diff --git a/pages/common/whatwaf.md b/pages/common/whatwaf.md new file mode 100644 index 000000000..12c7567c4 --- /dev/null +++ b/pages/common/whatwaf.md @@ -0,0 +1,32 @@ +# whatwaf + +> Detect and bypass web application firewalls and protection systems. +> More information: . + +- Detect protection on a single [u]RL, optionally use verbose output: + +`whatwaf --url {{https://example.com}} --verbose` + +- Detect protection on a [l]ist of URLs in parallel from a file (one URL per line): + +`whatwaf --threads {{number}} --list {{path/to/file}}` + +- Send requests through a proxy and use custom payload list from a file (one payload per line): + +`whatwaf --proxy {{http://127.0.0.1:8080}} --pl {{path/to/file}} -u {{https://example.com}}` + +- Send requests through Tor (Tor must be installed) using custom [p]ayloads (comma-separated): + +`whatwaf --tor --payloads '{{payload1,payload2,...}}' -u {{https://example.com}}` + +- Use a random user-agent, set throttling and timeout, send a [P]OST request, and force HTTPS connection: + +`whatwaf --ra --throttle {{seconds}} --timeout {{seconds}} --post --force-ssl -u {{http://example.com}}` + +- List all WAFs that can be detected: + +`whatwaf --wafs` + +- List all available tamper scripts: + +`whatwaf --tampers`