WAFW00F allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.
quay.io/trickest/wafw00f:ae6a67f
Specify target url(s) url1 [url2 [url3 ... ]]--list
List all WAFs that WAFW00F is able to detect--test
Test for one specific WAF--proxy
Use an HTTP proxy to perform requests, examples: http://hostname:8080, socks5://hostname:1080, http://user:pass@hostname:8080--format
Force output format to csv, json or text.--findall
Find all WAFs which match the signatures, do not stop testing on the first one--headers
Pass custom headers via a text file to overwrite the default header set.--verbose
Enable verbosity--no-colors
Disable ANSI colors in output.--input-file
Read targets from a file. Input format can be csv, json or text. For csv and json, a `url` column name or element is required.--noredirect
Do not follow redirections given by 3xx responses