Skip to content

daturadev/waffle

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

20 Commits
 
 
 
 
 
 
 
 

Repository files navigation

WAFFLE [ # ]

Automated Web Application Firewall (WAF) Bypass Testing Suite



Description:

An automated Python script intended to test a host of bypass methods against a WAF-filtered URL.

Payloads are optional, and can be used as an argument and included in testing requests.

Bypass methods include - but are not limited to:

  • A variety of HTTP header manipulation techniques
  • Localhost Spoofing
  • URL manipulation
  • Obfuscation techniques



Compatibility:

All operating systems capable of processing:

  • Python 3.9



Credits:
  • Developers:

vipa @ Datura Data

  • Contributors:

[ NULL as of now ]




Module Requirements:
sys
argparse
time
os
requests
itertools
threading


Links:



Images:


Datura Logo


WAFFLE.py



Usage:

As of v0.1, there are two (REQUIRED) arguments that must be passed while running the 'WAFFLE.py' script.


Argument Example Usage
URL --url Target URL
Payload --payload Malicious code to be tested

Example:


$ python3 WAFFLE.py --url <url> --payload <SQLi/XSS/RCE/LFI/... Payload>




To-Do:


TO-DO:

Function Progress
Multi-threading IN-PROCESS
LFI manipulation IN-PROCESS
Header manipulation IN-PROCESS
Input tampering
RFI manipulation
Neat & Tidy, Efficient code



🍆🤝 Support 🤝🍆

**

If you found this project useful - please drop a like, watch, contribute, suggest, and donate! 🍄

Give a ⭐️... If you know what's good for you!

About

Automated Web-Application Firewall(WAF)-Bypass Suite

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages