File | Date | Author | Commit |
---|---|---|---|
data | 2024-11-11 |
![]() |
[26c326] v5.2.1 |
demo | 2024-09-27 |
![]() |
[fd4eb8] ssti |
extras | 2024-10-02 |
![]() |
[431a49] v2.4.1 |
lib | 2024-11-13 |
![]() |
[2b7b58] v5.3.1 |
session | 2024-09-20 |
![]() |
[6f8d2d] final |
LICENSE | 2024-10-22 |
![]() |
[4dd05e] Updated to version 4.8.7 |
README.md | 2024-11-13 |
![]() |
[2b7b58] v5.3.1 |
VERSION | 2024-11-13 |
![]() |
[4ddf03] v5.3.1 |
setup.py | 2024-11-13 |
![]() |
[4ddf03] v5.3.1 |
waymap.py | 2024-11-13 |
![]() |
[4ddf03] v5.3.1 |
Current Version: 5.2.1
Author: Trix Cyrus
Copyright: © 2024 Trixsec Org
Maintained: Yes
Waymap is a fast and optimized And Automated web vulnerability scanner designed for penetration testers. It effectively identifies vulnerabilities by testing against a variety of payloads.
Check out this video to see Waymap in action:
SQL Injection
Command Injection
Server Side Template Injection
Can't add more screenshot it'll increase the size of readme.md
Critical and High-Risk Scan Profiles using CVE exploits (32 CVEs: WordPress - 19, Drupal - 4, Joomla - 7, Generic/Others - 2)
Web Crawling:
Improved v3 crawler (competitive with SQLmap crawler)
Concurrency & Threading:
New argument --threads/-T
for global threading count (no prompt for threads)
Multi-Target Scanning:
--multi-target {targetfilename}.txt
Ability to scan URLs directly without crawling using --url/-u
and --multi-url/-mu
arguments
Automation and Convenience:
--check-updates
to check for and perform updates--random-agent
to randomize user-agentsArgument --no-prompt/-np
to disable prompts (default input = 'n')
Scan Profiles & Severity-Based Scanning:
--scan critical-risk
and --scan high-risk
) using severity-based CVE exploitsArgument --profile critical-risk/high-risk
with --profileurl
for streamlined scanning based on CVE severity
Logging and Stability:
git clone https://github.com/TrixSec/waymap.git
pip install .
python waymap.py --crawl 1 --scan sql/cmdi/ssti/xss/lfi/open-redirect/crlf/cors/all --target/--multi-target https://example.com/{filename}.txt
python waymap.py --scan sql/cmdi/ssti/xss/lfi/open-redirect/crlf/cors/all --url/--mutli-url https://example.com/index.php?id=1/{filename}.txt
python waymap.py -h
Stay updated with the latest tools and hacking resources. Join our Telegram Channel by clicking the logo below: