whatwaf
Detect and bypass web application firewalls and protection systems
Name:whatwaf
Category:Recon
Publisher:trickest-mhmdiaa
Created:1/19/2024
Container:
quay.io/trickest/whatwaf:06c815a-patch-3
Output Type:
License:Unknown
Source:View Source
Parameters
--csv
Send the output to a CSV file--url
Pass a single URL to detect the protection--burp
Pass a Burp Suite request file to perform WAF evaluation--data
Send this data with the POST request (*default=random)--hide
Hide the banner during the run--json
Send the output to a JSON file--list
Pass a file containing URL's (one per line) to detect the protection--post
Send a POST request (*default=GET)--skip
Skip checking for bypasses and just identify the firewall--test
Test the connection to the website before starting (*default=True)--yaml
Send the output to a YAML file--proxy
Provide a proxy to run behind in the format type://address:port (IE socks5://10.54.127.4:1080) (*default=None)--encode
Encode a provided payload using provided tamper script(s) you are able to payy multiple tamper script load paths to this argument and the payload will be tampered as requested--googler
Pass a JSON file from the Googler CMD line tool (IE googler -n 100 --json >> googler.json)--headers
Add your own custom headers to the request. To use multiple separate headers by comma. Your headers need to be exact(IE: Set-Cookie=a345ddsswe,X-Forwarded-For:127.0.0.1) (*default=None)--threads
Send requests in parallel (specify number of threads (*default=1)--timeout
Control the timeout time of the requests (*default=15)--verbose
Run in verbose mode (more output)--payloads
Provide your own payloads separated by a comma IE AND 1=1,AND 2=2--throttle
Provide a sleep time per request (*default=0)--force-ssl
Force the assignment of HTTPS instead of HTTP while processing (*default=HTTP unless otherwise specified by URL)--force-file
Force the creation of a file even if there is no protection identified--tamper-int
Control the amount of tampers that are displayed (*default=5)--pa
Provide your own personal agent to use it for the HTTP requests--verify-num
Change the request amount to verify if there really is not a WAF present(*default=5)--encode-list
Encode a file containing payloads (one per line) by passing the path and load path, files can only encoded using a single tamper script load path--fingerprint
Save all fingerprints for further investigation--pl
Provide a file containing a list of payloads 1 per line--ra
Use a random user-agent for the HTTP requests (*default=whatwaf/2.1.6.3 (Language=3.10.12; Platform=Linux))--determine-webserver
Attempt to determine what web server is running on the backend (IE Apache, Nginx, etc.. *default=False)