WAFPASS Analysing parameters with all payloads’ bypass methods, aiming at benchmarking security solutions like WAF.
Today a great number of website owners around the globe use “Web Application Firewalls” to improve their security. However, these security applications suffer from many deficits such as poor performance, lack of updates, and so forth. Thus, they are hindered from working effectively against everyday attacks that are equipped with cutting edge technological innovations. This vulnerability can cause various issues and even lead to security failures.
WAFPASS’s ultimate goal is to present a solution for promoting security systems like WAF in addition to providing a general overview of the security solutions.
██╗ ██╗ █████╗ ███████╗██████╗ █████╗ ███████╗███████╗ ██║ ██║██╔══██╗██╔════╝██╔══██╗██╔══██╗██╔════╝██╔════╝ ██║ █╗ ██║███████║█████╗ ██████╔╝███████║███████╗███████╗ ██║███╗██║██╔══██║██╔══╝ ██╔═══╝ ██╔══██║╚════██║╚════██║ ╚███╔███╔╝██║ ██║██║ ██║ ██║ ██║███████║███████║ ╚══╝╚══╝ ╚═╝ ╚═╝╚═╝ ╚═╝ ╚═╝ ╚═╝╚══════╝╚══════╝ WAFPASS - Copyright (c) 2017 Hamed Izadi (@hezd).
Python version 3.4.x is required for running this program.
Download WAFPASS by cloning the Git repository:
$ git clone https://github.com/wafpassproject/wafpass.git
To get a list of all options and switches use:
$ python3 wapfass.py -h
You can add your payloads in /payloads/payloads.csv like this:
This tool is only for testing and academic purposes and can only be used where strict consent has been given. Do not use it for illegal purposes!