Home

Awesome

WAF Bypass Tool

WAF Bypass Tool is an open source tool to analyze the security of any WAF for False Positives and False Negatives using predefined and customizable payloads. Check your WAF before an attacker does. WAF Bypass Tool is developed by Nemesida WAF team with the participation of community.

WAF Bypass Tool

Do not do anything illegal

It is forbidden to use for illegal and illegal purposes. Don't break the law. We are not responsible for possible risks associated with the use of this software.

How to run

Run using Docker

The latest waf-bypass always available via the Docker Hub. It can be easily pulled via the following command:

<pre> # docker pull nemesida/waf-bypass # docker run nemesida/waf-bypass --host='example.com' </pre>

Run using pipx

<pre> # pipx install git+https://github.com/nemesida-waf/waf-bypass.git # &ltpipx bin dir&gt/waf-bypass </pre>

Run directly from source code using CLI

<pre> # git clone https://github.com/nemesida-waf/waf_bypass.git /opt/waf-bypass/ # python3 -m pip install -r /opt/waf-bypass/requirements.txt # python3 /opt/waf-bypass/main.py --host='example.com' </pre>

Options

JSON format

JSON output specification example:

<pre> { "TARGET": "https://example.com", // defined by --host option "PROXY": {}, // defined by --proxy option "HEADERS": { // defined by --header option "User-Agent": "" }, "BLOCK-CODE": [ // defined by --block-code option ... ], "THREADS": 50, // defined by --threads option "TIMEOUT": 30, // defined by --timeout option "EXCLUDE-DIR": [ // defined by --exclude-dir option ... ], "FAILED": { // requests with failed processing status "MFD/7.json": { "BODY": "WBHTTPSConnectionPool(host='example.com', port=443): Read timed out. (read timeout=1)" }, ... }, "PASSED": { // passed requests "UWA/3.json": { "URL": "403 RESPONSE CODE" }, ... }, "FALSED": { // requests with false positive processing status ... }, "BYPASSED": { // requests with false negative processing status "UWA/26.json": { "URL": "200 RESPONSE CODE" }, ... }, "TestRequest": { // test requests with processing status, exclude passed "FAILED": {}, "FALSED": { "UWA/3.json": { "URL": "403 RESPONSE CODE" }, ... } }, "CURL": { // cURL command to reproduce false positive and false negative requests "FALSED": {}, "BYPASSED": { "UWA/26.json": { "URL": "curl -X GET -H 'Accept: */*' -H 'Accept-Encoding: gzip, deflate' -H 'Connection: keep-alive' -H 'User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36' 'https://example.com/do.php#.png'" }, ... } } } </pre>

Payloads

Depending on the purpose, payloads are located in the appropriate folders:

Write your own payloads

When compiling a payload, the following zones, method and options are used:

Except for some cases described below, the zones are independent of each other and are tested separately (those if 2 zones are specified - the script will send 2 requests - alternately checking one and the second zone).

For the zones you can use <code>%RND%</code> suffix, which allows you to generate an arbitrary string of 6 letters and numbers. (e.g.: <code>param%RND=my_payload</code> or <code>param=%RND%</code> OR <code>A%RND%B</code>)

You can create your own payloads, to do this, create your own folder on the '/payload/' folder, or place the payload in an existing one (e.g.: '/payload/XSS'). Allowed data format is JSON.

API directory

API testing payloads located in this directory are automatically appended with a header <code>'Content-Type: application/json'</code>.

MFD directory

For MFD (multipart/form-data) payloads located in this directory, you must specify the <code>BODY</code> (required) and <code>BOUNDARY</code> (optional). If <code>BOUNDARY</code> is not set, it will be generated automatically (in this case, only the payload must be specified for the </code>BODY</code>, without additional data (<code>'... Content-Disposition: form-data; ...'</code>).

If a <code>BOUNDARY</code> is specified, then the content of the <code>BODY</code> must be formatted in accordance with the RFC, but this allows for multiple payloads in <code>BODY</code> a separated by <code>BOUNDARY</code>.

Other zones are allowed in this directory (e.g.: <code>URL</code>, <code>ARGS</code> etc.). Regardless of the zone, header <code>'Content-Type: multipart/form-data; boundary=...'</code> will be added to all requests.