wappalyzer
Identify technologies used on websites
TLDR
Scan a single URL
SYNOPSIS
wappalyzer [options] -i url|file
webanalyze [options]
DESCRIPTION
wappalyzer identifies technologies used on websites including CMS platforms, JavaScript frameworks, analytics tools, and server software. It uses pattern matching against HTML, headers, cookies, and JavaScript variables.
Multiple CLI implementations exist: the Python wappalyzer package (requires Firefox/geckodriver), webanalyze (Go-based, standalone), and wappybird (multithreaded). All use fingerprints from the Wappalyzer project.
The tools are useful for security assessments, competitive analysis, and technology inventory. They can process single URLs or batch scan from files.
PARAMETERS (wappalyzer)
-i url|file
Input URL or file with URLs.-t num
Number of threads.-oJ file
Output JSON to file.-oC file
Output CSV to file.
PARAMETERS (webanalyze)
-host url
Single host to analyze.-hosts file
File containing hosts.-output format
Output format: stdout, csv, json.-update
Update technology fingerprints.-worker num
Number of workers.
CAVEATS
Python version requires Firefox and geckodriver. Fingerprints need periodic updates. Dynamic content may require browser-based scanning. Rate limiting may apply to bulk scanning.
HISTORY
Wappalyzer started as a browser extension for identifying web technologies. Various CLI tools emerged to enable automation and integration. After the official project stopped open-sourcing fingerprints, community forks maintain updated detection patterns.
