Automated LFI scanner for bug bounty and pentesting.
- Selenium browser automation for auth
- 764 base payloads, 1500+ with mutations
- 13 detection methods
- PHP filter chains, log poisoning, session poisoning
- /proc/ exploitation
- WAF bypass (13+ techniques)
- JSON + HTML reports
git clone https://github.com/SpaceLeam/LFIbay.git
cd LFIbay
pip install -r requirements.txtChromeDriver installs automatically.
python lfibay.py- Enter login URL, login manually
- Enter target URL
- Wait for scan
- Check
output/reports/for results
- Python 3.11-3.12
- Selenium 4.30+
- Requests 2.31+
- BeautifulSoup4 4.12+
- lxml 5.0+
- Colorama 0.4.6+
Basic:
- Path traversal
- PHP wrappers
- Null bytes
- Double encoding
Advanced:
- Filter chains (RCE without upload)
- Log poisoning (Apache/Nginx/SSH/FTP)
- Session poisoning
- /proc/ exploitation
- Wrapper abuse (zip, phar, data)
13 methods including error patterns, content analysis, timing, entropy, size anomalies, and more.
LFIbay/
├── lfibay.py # Main
├── core/ # Modules
├── payloads/ # 764 payloads
├── utils/ # Helpers
└── output/reports/ # Results
Edit utils/config.py for:
- Request delays
- Detection patterns
- WAF signatures
- User-Agent pool
- Filter chains need specific PHP versions
- Some payloads require certain server configs
- Mutations can be slow on large sets
For authorized testing only. Get written permission before testing any system. Unauthorized use is illegal.
MIT License - see LICENSE file.
See CHANGELOG.md for version history.