WAF-Bypass Tool - open source! | General Hacking | Crax

Welcome To Crax.Pro Forum!

Check our new Marketplace at Crax.Shop

   Login! SignUp Now!

WAF-Bypass Tool - open source!

WAF-Bypass Tool - open source!

LV
1
 

lolcalhost

Member
Joined
Apr 10, 2023
Threads
1
Likes
1
Awards
3
Credits
430©
Cash
0$
AVvXsEgL3MLHu1cARwXIirYVPLX_4TlTK1evGLBNS7jVThufKErSdgIWSx7KQkobRZxVEvGnEi74WWDJ1cziEoefKuvYGqRyDMmQ88CNopkcs5ppKa3rqEqmskizyvmfCyrrR35j97E6sHFYbvqy2Xw-uBfv_kAq-1kVhSyJhjpkBTRmIOtMVUjEWpRzOJSNRg=w640-h496


WAF bypass Tool is an open source tool to analyze the security of any WAF for False Positives and False Negatives using predefined and customizable payloads. Check your WAF before an attacker does. WAF Bypass Tool is developed by Nemesida WAF team with the participation of community.

Run from Docker:​

# docker pull nemesida/waf-bypass
# docker run nemesida/waf-bypass --host='example.com'

Run source code from GitHub:​

# git clone https://github.com/nemesida-waf/waf_bypass.git /opt/waf-bypass/
# python3 -m pip install -r /opt/waf-bypass/requirements.txt
# python3 /opt/waf-bypass/main.py --host='example.com'

Options:​

  • '--proxy' (--proxy='http://proxy.example.com:3128') - option allows to specify where to connect to instead of the host.
  • '--header' (--header 'Authorization: Basic YWRtaW46YWRtaW4=' --header 'X-TOKEN: ABCDEF') - option allows to specify the HTTP header to send with all requests (e.g. for authentication). Multiple use is allowed.
  • '--user-agent' (--user-agent 'MyUserAgent 1/1') - option allows to specify the HTTP User-Agent to send with all requests, except when the User-Agent is set by the payload ("USER-AGENT").
  • '--block-code' (--block-code='403' --block-code='222') - option allows you to specify the HTTP status code to expect when the WAF is blocked. (default is 403). Multiple use is allowed.
  • '--threads' (--threads=15) - option allows to specify the number of parallel scan threads (default is 10).
  • '--timeout' (--timeout=10) - option allows to specify a request processing timeout in sec. (default is 30).
  • '--json-format' - an option that allows you to display the result of the work in JSON format (useful for integrating the tool with security platforms).
  • '--details' - display the False Positive and False Negative payloads. Not available in JSON format.
  • '--exclude-dir' - exclude the payload's directory (--exclude-dir='SQLi' --exclude-dir='XSS'). Multiple use is allowed.

Payloads:​

Depending on the purpose, payloads are located in the appropriate folders:
  • FP - False Positive payloads
  • API - API testing payloads
  • CM - Custom HTTP Method payloads
  • GraphQL - GraphQL testing payloads
  • LDAP - LDAP Injection etc. payloads
  • LFI - Local File Include payloads
  • MFD - multipart/form-data payloads
  • NoSQLi - NoSQL injection payloads
  • OR - Open Redirect payloads
  • RCE - Remote Code Execution payloads
  • RFI - Remote File Inclusion payloads
  • SQLi - SQL injection payloads
  • SSI - Server-Side Includes payloads
  • SSRF - Server-side request forgery payloads
  • SSTI - Server-Side Template Injection payloads
  • UWA - Unwanted Access payloads
  • XSS - Cross-Site Scripting payloads.
Download :
 
  • Like
Reactions: fognayerku

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Tips
Tips

Similar threads

Top Bottom