Wafw00F: The Web Application Firewall Fingerprinting Tool

How does wafw00f work?
   To do its magic, WAFW00F does the following steps:
  • Sends a normal HTTP request and analyses the response; this identifies a number of WAF solutions.
  • If that is not successful, wafw00f sends a number of (potentially malicious) HTTP requests and uses simple logic to deduce which WAF it is.
  • If that is also not successful, wafw00f analyses the responses previously returned and uses another simple algorithm to guess if a WAF or security solution is actively responding to wafw00f's attacks.

   For further details, check out the source code on EnableSecurity's main repository.

What does it detect? WAFW00F can detect a number of firewalls, a list of which is as below:

wafw00f's installation
   If you're using Debian-based distro, enter this commands to install wafw00f: sudo apt update && sudo apt install wafw00f

   But if you're using another Linux distro, enter these commands to install wafw00f:

How to use wafw00f?
   The basic usage is to pass an URL as an argument. Example:

Final Words to you
   Questions? Pull up an issue on GitHub Issue Tracker or contact to EnableSecurity.
   Pull requests, ideas and issues are highly welcome. If you wish to see how WAFW00F is being developed, check out the development board.

   Some useful links:

   Presently being developed and maintained by:

More info


  1. Hack Website Online Tool
  2. Hacking Tools Windows 10
  3. Nsa Hack Tools Download
  4. Easy Hack Tools
  5. Pentest Tools Url Fuzzer
  6. Underground Hacker Sites
  7. Hacker Tools Windows
  8. Growth Hacker Tools
  9. Physical Pentest Tools
  10. Pentest Tools Framework
  11. Pentest Tools Port Scanner
  12. Hacker Tools Mac
  13. Hacking Tools 2020
  14. Tools For Hacker
  15. Pentest Tools Framework
  16. Pentest Tools Online
  17. Termux Hacking Tools 2019
  18. Hacking Tools For Beginners
  19. Hackers Toolbox
  20. Ethical Hacker Tools
  21. Hacker Tools Online
  22. Tools For Hacker
  23. Hacking Tools For Mac
  24. Hacker Tools For Mac
  25. Blackhat Hacker Tools