summaryrefslogtreecommitdiff
path: root/pwn/packages/wafw00f.scm
diff options
context:
space:
mode:
Diffstat (limited to 'pwn/packages/wafw00f.scm')
-rw-r--r--pwn/packages/wafw00f.scm32
1 files changed, 32 insertions, 0 deletions
diff --git a/pwn/packages/wafw00f.scm b/pwn/packages/wafw00f.scm
new file mode 100644
index 0000000..12cc0d4
--- /dev/null
+++ b/pwn/packages/wafw00f.scm
@@ -0,0 +1,32 @@
+(define-module (gnu packages impacket)
+ #:use-module (guix packages)
+ #:use-module (guix download)
+ #:use-module (guix build-system python)
+ #:use-module (gnu packages python-xyz)
+ #:use-module (gnu packages python-web)
+ #:use-module (guix licenses))
+
+(define-public wafw00f
+ (package
+ (name "wafw00f")
+ (version "2.3.2")
+ (source (origin
+ (method url-fetch)
+ (uri (string-append "https://github.com/EnableSecurity/wafw00f/archive/refs/tags/v" version ".tar.gz"))
+ (sha256
+ (base32
+ "0ya4fha5nv8zim4qpax7zbk48l29d6ksdq26j492sqzhqssq99z4"))))
+ (build-system python-build-system)
+ (arguments
+ (list #:tests? #f))
+ (propagated-inputs (list
+ python-requests
+ python-pluginbase))
+ (synopsis "WAF fingerprinting tool")
+ (description "To do its magic, WAFW00F does the following:
+ Sends a normal HTTP request and analyses the response; this identifies a number of WAF solutions.
+ If that is not successful, it sends a number of (potentially malicious) HTTP requests and uses simple logic to deduce which WAF it is.
+ If that is also not successful, it analyses the responses previously returned and uses another simple algorithm to guess if a WAF or security solution is actively responding to our attacks.")
+ (home-page "https://github.com/EnableSecurity/wafw00f")
+ (license bsd-3)))
+wafw00f