LFI-Enum Logo

LFI-Enum

Scripts to automate the process of enumerating a Linux system through a Local File Inclusion (LFI) vulnerability.

89
Visit website
Compare
Compare
0
MCPThe entire cybersecurity market, one prompt awayTry MCP Access

LFI-Enum Description

Scripts to execute enumeration via LFI This repository contains scripts to automate the process of enumerating a Linux system through a Local File Inclusion (LFI) vulnerability. The scripts are designed to be used in a controlled environment and should not be used to attack systems without permission. Please note that the scripts are provided as-is and without warranty. You can use the scripts to: * Enumerate system information * List files and directories * Read and write files * Execute system commands * Bypass security restrictions Remember to always use the scripts responsibly and in accordance with local laws and regulations.

LFI-Enum FAQ

Common questions about LFI-Enum including features, pricing, alternatives, and user reviews.

LFI-Enum is Scripts to automate the process of enumerating a Linux system through a Local File Inclusion (LFI) vulnerability.. It is a Vulnerability Management solution designed to help security teams with Enumeration, Linux, Vulnerability Exploitation.

Have more questions? Browse our categories or search for specific tools.

ALTERNATIVES

Vulneri Pentest Logo

Continuous pentest platform simulating real attacks across web, cloud, and network assets.

0
LinEnum Logo

LinEnum is a tool for Linux enumeration that provides detailed system information and performs various checks and tasks.

0
LFI-files Logo

A wordlist to bruteforce for Local File Inclusion (LFI) vulnerabilities

0
o365-attack-toolkit Logo

A toolkit to attack Office365, including tools for password spraying, password cracking, token manipulation, and exploiting vulnerabilities in Office365 APIs and services.

0
Linux Exploit Suggester Logo

Linux Exploit Suggester; suggests possible exploits based on the Linux operating system release number.

0

Stay Updated with Mandos Brief

Get strategic cybersecurity insights in your inbox