Local File Inclusion discovery and exploitation tool
☆331Dec 31, 2024Updated last year
Alternatives and similar repositories for LFImap
Users that are interested in LFImap are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Local file inclusion exploitation tool☆935Oct 1, 2025Updated 5 months ago
- Automatic SSTI detection tool with interactive interface☆1,430Mar 22, 2026Updated last week
- De-clutter a list of URLs☆385Mar 8, 2026Updated 3 weeks ago
- The most powerful CRLF injection (HTTP Response Splitting) scanner.☆593Oct 17, 2023Updated 2 years ago
- ☆21Aug 3, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- 🌙🦊 Dalfox is a powerful open-source XSS scanner and utility focused on automation.☆4,884Mar 22, 2026Updated last week
- Automatic SSRF fuzzer and exploitation tool☆3,515Sep 4, 2025Updated 6 months ago
- A python tool used to discover endpoints, potential parameters, a target specific wordlist for a given target and secrets☆1,535Mar 8, 2026Updated 3 weeks ago
- This is a python wrapper around the amazing KNOXSS API by Brute Logic☆285Mar 6, 2026Updated 3 weeks ago
- ☆87Aug 25, 2022Updated 3 years ago
- A replacement of "qsreplace", accepts URLs as standard input, replaces all query string values with user-supplied values and stdout.☆109Mar 1, 2022Updated 4 years ago
- Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hac…☆1,164Jan 21, 2026Updated 2 months ago
- ☆21Feb 10, 2026Updated last month
- An IIS short filename enumeration tool☆1,132Nov 25, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- 🚫 Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fast…☆1,564Mar 16, 2026Updated 2 weeks ago
- ☆105Jan 3, 2023Updated 3 years ago
- Find CVE PoCs on GitHub☆161Aug 1, 2025Updated 7 months ago
- A fuzzer for detecting open redirect vulnerabilities☆785Jul 1, 2024Updated last year
- Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal, GhostArchive & Intelligence X!☆2,574Mar 8, 2026Updated 3 weeks ago
- A Burp Suite extension for identifying injection flaws (LFI, RCE, SQLi), authentication/authorization issues, and HTTP 403 access violati…☆398Mar 6, 2026Updated 3 weeks ago
- Signatures for jaeles scanner by @j3ssie☆117Apr 20, 2024Updated last year
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆1,065Updated this week
- declutters url lists for crawling/pentesting☆1,539Feb 23, 2025Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Made your bugbounty subdomains reconnaissance easier with Hunt3r the web application reconnaissance framework☆169Feb 4, 2023Updated 3 years ago
- Simple python script supported with BurpBouty profile that helps you to detect SQL injection "Error based" by sending multiple requests w…☆634Mar 22, 2026Updated last week
- A fast tool to scan CRLF vulnerability written in Go☆1,521Feb 23, 2026Updated last month
- Hidden parameters discovery suite☆2,038Sep 8, 2024Updated last year
- HTTP Request Smuggling Detection Tool☆536Dec 21, 2023Updated 2 years ago
- 「🔑」A tool used to hunt down API key leaks in JS files and pages☆866Mar 12, 2026Updated 2 weeks ago
- Burp Extension to find potential endpoints, parameters, and generate a custom target wordlist☆1,503Jan 8, 2026Updated 2 months ago
- Passively check for XSS character encodings☆18Mar 9, 2026Updated 3 weeks ago
- Automation for javascript recon in bug bounty.☆1,073Sep 9, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws☆3,959Oct 4, 2025Updated 5 months ago
- Real-world infosec wordlists, updated regularly☆1,725Mar 22, 2026Updated last week
- Fast CLI tool to find the parameters that can be used to find SSRF or Out-of-band resource load☆296Sep 22, 2024Updated last year
- Mining URLs from dark corners of Web Archives for bug hunting/fuzzing/further probing☆3,025Mar 7, 2026Updated 3 weeks ago
- File upload vulnerability scanner and exploitation tool.☆3,306May 8, 2025Updated 10 months ago
- Discover new target domains using Content Security Policy☆508Mar 16, 2026Updated 2 weeks ago
- Subdomain takeover vulnerability checker☆1,531Sep 10, 2024Updated last year