wafalyzer alternatives and similar shards
Based on the "Misc" category.
Alternatively, view wafalyzer alternatives based on common mentions on social networks and blogs.
Do you think we are missing an alternative of wafalyzer or a related project?
Wafalyzer is a firewall detection utility, which attempts to determine what WAF (if any) is in the front of a web application. It does that by means of passive analysis of the HTTP response metadata (status, headers, body) and if that fails, issuing additional requests with popular malicious payloads in order to (eventually) trigger WAF's response.
- Add the dependency to your
dependencies: wafalyzer: github: NeuraLegion/wafalyzer
Wafalyzer can be used as both - shard and/or standalone CLI utility.
require "wafalyzer" # See `Wafalyzer::Settings` for all available options. Wafalyzer.configure do |settings| settings.use_random_user_agent = true end # See `Wafalyzer.detect` for all available options. Wafalyzer.detect( url: "https://www.apple.com", method: "POST", ) # => [#<Wafalyzer::Waf::Akamai>]
$ ./bin/wafalyzer -m POST -r https://www.apple.com
All of the flags can be listed by, passing
$ ./bin/wafalyzer --help
You can use
LOG_LEVEL env variable to set the desired
logs severity at runtime.
$ LOG_LEVEL=debug ./bin/wafalyzer https://github.com
Run specs with:
- Fork it (https://github.com/NeuraLegion/wafalyzer/fork)
- Create your feature branch (
git checkout -b my-new-feature)
- Commit your changes (
git commit -am 'Add some feature')
- Push to the branch (
git push origin my-new-feature)
- Create a new Pull Request
- Sijawusz Pur Rahnama - creator and maintainer
*Note that all licence references and agreements mentioned in the wafalyzer README section above are relevant to that project's source code only.