LinuxCommandLibrary

whatwaf

Web Application Firewall detection and bypass

TLDR

Detect WAF

$ whatwaf -u [https://example.com]
copy
From file
$ whatwaf -l [urls.txt]
copy
Use Tor
$ whatwaf -u [url] --tor
copy
Specific payloads
$ whatwaf -u [url] --payload "[<script>]"
copy
JSON output
$ whatwaf -u [url] --json
copy

SYNOPSIS

whatwaf [-u url] [-l file] [--tor] [options]

DESCRIPTION

whatwaf is a security tool that detects Web Application Firewalls (WAFs) protecting websites and suggests potential bypass techniques. It sends various payloads to the target and analyzes responses to fingerprint the specific WAF product in use.
Beyond detection, whatwaf provides tamper scripts and evasion suggestions tailored to the identified WAF, helping penetration testers understand what protections they need to work around during authorized assessments. Custom payloads can be specified for targeted testing.
The tool supports batch scanning from URL files, Tor network routing for anonymous testing, and JSON output for integration with other security tools. It is intended exclusively for authorized security testing and research.

PARAMETERS

-u URL

Target URL.
-l FILE
URL list file.
--tor
Use Tor network.
--payload PAY
Custom payload.
--json
JSON output.
--tamper SCRIPT
Tamper script.

CAVEATS

Authorized testing only. May trigger alerts. Python required.

HISTORY

WhatWaf was created for identifying Web Application Firewalls and suggesting bypass techniques.

SEE ALSO

wafw00f(1), nmap(1), sqlmap(1)

> TERMINAL_GEAR

Curated for the Linux community

Copied to clipboard

> TERMINAL_GEAR

Curated for the Linux community