Menu

Tree [91129f] main /
 History

HTTPS access


File Date Author Commit
 scripts 2026-03-07 Letmehackyou011 Letmehackyou011 [b4b084] first commit
 src 2026-03-07 Letmehackyou011 Letmehackyou011 [b4b084] first commit
 .gitignore 2026-03-07 Letmehackyou011 Letmehackyou011 [b4b084] first commit
 CREDITS.md 2026-03-07 Letmehackyou011 Letmehackyou011 [b4b084] first commit
 LICENSE 2026-03-07 Letmehackyou011 Letmehackyou011 [b4b084] first commit
 README.md 2026-03-07 Dipesh Fuse Dipesh Fuse [91129f] Update clone command with correct repository URL
 pyproject.toml 2026-03-07 Letmehackyou011 Letmehackyou011 [b4b084] first commit
 requirements.txt 2026-03-07 Letmehackyou011 Letmehackyou011 [b4b084] first commit

Read Me

wafw00f GUI (Windows + Linux)

Desktop GUI wrapper for wafw00f, built in Python.

This app runs the original wafw00f scanner under the hood and displays results in a desktop interface.

Maintainer

  • GitHub maintainer: Letmehackyou011

Original wafw00f developers

Features

  • Cross-platform GUI (Windows + Linux)
  • Live scan output + scan history
  • Common options (-a, -v, -r) and extra CLI args
  • Export output to TXT and JSON
  • First-launch Terms & Conditions + legal disclaimer acceptance

Tool Information

  • Tool name: wafw00f GUI
  • Type: Desktop GUI wrapper for web application firewall fingerprinting
  • Core engine: Official wafw00f scanner (upstream project)
  • Primary purpose: Detect and fingerprint WAF technologies protecting a target website
  • Request model: Uses HTTP/HTTPS request/response behavior through wafw00f logic
  • Supported OS: Windows and Linux
  • Runtime: Python 3.10+
  • Packaging: PyInstaller standalone binaries (.exe on Windows, native binary on Linux)

How it works (high level)

  1. You provide a target URL.
  2. The GUI launches wafw00f with selected options.
  3. Scanner output is streamed live into the app.
  4. Detection summary and request count are extracted and shown.
  5. Results can be exported to TXT or JSON.

Data and privacy behavior

  • The app does not require user login or cloud account.
  • Scan history is kept in local app memory for the current session.
  • Exported files are saved only to paths you choose.
  • Application logs are stored locally for troubleshooting.

Current scope and limitations

  • Detection capability depends on upstream wafw00f signatures and logic.
  • This tool does not bypass WAFs; it fingerprints likely protection layers.
  • Accuracy can vary based on target behavior, CDN layers, and blocking policies.
  • Use only on systems you are authorized to test.

Complete Installation Guide

1) Prerequisites

  • Python 3.10+ installed
  • pip available
  • Internet access for target scanning
  • Windows: PowerShell
  • Linux: Bash + Tkinter support (usually included with system Python)

Check Python version:

python --version

or on Linux if needed:

python3 --version

2) Get the source code

git clone https://github.com/Letmehackyou011/wafw00f-GUI
cd wafw00f

If you already have the folder, just open terminal in the project root.

3) Install dependencies

Windows (PowerShell)

python -m pip install --upgrade pip
python -m pip install -r requirements.txt
python -m pip install -e .

Linux (Bash)

python3 -m pip install --upgrade pip
python3 -m pip install -r requirements.txt
python3 -m pip install -e .

4) Run the app from source

.\scripts\run.ps1
chmod +x scripts/*.sh
./scripts/run.sh

Manual run

python -m wafw00f_gui.main

or:

wafw00f-gui

5) First launch behavior

  • You must accept Terms & Conditions and the legal disclaimer before scanning.
  • This acceptance is required to use the app.

Build Standalone Executable

Windows .exe

.\scripts\build.ps1

Generated output:

  • dist/wafw00f-gui.exe
  • dist/LICENSE.txt
  • dist/CREDITS.md
  • dist/README.md

Linux binary

./scripts/build.sh

Generated output:

  • dist/wafw00f-gui
  • dist/LICENSE.txt
  • dist/CREDITS.md
  • dist/README.md

How to use after install

  1. Start the app.
  2. Enter target URL (example: https://example.org).
  3. Select optional flags (-a, -v, -r) if needed.
  4. Click Run Scan.
  5. Watch live output panel for results.

Troubleshooting

No module named wafw00f

Run:

python -m pip install wafw00f

Then rerun the app.

GUI opens but scan fails

  • Verify target URL starts with http:// or https://
  • Check internet connectivity
  • Check app logs (status bar shows log path)

Linux Tkinter missing

Install Tk package for your distro, then retry.

PowerShell script blocked (Windows)

Run PowerShell as current user with a relaxed execution policy:

Set-ExecutionPolicy -Scope CurrentUser RemoteSigned

  • This GUI does not reimplement wafw00f detection logic; it calls the official package.
  • Use only on targets you are explicitly authorized to test.
  • Misuse may be illegal in your jurisdiction.

License

This project uses the same license as wafw00f: BSD-3-Clause.

MongoDB Logo MongoDB