WAFW00F - Identify and fingerprint Web Application Firewall
products
wafw00f url1 [url2 [url3 ... ]]
- -h, --help
- Show available options.
- -v, --verbose
- Enable verbosity - multiple -v options increase verbosity.
- -a, --findall
- Find all WAFs, do not stop testing on the first one.
- -r,
--noredirect
- Do not follow redirections given by 3xx responses.
- -t WAF,
--test=WAF
- Test for one specific WAF product.
- -o OUTPUT,
--output=OUTPUT
- Write output to csv, json or text file depending on file extension. For
stdout, specify - as filename.
- -i INPUT,
--input=INPUT
- Read targets from a file. Input format can be csv, json or text. For csv
and json, a `url` column name or element is required.
- -l, --list
- List all the WAFs that WAFW00F is able to detect.
- -p PROXY,
--proxy=PROXY
- Use an HTTP proxy to perform requests, example: http://hostname:8080,
socks5://hostname:1080.
- -V, --version
- Print out the version.
- -H FILE,
--headers=FILE
- Pass custom headers, for example to overwrite the default user-agent
string.
Sandro Gauci (@SandroGauci)
Pinaki Mondal (@0xInfection)
You can report bugs at the project homepage issue tracker:
<https://github.com/EnableSecurity/wafw00f/issues/>.
Copyright (C) 2009-2022 WAFW00F Developers. License: BSD 3-Clause
<https://opensource.org/licenses/BSD-3-Clause>.
This is free software: you are free to modify and distribute under the terms
as permitted by the license provided alongwith.
Full documentation is available at:
<https://github.com/EnableSecurity/wafw00f/wiki/>.