Skip to content

CLI & GUI tool, it is WAF/CDN fingerprinting and bypass validation tool for pentesting across cloud providers. It detects 17+ WAFs and 12+ CDNs, runs 35+ bypass/evasion techniques with baseline heuristics (status, size, hashes), and outputs Markdown reports.

License

Notifications You must be signed in to change notification settings

K0NGR3SS/WAFPierce

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

38 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

WAFPierce

CloudFront WAF Bypass & Penetration Testing Tool

Version Python License

promotion image

What is WAFPierce?

WAFPierce is a WAF/CDN assessment and bypass validation tool for penetration testing and security research. It fingerprints 17+ WAF vendors and 12+ CDN providers, then tests 100+ bypass/evasion techniques using baseline + heuristic comparisons (status codes, response size, hashes) to confirm real bypasses—even when defenses return OK. It also supports rate-limit detection, API endpoint and directory discovery, protocol-level testing (request smuggling, HTTP/2 downgrade, WebSocket tunneling), comprehensive injection testing (SQLi, XSS, SSRF, NoSQL, LDAP, XXE, SSTI, Log4Shell), cloud-specific tests, a clean GUI, optimized parallel performance, and automated Markdown reporting.

Key Features:

  • WAF Detection & Fingerprinting - Identifies 17+ WAF vendors (Cloudflare, AWS WAF, Akamai, Imperva, F5, Sucuri, ModSecurity, and more)
  • CDN Detection - Detects 12+ CDN providers (CloudFront, Akamai, Fastly, Cloudflare, etc.)
  • WAF Bypass Detection - Tests 100+ different bypass techniques
  • Smart WAF Bypass - Uses baseline comparison and heuristic analysis (size, hash, status codes) to detect bypasses even when WAFs return 200 OK
  • Payload Evasion Testing - SQLi, XSS, Command Injection, Path Traversal, SSRF bypass payloads
  • Advanced Injection Testing - NoSQL, LDAP, SSTI, XXE, CRLF, Prototype Pollution, Deserialization, Log4Shell
  • Protocol-Level Attacks - HTTP Request Smuggling, HTTP/2 Downgrade, H2C Smuggling, WebSocket CSWSH, HTTP Desync
  • Security Misconfiguration - CORS, Open Redirect, Security Headers, Cookie Security, Clickjacking
  • Cloud Security Testing - AWS S3, Azure Blob, GCP Buckets, Kubernetes API, Serverless Functions
  • Information Disclosure - Git/SVN/Env files, Backups, Debug endpoints, Sensitive configs, API Key Exposure
  • Business Logic Testing - IDOR, Mass Assignment, Race Conditions, File Upload Bypass, Integer Overflow
  • Advanced Attacks - JWT Exploitation, GraphQL Attacks, Web Cache Deception, DNS Rebinding, CSS/XSLT Injection
  • Rate Limit Detection - Identifies request thresholds and rate limiting behavior
  • API Endpoint Discovery - Finds unprotected API routes and debug endpoints
  • Subdomain Takeover Detection - Identifies vulnerable subdomains across 25+ services
  • Automated Reporting - Generates detailed markdown reports
  • GUI system - Clean and efficient GUI system made for the users comfort
  • Optimized Performance - Connection pooling, response caching, and parallel batch testing

Changelog

Version 1.3 (February 2025)

New Dangerous Attack Vectors (30+ New Tests)

Advanced Protocol Attacks:

  • GraphQL Deep Testing - Introspection attacks, batching DoS, depth limit bypass, alias-based DoS, circular fragments
  • JWT Attack Suite - Algorithm confusion (none/None/NONE), KID injection (SQLi, traversal, RCE), JKU/X5U SSRF, weak secret detection
  • Web Cache Deception - Static extension tricks (.css, .js), cache key poisoning via unkeyed headers
  • Log4Shell Detection - ${jndi:ldap://} patterns with 12+ obfuscation bypasses (nested lookups, env variables)
  • SSRF Protocol Smuggling - gopher://, dict://, file://, ldap://, php://, jar://, netdoc:// handlers

Extended Security Tests:

  • Host Header Attacks - Password reset poisoning, routing bypass, X-Forwarded-Host injection
  • SSI Injection - Server-Side Includes (exec cmd, include file, printenv)
  • API Key/Secret Exposure - 35+ patterns (AWS, GitHub, Stripe, Slack, Google, Firebase, etc.)
  • DNS Zone Transfer - AXFR enumeration attempts
  • Extended Verb Tampering - TRACE/TRACK (XST), DEBUG, WebDAV methods, custom methods
  • Range Header Attacks - Overlapping ranges, many ranges DoS, invalid ranges
  • Multipart Boundary Bypass - Long boundaries, special chars, quoted, CRLF variations

Advanced Discovery:

  • DNS Rebinding - Bypass IP-based SSRF protections via rebinding domains
  • Timing-Based Discovery - Blind resource discovery via response timing anomalies
  • Error-Based Disclosure - Force verbose errors (type confusion, format strings, encoding)
  • Path Normalization Extended - 30+ variations (dots, slashes, encoding, null bytes, semicolons, unicode)
  • Content Sniffing - Polyglot file uploads (GIFAR, PDF+HTML, SVG+XSS)
  • Buffer/Size Limits - Large URL, headers, POST body testing

Dangerous Attack Vectors:

  • HTTP Desync - Advanced request smuggling (CL.CL, space in header, tab, vertical tab, obs-fold)
  • Dangling Markup - Data exfiltration via unclosed HTML tags
  • CSS Injection - Attribute selector exfiltration, @import, @font-face
  • XSLT Injection - Code execution via document(), system-property(), php:function()
  • PDF Injection - SSRF/LFI via PDF generators (wkhtmltopdf, PhantomJS)
  • PostMessage Vulnerabilities - Insecure origin validation detection
  • RPO (Relative Path Overwrite) - XSS via CSS injection with relative paths
  • Integer Overflow - 32/64-bit boundary testing, signed/unsigned issues

New Security Tests (35+ New Tests)

  • CORS Misconfiguration - Tests for overly permissive CORS policies, origin reflection, null origin
  • Open Redirect Detection - 25+ redirect parameter tests with encoding bypasses
  • CRLF Injection - HTTP response splitting via headers and parameters
  • Prototype Pollution - Query string and JSON body pollution tests
  • SSTI (Server-Side Template Injection) - Detection for Jinja2, Freemarker, Velocity, ERB, Twig, and more
  • XXE (XML External Entity) - File read, SSRF, and SOAP endpoint testing
  • Insecure Deserialization - Java, PHP, Python pickle, ASP.NET ViewState
  • HTTP/2 Specific Attacks - H2C smuggling, CONTINUATION frame detection
  • WebSocket Security - CSWSH (Cross-Site WebSocket Hijacking) testing
  • Subdomain Takeover - Detection for 25+ vulnerable services (GitHub, Heroku, AWS, Azure, etc.)
  • Security Headers Audit - CSP, HSTS, X-Frame-Options, Permissions-Policy analysis
  • Cookie Security - HttpOnly, Secure, SameSite flag verification
  • Information Disclosure - 50+ paths for sensitive files (.git, .env, backups, configs)
  • NoSQL Injection - MongoDB operator injection ($ne, $gt, $regex, $where)
  • LDAP Injection - Filter injection and authentication bypass tests
  • Unicode Normalization - WAF bypass via homoglyphs and encoding tricks
  • JSON Injection - Parser differential attacks, duplicate keys, type confusion
  • Extended IP Spoofing - 17+ header variations for IP-based access controls
  • Azure Blob Enumeration - Public container discovery
  • GCP Bucket Discovery - Google Cloud Storage misconfiguration
  • Serverless Function Detection - AWS Lambda, Vercel, Netlify endpoints
  • Kubernetes API Exposure - K8s API, dashboard, and secret enumeration
  • Cloud Provider Detection - Enhanced fingerprinting for 10+ cloud providers
  • API Versioning Bypass - Unprotected legacy API version endpoints
  • Mass Assignment - Dangerous parameter acceptance testing
  • IDOR Detection - Insecure Direct Object Reference pattern detection
  • Business Logic Flaws - Negative values, boundary testing, type confusion
  • Email Header Injection - Contact form SMTP injection
  • File Upload Bypass - Extension, MIME type, and magic byte bypasses
  • HTTP Response Splitting - Header injection via parameters
  • Clickjacking - Frame-busting bypass verification

GUI IMPROVEMENTS

Version 1.2 (February 2026)

GUI Enhancements

  • Results Explorer - New comprehensive results viewer with:

    • Left panel showing all scanned sites with finding counts and severity indicators (🔴🟠🟡)
    • "All Sites" option to view combined results across all targets
    • Results grouped by category (API_DISCOVERY, DNS_HISTORY, etc.)
    • Detailed view panel showing full result information when clicked
    • Sorting options: Severity (High→Low, Low→High), Technique (A-Z, Z-A), Category, Bypass Status
    • Filtering options: All Results, CRITICAL/HIGH/MEDIUM/LOW/INFO only, Bypasses only, Non-bypasses only
    • Expand All / Collapse All buttons for quick navigation
    • Export View button to save filtered results to JSON
  • Pulsating Results Button - The Results button now:

    • Located at the bottom of the output area for better visibility
    • Larger size (40px height) with 📊 icon
    • Turns green and gently pulsates when scan completes with results
    • Changes color on hover (darkens) for better interactivity
    • Resets to default gray when results are cleared
  • INFO-Level Results - All scan results now appear in output, not just bypasses:

    • LOW and INFO severity findings are now displayed
    • Shows reason for blocked requests (e.g., "Blocked: 404")
    • Complete visibility into all scan activity
  • Target Tracking - Results Explorer now shows actual target site names instead of "Unknown Target"

Technical Improvements

  • Fixed result filtering to include all findings (CRITICAL, HIGH, MEDIUM, LOW, INFO)
  • Added target URL injection into result objects for proper grouping
  • Improved URL parsing to extract clean domain names for display
  • Added QPropertyAnimation for smooth pulsating effects
  • Better stylesheet management with hover states

Installation

# Clone repository
git clone https://github.com/K0NGR3SS/WAFPierce.git
cd WAFPierce

# Install dependencies
pip3 install -r requirements.txt

# Install in development mode
pip3 install -e .

Usage

Run UI

python3 -m wafpierce.gui  

Basic Scan

wafpierce https://d123abc.cloudfront.net

Advanced Options

# Specify threads
wafpierce https://target.cloudfront.net -t 20

# Custom output directory
wafpierce https://target.cloudfront.net -o my_results

Standalone WAF Bypass Scanner

# Run just the bypass scanner
python3 -m wafpierce.pierce https://target.cloudfront.net -t 10

Bypass Techniques

WAFPierce tests 100+ bypass methods across multiple categories:

Header Manipulation

  1. Host Header Injection - Manipulates Host header values
  2. X-Forwarded-For - IP spoofing via proxy headers (127.0.0.1, 10.x, 192.168.x, AWS metadata IP)
  3. X-Forwarded-Host - Alternative host header injection
  4. X-Original-URL / X-Rewrite-URL - Path override attempts
  5. Origin/Referer Manipulation - CORS and origin header bypass
  6. Custom Header Fuzzing - X-Debug, X-Internal, X-Skip-WAF headers
  7. True-Client-IP / CF-Connecting-IP - CDN-specific header spoofing
  8. Extended IP Spoofing - 17+ header variations (X-Real-IP, X-Client-IP, X-Cluster-Client-IP, etc.)
  9. Host Header Attacks - Password reset poisoning, routing bypass, cache poisoning

Encoding & Obfuscation

  1. Path Encoding - URL encoding bypasses (%2e, %252e, etc.)
  2. Double/Triple Encoding - Advanced encoding evasion
  3. Case Manipulation - Mixed case payloads (/AdMiN, /WP-ADMIN)
  4. Comment Injection - SQL/HTML comment insertion
  5. Whitespace Manipulation - Tabs, newlines, null bytes to break signatures
  6. Unicode Normalization - Homoglyphs, fullwidth characters, RTL override, zero-width spaces
  7. Path Normalization Extended - 30+ variations (dots, slashes, encoding, null bytes, semicolons, unicode)

Protocol-Level Attacks

  1. Transfer-Encoding Smuggling - CL.TE/TE.TE request smuggling
  2. HTTP/2 Downgrade - Protocol downgrade attacks
  3. H2C Smuggling - HTTP/2 Cleartext upgrade smuggling
  4. WebSocket Upgrade - Tunnel through WAFs via WebSocket
  5. WebSocket CSWSH - Cross-Site WebSocket Hijacking
  6. HTTP Pipelining - Connection keep-alive abuse
  7. Chunked Transfer - Split payloads across chunks
  8. HTTP Method Bypass - Tests non-standard methods (TRACE, OPTIONS, PUT, DELETE)
  9. HTTP Method Override - X-HTTP-Method-Override header manipulation
  10. Advanced Request Smuggling - H2.CL, H2.TE, TE.TE variations, HTTP/3 downgrade attempts
  11. HTTP Desync - CL.CL, space/tab/vertical-tab in headers, obs-fold line wrapping
  12. Extended Verb Tampering - TRACE/TRACK (XST), DEBUG, WebDAV methods, custom methods
  13. Range Header Attacks - Overlapping ranges, many ranges DoS, invalid ranges, suffix ranges
  14. Multipart Boundary Bypass - Long boundaries, special chars, quoted, CRLF, extra headers

Cache & Control

  1. Cache-Control - Cache directive manipulation
  2. Cache Poisoning - Unkeyed header injection (X-Forwarded-Host, X-Original-URL)
  3. Range Header - Partial content bypasses
  4. Web Cache Deception - Static extension tricks (.css, .js), cache key poisoning

Injection Testing

  1. SQLi Bypass - WAF-evading SQL injection payloads
  2. XSS Bypass - Cross-site scripting evasion
  3. Command Injection Bypass - OS command injection evasion
  4. Path Traversal Bypass - Directory traversal evasion
  5. SSRF Bypass - Server-side request forgery evasion
  6. NoSQL Injection - MongoDB operator injection ($ne, $gt, $regex, $where)
  7. LDAP Injection - Filter injection and auth bypass
  8. SSTI Detection - Server-Side Template Injection (Jinja2, Freemarker, Velocity, ERB, Twig, Pebble, Mako)
  9. XXE Detection - XML External Entity injection (file read, SSRF, SOAP)
  10. CRLF Injection - HTTP response splitting
  11. Prototype Pollution - JavaScript prototype chain pollution
  12. JSON Injection - Parser differentials, duplicate keys, type confusion
  13. Insecure Deserialization - Java, PHP, Python pickle, ASP.NET ViewState
  14. SSI Injection - Server-Side Includes (exec cmd, include file, printenv)
  15. Log4Shell Detection - ${jndi:ldap://} patterns with 12+ obfuscation bypasses
  16. XSLT Injection - Code execution via document(), system-property(), php:function()
  17. CSS Injection - Attribute selector exfiltration, @import, @font-face
  18. Dangling Markup - Data exfiltration via unclosed HTML tags

Security Misconfigurations

  1. CORS Misconfiguration - Wildcard, null origin, origin reflection, credential exposure
  2. Open Redirect - 25+ redirect parameters with encoding bypasses
  3. Security Headers Audit - CSP, HSTS, X-Frame-Options, Permissions-Policy, COOP, CORP, COEP
  4. Cookie Security - HttpOnly, Secure, SameSite flag verification
  5. Clickjacking - X-Frame-Options and CSP frame-ancestors verification
  6. Content Sniffing - X-Content-Type-Options, polyglot file uploads

Business Logic & Authorization

  1. HTTP Parameter Pollution - Duplicate parameters to confuse parsing
  2. API Versioning Bypass - Unprotected legacy API versions (/v1/, /v2/, /api/internal/)
  3. Mass Assignment - Dangerous parameter acceptance (admin, role, privilege)
  4. IDOR Detection - Insecure Direct Object Reference patterns
  5. Business Logic Flaws - Negative values, boundaries, type confusion
  6. Race Condition Testing - Concurrent requests to exploit timing windows
  7. File Upload Bypass - Extension, MIME type, magic byte bypasses
  8. Email Header Injection - Contact form SMTP injection
  9. HTTP Response Splitting - Header injection via parameters
  10. Integer Overflow - 32/64-bit boundary testing, signed/unsigned issues

JWT & Authentication Attacks

  1. JWT Algorithm Confusion - none/None/NONE algorithm bypass
  2. JWT KID Injection - SQL injection, path traversal, RCE via kid parameter
  3. JWT JKU/X5U SSRF - SSRF via JSON Web Key URL
  4. JWT Weak Secrets - Common password brute-force
  5. JWT Token Discovery - Find exposed JWTs in responses

GraphQL Attacks

  1. GraphQL Introspection - Full schema dump via __schema query
  2. GraphQL Batching DoS - Multiple operations in single request
  3. GraphQL Depth Bypass - Nested query DoS, no depth limit
  4. GraphQL Alias DoS - Thousands of aliases in single query
  5. GraphQL Field Suggestion - Type enumeration

SSRF Advanced

  1. SSRF Protocol Smuggling - gopher://, dict://, file://, ldap:// handlers
  2. SSRF PHP Wrappers - php://filter, php://input, data://, expect://
  3. SSRF IP Bypass - Hex, octal, decimal, IPv6 mapped, short forms
  4. DNS Rebinding - Bypass IP-based SSRF protections

Advanced Payloads

  1. Polyglot Payloads - Multi-context payloads (XSS+SQLi, SSTI+XSS)
  2. Payload Mutation Engine - Automated payload variations
  3. Time-Based Blind Detection - Response timing analysis
  4. Timing-Based Discovery - Blind resource discovery via timing anomalies
  5. Error-Based Disclosure - Force verbose errors (type confusion, format strings)

PDF/Document Attacks

  1. PDF Injection - SSRF/LFI via PDF generators (wkhtmltopdf, PhantomJS)
  2. PostMessage Vulnerabilities - Insecure origin validation
  3. RPO (Relative Path Overwrite) - XSS via CSS injection with relative paths

Cloud Security

  1. AWS S3 Bucket Enumeration - Public bucket discovery
  2. Azure Blob Enumeration - Public container discovery
  3. GCP Bucket Discovery - Google Cloud Storage misconfiguration
  4. Kubernetes API Exposure - K8s API, dashboard, secrets enumeration
  5. Serverless Function Detection - AWS Lambda, Vercel, Netlify endpoints
  6. Cloud Metadata Enumeration - SSRF to IMDS endpoints (169.254.169.254)
  7. Cloud Provider Detection - Fingerprinting for 10+ cloud providers

Information Disclosure

  1. Sensitive File Discovery - 50+ paths (.git, .env, backups, configs, debug endpoints)
  2. API Key/Secret Exposure - 35+ patterns (AWS, GitHub, Stripe, Slack, Google, Firebase, etc.)
  3. Subdomain Takeover - Detection for 25+ vulnerable services
  4. Subdomain Enumeration - DNS resolution for common prefixes
  5. Certificate Transparency - Domain extraction from SSL certificates
  6. Historical DNS Lookup - Origin IP discovery via DNS history
  7. Technology Stack Fingerprinting - Frameworks, CMS, servers, languages
  8. DNS Zone Transfer - AXFR enumeration attempts
  9. Buffer/Size Limits - Large URL, headers, POST body testing

Detection & Reconnaissance

  1. WAF Fingerprinting - 20+ WAF vendors (Cloudflare, AWS, Akamai, Imperva, F5, etc.)
  2. WAF Rule Version Detection - OWASP CRS version and rule IDs
  3. JavaScript WAF Detection - PerimeterX, DataDome, HUMAN, Kasada, Shape, Distil
  4. CDN Detection - 12+ CDN providers
  5. Rate Limit Detection - Request thresholds and rate limiting headers
  6. Bot Detection Evasion - User-Agent rotation, browser fingerprint simulation

Future Roadmap

Features planned for future releases:

AI implementation

Community Suggestions

Have ideas for new tests? Message either Marwan or Nazariy


Requirements

  • Python 3.8+
  • PySide6 6.10.1+
  • requests library

Responsible Disclosure

If you discover vulnerabilities using this tool:

  1. DO report to the affected organization immediately
  2. DO give reasonable time for fixes (typically 90 days)
  3. DO follow coordinated disclosure practices
  4. DON'T publicly disclose until patched
  5. DON'T exploit findings for personal gain

Educational Resources

This tool is designed for learning. Recommended resources:

Authors

Legal Disclaimer

FOR AUTHORIZED SECURITY TESTING ONLY

This tool is intended exclusively for authorized penetration testing and security research. You must obtain explicit written permission before testing any system you do not own.

Unauthorized access to computer systems is illegal. Violators may face prosecution under the Computer Fraud and Abuse Act (CFAA), Computer Misuse Act, or equivalent laws in your jurisdiction.

By using this tool, you agree to:

  • Only test systems you own or have written authorization to test
  • Comply with all applicable laws and regulations
  • Accept full responsibility for your actions

The authors assume NO LIABILITY for misuse. This software is provided "AS IS" without warranty of any kind.

If you don't have permission, don't use it.

There are hidden things in this program, can you find them all?

About

CLI & GUI tool, it is WAF/CDN fingerprinting and bypass validation tool for pentesting across cloud providers. It detects 17+ WAFs and 12+ CDNs, runs 35+ bypass/evasion techniques with baseline heuristics (status, size, hashes), and outputs Markdown reports.

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Contributors 2

  •  
  •  

Languages