
- Professional Output - Rich console with structured logging
- Enterprise Authentication - Basic, NTLM with domain support
- Proxy Integration - Burp Suite, OWASP ZAP compatibility
⚡ Installation
🔧 Quick Install
git clone https://gitlab.com/relunsec/lfimap.git
cd lfimap
pip install -r requirements.txt
cd lfimap
Manual install (if needed):
pip install requests rich requests-ntlm
Dependency check:
cd lfimap
python3 cli.py --check-depends
python cli.py --list-depends
Precompiled Bin (Linux only):
git clone https://github.com/relunsec/lfimap.git
cd lfimap
cd dist
sudo make install
Docs (Linux only):
cd docs
sudo make make-docs
🔧 Usage Examples
# Basic LFI Scan
python lfimap.py -u "http://example.com/vuln.php?file=FUZZ" --method basic
# PHP filter to read config.php
python lfimap.py -u "http://example.com/?file=FUZZ" --method php-filter --php-filter-file config.php
# Poison access log & get shell
python lfimap.py -u "http://example.com/?page=FUZZ" --method log-poisoning \
--injection-string "<?php system($_GET['cmd']); ?>" --cmd-param cmd
# Parameter fuzzing with plugins
python lfimap.py -u "http://example.com/index.php" --fuzz-param --plugin 403,unicodetrick
# All methods minus blind/time-based
python lfimap.py -u "http://target.com/index.php?f=FUZZ" --method all -eT timing-based
🪜 Contributing
Your contributions are welcome!
- New plugins, methods, bypasses
- Bug fixes or improvements
- Submit pull requests and open issues
⚠️ Legal & Ethical Disclaimer
This tool is intended for authorized security testing and educational purposes only. Do NOT use it on systems you do not own or have explicit permission to test.
The developers take no responsibility for misuse or damage caused.
Created with ❤️ by RelunSec.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
File details
Details for the file lfimap_ng-1.0.0.tar.gz.
File metadata
- Download URL: lfimap_ng-1.0.0.tar.gz
- Upload date:
- Size: 40.7 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.1.0 CPython/3.13.3
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
1b062f457b212625baef519570ccd1272518792d9e7c06f8ff6d6eb92e02065d
|
|
| MD5 |
0ca3630f7469c25bd28799a2e5d1b9f3
|
|
| BLAKE2b-256 |
86dceaf1e32869a610cca2a4a6916a8d95b956683e15735c33090feaf13df0e1
|