Detect and bypass web application firewalls and protection systems
β2,893Aug 11, 2024Updated last year
Alternatives and similar repositories for WhatWaf
Users that are interested in WhatWaf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- WAFW00F allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.β6,324Apr 19, 2026Updated 2 weeks ago
- Everything about Web Application Firewalls (WAFs) from Security Standpoint! π₯β7,458Mar 26, 2026Updated last month
- Automatic SSRF fuzzer and exploitation toolβ3,534Sep 4, 2025Updated 8 months ago
- A Tool for Domain Flyoversβ5,930May 22, 2022Updated 3 years ago
- Most advanced XSS scanner.β14,935Apr 26, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Automatic bypass (brute force) wafβ991Mar 9, 2022Updated 4 years ago
- HTTP parameter discovery suite.β6,216Feb 20, 2025Updated last year
- A python script that finds endpoints in JavaScript filesβ4,335Apr 13, 2024Updated 2 years ago
- SSRF (Server Side Request Forgery) testing resourcesβ2,493Oct 12, 2024Updated last year
- WAFNinja is a tool which contains two functions to attack Web Application Firewalls.β825Dec 6, 2017Updated 8 years ago
- Next generation web scannerβ6,562Apr 2, 2026Updated last month
- CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 180 other CMSsβ2,534Apr 9, 2024Updated 2 years ago
- Web application fuzzerβ6,479Jan 21, 2026Updated 3 months ago
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Toolβ2,515Jan 21, 2020Updated 6 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer β’ AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Web path scannerβ14,238Apr 29, 2026Updated last week
- Advanced reconnaissance utilityβ993Nov 20, 2023Updated 2 years ago
- Server-Side Template Injection and Code Injection Detection and Exploitation Toolβ4,152Apr 21, 2024Updated 2 years ago
- Firewall bypass script based on DNS history records. This script will search for DNS A history records and check if the server replies foβ¦β1,277Sep 5, 2022Updated 3 years ago
- In-depth attack surface mapping and asset discoveryβ14,484Apr 17, 2026Updated 2 weeks ago
- Attack Surface Management Platformβ9,727Apr 29, 2026Updated last week
- Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.β1,743Dec 1, 2024Updated last year
- This tool can be used to brute discover GET and POST parametersβ1,394Aug 24, 2019Updated 6 years ago
- Fast passive subdomain enumeration tool.β13,541Apr 29, 2026Updated last week
- Proton VPN Special Offer - Get 70% off β’ AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies andβ¦β3,929Sep 27, 2021Updated 4 years ago
- A swiss army knife for pentesting networksβ9,126Dec 6, 2023Updated 2 years ago
- File upload vulnerability scanner and exploitation tool.β3,317May 8, 2025Updated 11 months ago
- A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration)β3,581Apr 15, 2026Updated 3 weeks ago
- Automated NoSQL database enumeration and web application exploitation tool.β3,277Feb 20, 2026Updated 2 months ago
- ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting.β2,274Jan 8, 2026Updated 3 months ago
- A powerful browser crawler for web vulnerability scannersβ3,031Mar 11, 2025Updated last year
- A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, alβ¦β1,291Aug 18, 2025Updated 8 months ago
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scannerβ1,932Apr 13, 2022Updated 4 years ago
- Proton VPN Special Offer - Get 70% off β’ AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Sublert is a security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed bβ¦β1,031Feb 5, 2021Updated 5 years ago
- This tool generates gopher link for exploiting SSRF and gaining RCE in various serversβ3,351Apr 18, 2023Updated 3 years ago
- A fast port scanner written in go with a focus on reliability and simplicity. Designed to be used in combination with other tools for attβ¦β5,917Updated this week
- Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the acβ¦β1,799Apr 26, 2024Updated 2 years ago
- Knock Subdomain Scanβ4,161Feb 19, 2026Updated 2 months ago
- Awesome XSS stuffβ5,105Oct 30, 2024Updated last year
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.β8,864Dec 4, 2025Updated 5 months ago