whatwaf
Detect and bypass web application firewalls and protection systems
Details
Category: Recon
Publisher: trickest-mhmdiaa
Created Date: 1/19/2024
Container: quay.io/trickest/whatwaf:06c815a-patch-3
Source URL: https://github.com/Ekultek/WhatWaf
Parameters
Command:
--csv
- Send the output to a CSV fileCommand:
--url
- Pass a single URL to detect the protectionCommand:
--burp
- Pass a Burp Suite request file to perform WAF evaluationCommand:
--data
- Send this data with the POST request (*default=random)Command:
--hide
- Hide the banner during the runCommand:
--json
- Send the output to a JSON fileCommand:
--list
- Pass a file containing URL's (one per line) to detect the protectionCommand:
--post
- Send a POST request (*default=GET)Command:
--skip
- Skip checking for bypasses and just identify the firewallCommand:
--test
- Test the connection to the website before starting (*default=True)Command:
--yaml
- Send the output to a YAML fileCommand:
--proxy
- Provide a proxy to run behind in the format type://address:port (IE socks5://10.54.127.4:1080) (*default=None)Command:
--encode
- Encode a provided payload using provided tamper script(s) you are able to payy multiple tamper script load paths to this argument and the payload will be tampered as requestedCommand:
--googler
- Pass a JSON file from the Googler CMD line tool (IE googler -n 100 --json >> googler.json)Command:
--headers
- Add your own custom headers to the request. To use multiple separate headers by comma. Your headers need to be exact(IE: Set-Cookie=a345ddsswe,X-Forwarded-For:127.0.0.1) (*default=None)Command:
--threads
- Send requests in parallel (specify number of threads (*default=1)Command:
--timeout
- Control the timeout time of the requests (*default=15)Command:
--verbose
- Run in verbose mode (more output)Command:
--payloads
- Provide your own payloads separated by a comma IE AND 1=1,AND 2=2Command:
--throttle
- Provide a sleep time per request (*default=0)Command:
--force-ssl
- Force the assignment of HTTPS instead of HTTP while processing (*default=HTTP unless otherwise specified by URL)Command:
--force-file
- Force the creation of a file even if there is no protection identifiedCommand:
--tamper-int
- Control the amount of tampers that are displayed (*default=5)Command:
--pa
- Provide your own personal agent to use it for the HTTP requestsCommand:
--verify-num
- Change the request amount to verify if there really is not a WAF present(*default=5)Command:
--encode-list
- Encode a file containing payloads (one per line) by passing the path and load path, files can only encoded using a single tamper script load pathCommand:
--fingerprint
- Save all fingerprints for further investigationCommand:
--pl
- Provide a file containing a list of payloads 1 per lineCommand:
--ra
- Use a random user-agent for the HTTP requests (*default=whatwaf/2.1.6.3 (Language=3.10.12; Platform=Linux))Command:
--determine-webserver
- Attempt to determine what web server is running on the backend (IE Apache, Nginx, etc.. *default=False)