FDsploit can be used to discover and exploit Local/Remote File Inclusion and directory traversal vulnerabilities automatically.
quay.io/trickest/fdsploit:4522f53
--url
Specify URL--depth
Specify max depth for payload [default 5]--params
Specify POST parameters to use (applied only with POST requests) Form: param1:value1,param2:value2,...--keyword
Search for a certain keyword(s) on the response [default: None]--payload
Specify a payload-file to look for--b64
Use base64 encoding [default False]-e
Url-encode the payload [default: False]--useragent
Use a random user-agent [default user-agent: FDsploit_1.2_agent]--file
Specify a file containing urls--verb
Specify request type ('GET' or 'POST') [default GET]--cmd
Test for command execution through PHP functions [default command: None]--cookie
Specify a session-cookie to use [default None]--tchar
Use a termination character ('%00' or '?') [default None]