Skip to content
/ evilwaf Public template

evilwaf is a penetration testing tool designed to detect and bypass common Web Application Firewalls (WAFs).

License

Notifications You must be signed in to change notification settings

matrixleons/evilwaf

Repository files navigation

Evilwaf Logo
Evilwaf Title

#Evilwaf 2.2

EvilWAF - Web Application Firewall Bypass Toolkit

EvilWAF is an advanced firewall bypass and fingerprinting tool designed to detect and bypass Web Application Firewalls (WAF). It supports multiple evasion techniques for comprehensive security assessment.

Key Features

  • WAF Fingerprinting: Identify and detect specific WAF solutions

  • Multiple Bypass Techniques:

    • Header Manipulation
    • DNS History Analysis
    • Subdomain Enumeration
    • HTTP Request Smuggling
    • JWT Algorithm Confusion
    • GraphQL Query Batching
    • gRPC/Protobuf Bypass
    • Advanced Protocol Attacks
    • HTTP/2 Stream Multiplexing
    • WebAssembly Memory Corruption
    • SSTI Polyglot Payloads
    • Machine Learning WAF Evasion
    • Cache Poisoning
    • Web cache poisoning
  • Firewall Evasion: Advanced methods to bypass security controls

  • Comprehensive Scanning: Multi-technique approach for maximum effectiveness

Supported WAF Detection and bypass

  • Cloudflare, Akamai, Imperva, ModSecurity, and more

WAF Bypass Techniques

1. Header Manipulation

Advanced HTTP header manipulation to evade WAF detection:

  • User-Agent Rotation: Cycle through different browser signatures
  • X-Forwarded-For Spoofing: Fake originating IP addresses
  • Accept-Encoding Manipulation: Alter compression headers
  • Cookie Parameter Pollution: Overload cookie parameters

2. DNS History Analysis

Leverage DNS records to discover hidden entry points:

  • Historical DNS Lookups: Find old IP addresses and subdomains
  • CNAME Chain Analysis: Trace domain aliases and redirects
  • Passive DNS Replication: Gather intelligence from DNS databases
  • Expired Domain Detection: Identify forgotten subdomains
  • IP History Reconstruction: Map historical server locations

3. Subdomain Enumeration

Comprehensive subdomain discovery for alternative access:

  • Brute-force Discovery: Dictionary attacks on subdomains
  • Certificate Transparency Logs: Extract domains from SSL certificates
  • Search Engine Scraping: Harvest subdomains from public indexes
  • DNS Zone Transfer Attempts: Exploit misconfigured DNS servers
  • Reverse IP Lookup: Find all domains on shared hosting

4. HTTP Request Smuggling

Advanced protocol-level attacks to bypass WAF inspection:

  • CL.TE Attacks: Content-Length vs Transfer-Encoding conflicts
  • TE.CL Attacks: Transfer-Encoding vs Content-Length confusion
  • Header Obfuscation: Space and tab variations in headers
  • Chunk Size Manipulation: Large and malformed chunk sizes
  • Method Override: Smuggled GET, POST, PUT, DELETE requests
  • Endpoint Diversification: Target admin panels, APIs, and internal endpoints

5. JWT Algorithm Confusion

Authentication bypass through token manipulation:

  • Algorithm "none" Attack: Remove signature verification
  • Weak Secret Testing: Common and default JWT secrets
  • Key Confusion: Use public keys as HMAC secrets
  • Header Injection: KID, JKU, and X5U header attacks
  • Timestamp Manipulation: Future expirations and fixed timestamps
  • Role Escalation: Admin and superuser claim injection

6. GraphQL Query Batching

Exploit GraphQL features to evade detection:

  • Query Batching: Multiple queries in single request
  • Array Batching: ID arrays with injection payloads
  • Mutation Batching: Combined login and privilege escalation
  • Introspection Abuse: Schema discovery with injection
  • Alias Attacks: Multiple query aliases with different parameters
  • Variable Manipulation: SQL injection through GraphQL variables

7. gRPC/Protobuf Bypass

Binary protocol attacks to evade content inspection:

