| Command | Purpose |
wafw00f <url> | Basic WAF detection scan |
wafw00f https://example.com | Scan HTTPS site |
wafw00f http://example.com | Scan HTTP site |
wafw00f example.com | Scan domain (auto-detects protocol) |
| Option | Description |
-v | Verbose output |
-a | List all WAFs that were tested |
-r | Follow redirects |
-V | Version information |
-h | Show help message |
-l | List all WAFs that wafw00f can detect |
-p <port> | Use a different port (default: 80/443) |
-t <timeout> | Set timeout (default: 10 seconds) |
| Option | Description |
-H <header> | Add custom header (can be used multiple times) |
-c <cookie> | Add cookie to request |
-A <user-agent> | Set custom user agent |
-m <method> | HTTP method to use (default: GET) |
-d <data> | POST data |
-X <method> | HTTP method (GET, POST, PUT, DELETE, etc.) |
--proxy <proxy> | Use proxy (format: http://host:port) |
| Option | Description |
-f | Test for false positives |
--findall | Find all WAFs (don’t stop at first match) |
--json | Output in JSON format |
--xml | Output in XML format |
--csv | Output in CSV format |
-o <file> | Output to file |
--format <format> | Output format (normal, json, xml, csv) |
wafw00f https://example.com
wafw00f -v https://example.com
wafw00f -l
wafw00f -p 8080 http://example.com
wafw00f -A "Mozilla/5.0" https://example.com
wafw00f -H "X-Forwarded-For: 127.0.0.1" https://example.com
wafw00f -c "session=abc123" https://example.com
wafw00f --proxy http://127.0.0.1:8080 https://example.com
wafw00f -X POST -d "data=test" https://example.com
wafw00f --findall https://example.com
wafw00f -f https://example.com
wafw00f --json https://example.com
wafw00f -o results.txt https://example.com
wafw00f -r https://example.com
wafw00f -v -r -A "Mozilla/5.0" --findall -o results.txt https://example.com
wafw00f -t 30 https://example.com
wafw00f -a https://example.com