Liffy Logo

Liffy

A local file inclusion exploitation tool

884
Visit website
1
Compare
Compare
0
MCPThe entire cybersecurity market, one prompt awayTry MCP Access

Liffy Description

Local file inclusion exploitation tool

Liffy FAQ

Common questions about Liffy including features, pricing, alternatives, and user reviews.

Liffy is A local file inclusion exploitation tool. It is a Vulnerability Management solution designed to help security teams with Vulnerability Exploitation.

Have more questions? Browse our categories or search for specific tools.

ALTERNATIVES

Vulneri Pentest Logo

Continuous pentest platform simulating real attacks across web, cloud, and network assets.

0
libformatstr.py Logo

A Python library that simplifies format string vulnerability exploitation by providing tools for payload generation, memory manipulation, and automated parameter detection.

0
Hash Extender Logo

Hash Extender is a command-line tool that automates length extension attacks against various hashing algorithms including MD5, SHA-1, SHA-256, and others.

0
LFI-Enum Logo

Scripts to automate the process of enumerating a Linux system through a Local File Inclusion (LFI) vulnerability.

0
LFI-files Logo

A wordlist to bruteforce for Local File Inclusion (LFI) vulnerabilities

0

Stay Updated with Mandos Brief

Get strategic cybersecurity insights in your inbox