2024-07-29 02:49:56 +10:00
|
|
|
# whatwaf
|
|
|
|
|
|
|
|
> Detect and bypass web application firewalls and protection systems.
|
|
|
|
> More information: <https://github.com/Ekultek/WhatWaf>.
|
|
|
|
|
2025-03-28 05:26:23 +02:00
|
|
|
- Detect protection on a single URL, optionally use verbose output:
|
2024-07-29 02:49:56 +10:00
|
|
|
|
2025-03-28 05:26:23 +02:00
|
|
|
`whatwaf {{[-u|--url]}} {{https://example.com}} --verbose`
|
2024-07-29 02:49:56 +10:00
|
|
|
|
2025-03-28 05:26:23 +02:00
|
|
|
- Detect protection on a list of URLs in parallel from a file (one URL per line):
|
2024-07-29 02:49:56 +10:00
|
|
|
|
2025-03-28 05:26:23 +02:00
|
|
|
`whatwaf {{[-t|--threads]}} {{number}} {{[-l|--list]}} {{path/to/file}}`
|
2024-07-29 02:49:56 +10:00
|
|
|
|
|
|
|
- Send requests through a proxy and use custom payload list from a file (one payload per line):
|
|
|
|
|
2025-03-28 05:26:23 +02:00
|
|
|
`whatwaf --proxy {{http://127.0.0.1:8080}} --pl {{path/to/file}} {{[-u|--url]}} {{https://example.com}}`
|
2024-07-29 02:49:56 +10:00
|
|
|
|
2025-03-28 05:26:23 +02:00
|
|
|
- Send requests through Tor (Tor must be installed) using custom payloads (comma-separated):
|
2024-07-29 02:49:56 +10:00
|
|
|
|
2025-03-28 05:26:23 +02:00
|
|
|
`whatwaf --tor {{[-p|--payloads]}} '{{payload1,payload2,...}}' {{[-u|--url]}} {{https://example.com}}`
|
2024-07-29 02:49:56 +10:00
|
|
|
|
2025-03-28 05:26:23 +02:00
|
|
|
- Use a random user-agent, set throttling and timeout, send a POST request, and force HTTPS connection:
|
2024-07-29 02:49:56 +10:00
|
|
|
|
2025-03-28 05:26:23 +02:00
|
|
|
`whatwaf --ra --throttle {{seconds}} --timeout {{seconds}} {{[-P|--post]}} --force-ssl {{[-u|--url]}} {{http://example.com}}`
|
2024-07-29 02:49:56 +10:00
|
|
|
|
|
|
|
- List all WAFs that can be detected:
|
|
|
|
|
|
|
|
`whatwaf --wafs`
|
|
|
|
|
|
|
|
- List all available tamper scripts:
|
|
|
|
|
|
|
|
`whatwaf --tampers`
|