LinuxCommandLibrary
GitHubF-DroidGoogle Play Store

whatweb

Web technology fingerprinting and identification

TLDR

Scan a website
$ whatweb [https://example.com]
copy
Verbose output
$ whatweb -v [url]
copy
Aggressive scan (makes additional requests per target)
$ whatweb -a 3 [url]
copy
Save results as JSON
$ whatweb --log-json=[output.json] [url]
copy
Scan multiple URLs
$ whatweb [url1] [url2]
copy
Scan with custom user agent and threads
$ whatweb --user-agent "[custom-agent]" -t [10] [url]
copy
Follow redirects only within the same site
$ whatweb --follow-redirect=same-site [url]
copy

SYNOPSIS

whatweb [options] urls

DESCRIPTION

whatweb is a web scanner that identifies technologies used by websites, including content management systems, web frameworks, server software, JavaScript libraries, and analytics platforms. It sends requests to target URLs and analyzes responses to fingerprint the specific products and versions in use.The tool uses a plugin-based architecture with over 1,800 plugins for recognizing different technologies. Four aggression levels control scanning intensity, from passive analysis of a single page request to aggressive testing that makes additional requests to probe for specific technologies.Output can be formatted as JSON, XML, verbose text, or SQL for database storage. Multiple URLs can be scanned in a single run, and the tool supports authentication, custom headers, and proxy configuration for testing behind login pages or through intermediary servers.

PARAMETERS

-v

Verbose output showing detailed plugin results.
-a, --aggression LEVEL
Aggression level: 1 (stealthy, single request, default), 3 (aggressive, additional requests on match), 4 (heavy, many requests per target). Level 2 is unused.
--log-verbose FILE
Log verbose output to a file.
--log-json FILE
Log output in JSON format.
--log-xml FILE
Log output in XML format.
-q, --quiet
Quiet mode; suppress output to stdout.
--user-agent UA
Set a custom User-Agent string.
-t, --max-threads N
Number of simultaneous threads. Default: 25.
--follow-redirect WHEN
When to follow redirects: never, http-only, meta-only, same-site, or always (default).
--cookie COOKIE
Provide cookies (e.g., 'name=value; name2=value2').
--proxy HOST:PORT
Use an HTTP proxy for requests.

CAVEATS

Only use on systems you are authorized to scan. Aggressive modes may be detected by intrusion detection systems. Requires Ruby.

SEE ALSO

wappalyzer(1), nmap(1), nikto(1)

Copied to clipboard
Kai