| File | Date | Author | Commit |
|---|---|---|---|
| data | 2024-11-11 |
|
[26c326] v5.2.1 |
| demo | 2024-09-27 |
|
[fd4eb8] ssti |
| extras | 2024-10-02 |
|
[431a49] v2.4.1 |
| lib | 2024-11-13 |
|
[2b7b58] v5.3.1 |
| session | 2024-09-20 |
|
[6f8d2d] final |
| LICENSE | 2024-10-22 |
|
[4dd05e] Updated to version 4.8.7 |
| README.md | 2024-11-13 |
|
[2b7b58] v5.3.1 |
| VERSION | 2024-11-13 |
|
[4ddf03] v5.3.1 |
| setup.py | 2024-11-13 |
|
[4ddf03] v5.3.1 |
| waymap.py | 2024-11-13 |
|
[4ddf03] v5.3.1 |
Current Version: 5.2.1
Author: Trix Cyrus
Copyright: © 2024 Trixsec Org
Maintained: Yes
Waymap is a fast and optimized And Automated web vulnerability scanner designed for penetration testers. It effectively identifies vulnerabilities by testing against a variety of payloads.
Check out this video to see Waymap in action:
SQL Injection

Command Injection

Server Side Template Injection

Can't add more screenshot it'll increase the size of readme.md
Critical and High-Risk Scan Profiles using CVE exploits (32 CVEs: WordPress - 19, Drupal - 4, Joomla - 7, Generic/Others - 2)
Web Crawling:
Improved v3 crawler (competitive with SQLmap crawler)
Concurrency & Threading:
New argument --threads/-T for global threading count (no prompt for threads)
Multi-Target Scanning:
--multi-target {targetfilename}.txtAbility to scan URLs directly without crawling using --url/-u and --multi-url/-mu arguments
Automation and Convenience:
--check-updates to check for and perform updates--random-agent to randomize user-agentsArgument --no-prompt/-np to disable prompts (default input = 'n')
Scan Profiles & Severity-Based Scanning:
--scan critical-risk and --scan high-risk) using severity-based CVE exploitsArgument --profile critical-risk/high-risk with --profileurl for streamlined scanning based on CVE severity
Logging and Stability:
git clone https://github.com/TrixSec/waymap.git
pip install .
python waymap.py --crawl 1 --scan sql/cmdi/ssti/xss/lfi/open-redirect/crlf/cors/all --target/--multi-target https://example.com/{filename}.txt
python waymap.py --scan sql/cmdi/ssti/xss/lfi/open-redirect/crlf/cors/all --url/--mutli-url https://example.com/index.php?id=1/{filename}.txt
python waymap.py -h
Stay updated with the latest tools and hacking resources. Join our Telegram Channel by clicking the logo below: