WAFNinja: attack Web Application Firewalls
WAFNinja
WAFNinja is a CLI tool written in Python. It shall help penetration testers to bypass a WAF by automating steps necessary for bypassing input validation. The tool was created with the objective to be easily extendible, simple to use and usable in a team environment. Many payloads and fuzzing strings, which are stored in a local database file come shipped with the tool. WAFNinja supports HTTP connections, GET and POST requests and the use of Cookies in order to access pages restricted to authenticated users. Also, an intercepting proxy can be set up.
Installation
git clone https://github.com/khalilbijjou/WAFNinja && cd WAFNinja
pip install -r requirements.txt
Usage
wafninja.py [-h] [-v] {fuzz, bypass, insert-fuzz, insert-bypass, set-db} …
EXAMPLE
fuzz:
bypass:
insert-fuzz:
positional arguments: {fuzz, bypass, insert-fuzz, insert-bypass, set-db}
Source: https://github.com/khalilbijjou/