wafalyzer alternatives and similar shards
Based on the "Misc" category.
Alternatively, view wafalyzer alternatives based on common mentions on social networks and blogs.
-
sentry
Build/Runs your crystal application, watches files, and rebuilds/restarts app on file changes -
immutable
Thread-safe, persistent, immutable collections for the Crystal language -
crystagiri
An Html parser library for Crystal (like Nokogiri for Ruby) -
crz
Functional programming library for https://github.com/crystal-lang/crystal -
crystal-web-framework-stars
โญ๏ธ Web frameworks for Crystal, most starred on Github -
cron_scheduler
Simple job scheduler with crontab patterns for Crystal Language. -
crystal-futures
Future type implementation for Crystal language -
inflector.cr
Inflector shard for Crystal. A port of ActiveSupport::Inflector -
aasm.cr
:arrows_clockwise: Easy to use finite state machine for Crystal classes -
kreal
Kreal is a model sharing & RPC library built on and works with Kemal seamlessly. -
retriable.cr
Retriable.cr is a simple DSL to retry failed code blocks -
ulid
Universally Unique Lexicographically Sortable Identifier (ULID) in Crystal -
CrSerializer
Extensible annotation based serialization/deserialization library -
circuit_breaker
Implementation of the circuit breaker pattern in crystal -
burocracia.cr
No dependency Crystal shard to validate, generate and format Brazilian burocracias such as CPF, CNPJ and CEP -
wikicr
Wiki in crystal, using Markdown and Git, inspired by dokuwiki. Last features to build are pretty hard, if you have some time to help... :) -
m3u8
Generate and parse m3u8 playlists for HTTP Live Streaming (HLS) in Crystal. -
message_verifier.cr
Rails compatible MessageVerifier for Crystal-lang apps
Build time-series-based applications quickly and at scale.
Do you think we are missing an alternative of wafalyzer or a related project?
README
wafalyzer

Wafalyzer is a firewall detection utility, which attempts to determine what WAF (if any) is in the front of a web application. It does that by means of passive analysis of the HTTP response metadata (status, headers, body) and if that fails, issuing additional requests with popular malicious payloads in order to (eventually) trigger WAF's response.
Installation
Shard
- Add the dependency to your
shard.yml
:
dependencies:
wafalyzer:
github: NeuraLegion/wafalyzer
- Run
shards install
CLI
- Run
shards build
- ๐
Usage
Wafalyzer can be used as both - shard and/or standalone CLI utility.
Shard
require "wafalyzer"
# See `Wafalyzer::Settings` for all available options.
Wafalyzer.configure do |settings|
settings.use_random_user_agent = true
end
# See `Wafalyzer.detect` for all available options.
Wafalyzer.detect(
url: "https://www.apple.com",
method: "POST",
)
# => [#<Wafalyzer::Waf::Akamai>]
CLI
$ ./bin/wafalyzer -m POST -r https://www.apple.com
All of the flags can be listed by, passing --help
.
$ ./bin/wafalyzer --help
You can use LOG_LEVEL
env variable to set the desired
logs severity at runtime.
$ LOG_LEVEL=debug ./bin/wafalyzer https://github.com
Development
Run specs with:
crystal spec
Contributing
- Fork it (https://github.com/NeuraLegion/wafalyzer/fork)
- Create your feature branch (
git checkout -b my-new-feature
) - Commit your changes (
git commit -am 'Add some feature'
) - Push to the branch (
git push origin my-new-feature
) - Create a new Pull Request
Contributors
- Sijawusz Pur Rahnama - creator and maintainer
*Note that all licence references and agreements mentioned in the wafalyzer README section above
are relevant to that project's source code only.