We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
In most cases, when processing wafw00f results, you want to see the requests that WAF triggers.
Adding the request that triggered the WAF to the output json file is implemented in this PR - vulnspace#1
Example of json output file: [ {"url": "Target", "detected": true, "evil_url": "Target/?a=%3Cscript%3Ealert%28%22XSS%22%29%3B%3C%2Fscript%3E&b=UNION+SELECT+ALL+FROM+information_schema+AND+%27+or+SLEEP%285%29+or+%27&c=..%2F..%2F..%2F..%2Fetc%2Fpasswd", "firewall": "Cloudflare", "manufacturer": "Cloudflare Inc." } ]
The text was updated successfully, but these errors were encountered:
sandrogauci
0xInfection
Successfully merging a pull request may close this issue.
In most cases, when processing wafw00f results, you want to see the requests that WAF triggers.
Adding the request that triggered the WAF to the output json file is implemented in this PR - vulnspace#1
Example of json output file:
[
{"url": "Target",
"detected": true,
"evil_url": "Target/?a=%3Cscript%3Ealert%28%22XSS%22%29%3B%3C%2Fscript%3E&b=UNION+SELECT+ALL+FROM+information_schema+AND+%27+or+SLEEP%285%29+or+%27&c=..%2F..%2F..%2F..%2Fetc%2Fpasswd",
"firewall": "Cloudflare",
"manufacturer": "Cloudflare Inc." }
]
The text was updated successfully, but these errors were encountered: