From ae78645ec48c9e6b522bc54eb15fc5ca849c36cd Mon Sep 17 00:00:00 2001 From: "c0co.channel" Date: Mon, 22 Sep 2025 22:46:01 +0100 Subject: Add scrapy and wafw00f --- pwn/packages/wafw00f.scm | 32 ++++++++++++++++++++++++++++++++ 1 file changed, 32 insertions(+) create mode 100644 pwn/packages/wafw00f.scm (limited to 'pwn/packages/wafw00f.scm') diff --git a/pwn/packages/wafw00f.scm b/pwn/packages/wafw00f.scm new file mode 100644 index 0000000..12cc0d4 --- /dev/null +++ b/pwn/packages/wafw00f.scm @@ -0,0 +1,32 @@ +(define-module (gnu packages impacket) + #:use-module (guix packages) + #:use-module (guix download) + #:use-module (guix build-system python) + #:use-module (gnu packages python-xyz) + #:use-module (gnu packages python-web) + #:use-module (guix licenses)) + +(define-public wafw00f + (package + (name "wafw00f") + (version "2.3.2") + (source (origin + (method url-fetch) + (uri (string-append "https://github.com/EnableSecurity/wafw00f/archive/refs/tags/v" version ".tar.gz")) + (sha256 + (base32 + "0ya4fha5nv8zim4qpax7zbk48l29d6ksdq26j492sqzhqssq99z4")))) + (build-system python-build-system) + (arguments + (list #:tests? #f)) + (propagated-inputs (list + python-requests + python-pluginbase)) + (synopsis "WAF fingerprinting tool") + (description "To do its magic, WAFW00F does the following: + Sends a normal HTTP request and analyses the response; this identifies a number of WAF solutions. + If that is not successful, it sends a number of (potentially malicious) HTTP requests and uses simple logic to deduce which WAF it is. + If that is also not successful, it analyses the responses previously returned and uses another simple algorithm to guess if a WAF or security solution is actively responding to our attacks.") + (home-page "https://github.com/EnableSecurity/wafw00f") + (license bsd-3))) +wafw00f -- cgit v1.2.3