Sinisterly
WAFPASS - Analysing parameters with all payloads' bypass methods - Printable Version

+- Sinisterly (https://sinister.ly)
+-- Forum: Hacking (https://sinister.ly/Forum-Hacking)
+--- Forum: Hacking Tools (https://sinister.ly/Forum-Hacking-Tools)
+--- Thread: WAFPASS - Analysing parameters with all payloads' bypass methods (/Thread-WAFPASS-Analysing-parameters-with-all-payloads-bypass-methods)



WAFPASS - Analysing parameters with all payloads' bypass methods - ZanGetsu - 09-29-2017

[Image: 4de3f5a0e5.png]

WAFPASS Analysing parameters with all payloads' bypass methods, aiming at benchmarking security solutions like WAF.

Today a great number of website owners around the globe use “Web Application Firewalls” to improve their security. However, these security applications suffer from many deficits such as poor performance, lack of updates, and so forth. Thus, they are hindered from working effectively against everyday attacks that are equipped with cutting edge technological innovations. This vulnerability can cause various issues and even lead to security failures.

WAFPASS’s ultimate goal is to present a solution for promoting security systems like WAF in addition to providing a general overview of the security solutions.

WAFPASS supports HTTP,HTTPS connections, GET and POST requests and the use of Cookies in order to access pages restricted to authenticated users. Also, an intercepting proxy can be set up.

Supported Platforms:
  • Linux
  • Mac OS X
  • Windows

Code:
Usage: python3 wapfass.py -h

[Image: 8b49ce1f3f.png]