Skip to main content

A Powerful Local File Inclusion (LFI) Exploitation Tool

Project description

LFIMap - Advanced Local File Inclusion Exploitation Framework

LFIMap Logo Advanced Local File Inclusion Exploitation Framework

Python Version License Platform GitLab

The most comprehensive Local File Inclusion exploitation framework with 18+ attack techniques, 30+ bypass plugins, and advanced post-exploitation capabilities.

FeaturesInstallationQuick StartDocumentationContributing


🚀 Features

🎯 18+ Exploitation Techniques

  • Basic LFI - Directory traversal and file enumeration
  • PHP Filter - Source code disclosure via php://filter with multiple encodings
  • Log Poisoning - Code injection through web server logs
  • Session Poisoning - PHP session file manipulation with ID bruteforcing
  • Proc/Self/Environ - Unix environment variable exploitation
  • Data URI - Code execution via data:// scheme
  • Timing-Based Blind LFI - Statistical analysis for blind vulnerabilities
  • Advanced Wrappers - expect://, file://, phar://, zip://, glob://, ftp://, gopher://
  • Race Condition LFI - Temporary file exploitation
  • Proc Symlink - /proc/self/fd/X and cwd symlink attacks
  • Remote File Inclusion - External file inclusion capabilities
  • PHP Input Wrapper - POST data inclusion attacks

🛡️ 30+ Bypass Plugins

🔓 WAF & Filter Evasion

  • 403 - 12+ HTTP 403 bypass techniques
  • waf-detection - Identifies Cloudflare, Sucuri, ModSecurity, etc.
  • unicodetrick - Overlong UTF-8 encoding bypasses
  • multi-encoding - Double/triple URL encoding
  • path-normalization - Directory traversal variations
  • case-variation - Case-sensitive filter bypass
  • xforwardedfor - X-Forwarded-For header spoofing
  • spoofhost-header - Host header manipulation

🎭 Advanced Obfuscation

  • questionmark - Query parameter injection
  • extra-dot - Dot notation bypasses
  • semicolon-injection - Semicolon-based evasion
  • doubleslash2slash - Path normalization tricks
  • tab-trick - Tab character injection
  • comment-trick - Comment-based bypasses
  • dotdot-trick - Enhanced directory traversal
  • fat-dot - Unicode dot variations
  • utf7-bypass - UTF-7 encoding evasion
  • base64-in-path - Base64 path encoding
  • iis-double-slash - IIS-specific bypasses
  • clrf-injection - CRLF injection techniques

🔍 Detection & Exploitation

  • lfi-error-fingerprint - Error message analysis
  • mimetype-check - MIME type validation bypass
  • wrapper-data - Data wrapper exploitation
  • session-id-bruteforce - Automated session enumeration
  • exfil-data - Data exfiltration assistance
  • race-condition-lfi - Race condition exploitation
  • rate-limit-adapter - Rate limiting evasion

🎛️ Advanced Capabilities

  • Interactive Wizard - Beginner-friendly guided setup
  • Parameter Fuzzing - Automatic vulnerable parameter discovery
  • Multi-Target Support - Batch scanning from file input
  • Post-Exploitation Shell - Interactive command execution
  • Professional Output - Rich console with structured logging
  • Enterprise Authentication - Basic, NTLM with domain support
  • Proxy Integration - Burp Suite, OWASP ZAP compatibility

⚡ Installation

🔧 Quick Install

git clone https://gitlab.com/relunsec/lfimap.git
cd lfimap
pip install -r requirements.txt
cd lfimap

Manual install (if needed):

pip install requests rich requests-ntlm

Dependency check:

cd lfimap
python3 cli.py --check-depends
python  cli.py --list-depends

Precompiled Bin (Linux only):

git clone https://github.com/relunsec/lfimap.git
cd lfimap
cd dist
sudo make install

Docs (Linux only):

cd docs
sudo make make-docs

🔧 Usage Examples

# Basic LFI Scan
python lfimap.py -u "http://example.com/vuln.php?file=FUZZ" --method basic

# PHP filter to read config.php
python lfimap.py -u "http://example.com/?file=FUZZ" --method php-filter --php-filter-file config.php

# Poison access log & get shell
python lfimap.py -u "http://example.com/?page=FUZZ" --method log-poisoning \
  --injection-string "<?php system($_GET['cmd']); ?>" --cmd-param cmd

# Parameter fuzzing with plugins
python lfimap.py -u "http://example.com/index.php" --fuzz-param --plugin 403,unicodetrick

# All methods minus blind/time-based
python lfimap.py -u "http://target.com/index.php?f=FUZZ" --method all -eT timing-based

🪜 Contributing

Your contributions are welcome!

  • New plugins, methods, bypasses
  • Bug fixes or improvements
  • Submit pull requests and open issues

⚠️ Legal & Ethical Disclaimer

This tool is intended for authorized security testing and educational purposes only. Do NOT use it on systems you do not own or have explicit permission to test.

The developers take no responsibility for misuse or damage caused.


Created with ❤️ by RelunSec.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

lfimap_ng-1.0.0.tar.gz (40.7 kB view details)

Uploaded Source

File details

Details for the file lfimap_ng-1.0.0.tar.gz.

File metadata

  • Download URL: lfimap_ng-1.0.0.tar.gz
  • Upload date:
  • Size: 40.7 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.13.3

File hashes

Hashes for lfimap_ng-1.0.0.tar.gz
Algorithm Hash digest
SHA256 1b062f457b212625baef519570ccd1272518792d9e7c06f8ff6d6eb92e02065d
MD5 0ca3630f7469c25bd28799a2e5d1b9f3
BLAKE2b-256 86dceaf1e32869a610cca2a4a6916a8d95b956683e15735c33090feaf13df0e1

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page