whatwaf 1.3.2

Heuristic web application firewall (WAF) detector.
whatwaf-1.3.2 is not a library.
Visit the last successful build: whatwaf-1.9.0

whatwaf

Heuristic web application firewall (WAF) detector.

whatwaf sends a series of crafted HTTP probe requests to a target site and analyzes the responses for indicators of WAF blocking behavior.

It detects common commercial and open-source firewalls by matching characteristic response headers, patterns, and bodies.

How It Works

whatwaf performs multiple probes, such as SQL injection, XSS, and local file inclusion (LFI) payloads, and compares the target's HTTP responses against known WAF fingerprints.

Detection is based on:

  • HTTP status codes
  • Response headers containing WAF vendor signatures
  • Response bodies containing diagnostic strings or challenge pages
  • Regular-expression matching for vendor-specific phrases

Installation

Install via Cargo:

cargo install whatwaf

Usage

whatwaf https://example.com

Example

[*] checking https://example.com
[*] running 4 probes
[*] plain request probe: payload=None
        [-] no detection
[*] xss probe: payload='<script>alert(1)</script>'
        [+] waf=cloudflare status=403
[~] the site https://example.com is behind Cloudflare waf

Detections

WAF Vendor Country of Origin
ArvanCloud Abr Arvan 🇮🇷
Astra Astra Security 🇮🇳
ASPA Aspa Engineering Co. 🇮🇷
Barracuda Barracuda Networks, Inc. 🇺🇸
Cloudflare WAF Cloudflare, Inc. 🇺🇸
Cloudfront WAF Amazon Web Services 🇺🇸
Datadome Datadome 🇫🇷
DotDefender Applicure Technologies 🇮🇱
Incapsula Imperva, Inc. 🇺🇸
Janusec Application Gateway JANUSEC 🇺🇳*
Kona Site Defender Akamai Technologies 🇺🇸
NexusGuard NexusGuard Inc. 🇸🇬
Sucuri Sucuri, Inc 🇺🇸

*Country of Origin is not clearly documented.