  • Protocol Confusion: Mix gRPC, Protobuf, and REST content types
  • Binary Encoding: SQL injection in binary payloads
  • Content-Type Manipulation: Various gRPC content type headers
  • Cloud Provider Mimicry: AWS, Google, and Azure gRPC headers
  • WebSocket Protocol: gRPC-Web and WebSocket protocol attacks
  • Proxy Header Injection: Combine gRPC with proxy headers

8. Webassembly Memory Corruption

Client-side WAF bypass through WebAssembly exploitation:

  • Memory Growth Injection - WASM memory expansion attacks
  • Stack Overflow Payloads - Call stack exhaustion
  • Heap Buffer Overflow - Dynamic memory corruption
  • Type Confusion Attacks - Data type manipulation
  • Import Injection - Malicious module imports
  • Infinite Loop WASM - Resource exhaustion
  • Memory Init Overflow - Initialization phase attacks
  • Corrupted Function Index - Invalid function execution
  • Malformed Section Order - Parser state confusion
  • Export Table Overflow - Export manipulation
  • Element Section Injection - Table corruption
  • Global Section Corruption - Global variable attacks
  • Custom Section Injection - Metadata exploitation
  • Compressed WASM Malformed - Decompression attacks

9. SSTI Polyglot Payloads

Universal template injection across multiple engines:

  • Multi-Engine RCE Polyglot - Cross-template engine exploitation
  • File Read Exploits - Filesystem access through templates
  • Python-Specific RCE - Jinja2/Django deep exploitation
  • Java EL Injection - Expression Language attacks
  • Twig-Specific Exploits - PHP/Symfony template bypass
  • Freemarker RCE - Java template engine exploitation
  • Velocity Template Injection - Apache Velocity attacks
  • Thymeleaf Expression - Spring template engine
  • Handlebars/Smarty Bypass - JavaScript/PHP templates
  • Ruby ERB Injection - Ruby template exploitation
  • Node.js Express/Jade - JavaScript server-side templates
  • ASP.NET Razor - Microsoft template engine
  • Environment Variable Leak - System environment exposure
  • ClassLoader Manipulation - Java class loading attacks
  • Reflection Exploits - Runtime reflection manipulation
  • SQL via Templates - Database access through templates
  • XXE via Templates - XML External Entity injection

10. Machine learnig Waf Evasion

AI-powered WAF bypass through adversarial attacks:

  • Homoglyph Attacks - Visual character confusion
  • Zero-Width Character Injection - Invisible character insertion
  • Case Rotation Attacks - Mixed case obfuscation
  • Multi-Byte Encoding Bypass - Character encoding manipulation
  • HTML Entity Evasion - Entity encoding bypass
  • Comment Obfuscation - SQL comment-based evasion
  • Whitespace Manipulation - Tab/newline injection
  • String Concatenation Bypass - Character splitting
  • Hex Encoding Attacks - Hexadecimal representation
  • Base64 Obfuscation - Base64 encoded payloads
  • Regex Anchor Bypass - Regular expression evasion
  • Null Byte Injection - String termination attacks
  • Backslash Escaping - Escape sequence manipulation
  • Multiline Evasion - Newline separation techniques
  • Template Injection Bypass - Multi-engine template attacks
  • JavaScript Obfuscation - Char code conversion
  • CSS Expression Attacks - CSS-based code execution
  • Data URL Bypass - Data URI scheme attacks
  • Protocol Relative URLs - Scheme-less URL attacks
  • DOM-Based Evasion - Client-side execution bypass
  • Event Handler Bypass - SVG and HTML event exploitation
  • Time-Based SQLi Evasion - Timing attack detection bypass
  • Boolean-Based Blind SQLi - Boolean logic manipulation
  • Union-Based SQLi - Union query obfuscation
  • Stacked Queries Evasion - Multiple query execution
  • Second-Order Injection - Delayed exploitation techniques
  • XPath Injection Bypass - XML path manipulation
  • LDAP Injection Evasion - Directory service attacks
  • Command Injection Obfuscation - OS command execution bypass
  • Path Traversal Bypass - Directory traversal obfuscation
  • SSRF Payload Evasion - Server-side request forgery
  • XXE Obfuscation - XML External Entity bypass
  • Deserialization Attacks - Object serialization exploitation
  • Buffer Overflow Evasion - Memory corruption attempts
  • Format String Attacks - Format string vulnerability exploitation
  • Integer Overflow - Numerical boundary attacks
  • Type Confusion - Data type manipulation
  • Regular Expression DoS - ReDoS attack vectors
  • HTTP Parameter Pollution - Parameter manipulation attacks
  • JSON Injection Evasion - JSON parsing attacks
  • GraphQL Query Evasion - GraphQL-specific bypasses
  • JWT Token Manipulation - Token tampering techniques
  • Protobuf Bypass - Protocol buffer attacks
  • HTTP/2 Stream Evasion - HTTP/2 protocol exploitation
  • WebSocket Injection - WebSocket protocol attacks
  • Ultimate Polyglot Payload - Combined evasion techniques

