Name:whatwaf
Category:Recon
Publisher:trickest-mhmdiaa
Created:1/19/2024
Container:
quay.io/trickest/whatwaf:06c815a-patch-3Output Type:
License:Unknown
Source:View Source
Parameters
--csvSend the output to a CSV file--urlPass a single URL to detect the protection--burpPass a Burp Suite request file to perform WAF evaluation--dataSend this data with the POST request (*default=random)--hideHide the banner during the run--jsonSend the output to a JSON file--listPass a file containing URL's (one per line) to detect the protection--postSend a POST request (*default=GET)--skipSkip checking for bypasses and just identify the firewall--testTest the connection to the website before starting (*default=True)--yamlSend the output to a YAML file--proxyProvide a proxy to run behind in the format type://address:port (IE socks5://10.54.127.4:1080) (*default=None)--encodeEncode a provided payload using provided tamper script(s) you are able to payy multiple tamper script load paths to this argument and the payload will be tampered as requested--googlerPass a JSON file from the Googler CMD line tool (IE googler -n 100 --json >> googler.json)--headersAdd your own custom headers to the request. To use multiple separate headers by comma. Your headers need to be exact(IE: Set-Cookie=a345ddsswe,X-Forwarded-For:127.0.0.1) (*default=None)--threadsSend requests in parallel (specify number of threads (*default=1)--timeoutControl the timeout time of the requests (*default=15)--verboseRun in verbose mode (more output)--payloadsProvide your own payloads separated by a comma IE AND 1=1,AND 2=2--throttleProvide a sleep time per request (*default=0)--force-sslForce the assignment of HTTPS instead of HTTP while processing (*default=HTTP unless otherwise specified by URL)--force-fileForce the creation of a file even if there is no protection identified--tamper-intControl the amount of tampers that are displayed (*default=5)--paProvide your own personal agent to use it for the HTTP requests--verify-numChange the request amount to verify if there really is not a WAF present(*default=5)--encode-listEncode a file containing payloads (one per line) by passing the path and load path, files can only encoded using a single tamper script load path--fingerprintSave all fingerprints for further investigation--plProvide a file containing a list of payloads 1 per line--raUse a random user-agent for the HTTP requests (*default=whatwaf/2.1.6.3 (Language=3.10.12; Platform=Linux))--determine-webserverAttempt to determine what web server is running on the backend (IE Apache, Nginx, etc.. *default=False)