11. HTTP/2 Stream Multiplexing Attack

Advanced HTTP/2 protocol exploitation to bypass next-generation WAFs:

  • Stream Priority Hijacking - Manipulate request processing order
  • RST_STREAM Flood Attacks - Resource exhaustion through stream resets
  • WINDOW_UPDATE Overflow - Flow control mechanism bypass
  • PRIORITY Hijacking - Traffic prioritization manipulation
  • PING Flood Attacks - Server resource drain
  • SETTINGS Flood - Configuration parameter overload
  • CONTINUATION Frame Flood - Header fragmentation attacks
  • HPACK Table Overflow - Header compression corruption
  • GOAWAY Session Hijack - Connection termination exploitation
  • DATA Frame Injection - Direct request smuggling
  • Malformed Frames - Protocol parser confusion
  • Stream Conflict Attacks - ID collision exploitation
  • Zero-Length Bombardment - Parser stress testing

12. Cache Poisoning

13 . Web Cache Poisoning

Screenshot

Screenshot

Disclaimer

Important: Read This Before Using EvilWAF

  • This tool is designed for authorized security testing only
  • You must have explicit permission to test the target systems
  • Intended for educational purposes, security research, and authorized penetration testing
  • Not for malicious or illegal activities

Legal Compliance:

  • Users are solely responsible for how they use this tool
  • The developers are not liable for any misuse or damage caused
  • Ensure compliance with local, state, and federal laws

Website Features:

  • Historical DNS records
  • IP history for domains
  • Subdomain enumeration
  • Free tier available Usage: Search for domain → View DNS History

Website Features:

Website Features:

  • Historical DNS data
  • Reverse IP lookup
  • Domain history
  • Free limited queries

Website Features:

  • Reverse IP lookup
  • Historical WHOIS
  • Free API limited.

##support I DO NOT offer support for provide illigal issue but I will help you to reach your goal

linkedin

evilwaf is made by matrix leons

Show Your Support

If this program has been helpful to you, please consider giving us a star on Github Your support means a value to this and helps others discover the project, your star is more powerfull behind this tool.

Installation

Method 1: Clone from GitHub (Recommended)

# 1. Create virtual environment
python3 -m venv myenv

# 2. Activate virtual environment
source myenv/bin/activate

git clone https://github.com/matrixleons/evilwaf.git

cd evilwaf



pip3 install -r requirements.txt

python3 evilwaf.py -d https://site.com -o results.json(Recommended)

python3 evilwaf.py -d site.com -o results.json 

python3 evilwaf.py -d site.com / https://site.com

            [ Tool output example]



[+] PHASE 2: DNS History Bypass
[*] Testing 14 IP variants
[-] 35.187.93.140                            Bypass Success
[-] 35.187.93.1                              Bypass Failed
[-] 35.187.93.2                              Bypass Failed
[-] 35.187.93.10                             Bypass Failed
[-] 35.187.93.50                             Bypass Failed
[-] 35.187.93.100                            Bypass Failed
[-] 35.187.93.200                            Bypass Failed
[-] 35.187.93.254                            Bypass Failed
[-] 35.187.93.255                            Bypass Failed
[-] 35.187.93.101                            Bypass Failed
[-] 35.187.93.102                            Bypass Failed
[-] 35.187.93.103                            Bypass Failed
[-] 35.187.93.253                            Bypass Failed
[-] 35.187.93.252                            Bypass Failed







Docker Installation

docker build -t evilwaf .
docker run -it evilwaf -d example.com

*****done*****

About

evilwaf is a penetration testing tool designed to detect and bypass common Web Application Firewalls (WAFs).

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Sponsor this project

Packages

No packages published