#Evilwaf 2.2
EvilWAF is an advanced firewall bypass and fingerprinting tool designed to detect and bypass Web Application Firewalls (WAF). It supports multiple evasion techniques for comprehensive security assessment.
-
WAF Fingerprinting: Identify and detect specific WAF solutions
-
Multiple Bypass Techniques:
- Header Manipulation
- DNS History Analysis
- Subdomain Enumeration
- HTTP Request Smuggling
- JWT Algorithm Confusion
- GraphQL Query Batching
- gRPC/Protobuf Bypass
- Advanced Protocol Attacks
- HTTP/2 Stream Multiplexing
- WebAssembly Memory Corruption
- SSTI Polyglot Payloads
- Machine Learning WAF Evasion
- Cache Poisoning
- Web cache poisoning
-
Firewall Evasion: Advanced methods to bypass security controls
-
Comprehensive Scanning: Multi-technique approach for maximum effectiveness
- Cloudflare, Akamai, Imperva, ModSecurity, and more
Advanced HTTP header manipulation to evade WAF detection:
- User-Agent Rotation: Cycle through different browser signatures
- X-Forwarded-For Spoofing: Fake originating IP addresses
- Accept-Encoding Manipulation: Alter compression headers
- Cookie Parameter Pollution: Overload cookie parameters
Leverage DNS records to discover hidden entry points:
- Historical DNS Lookups: Find old IP addresses and subdomains
- CNAME Chain Analysis: Trace domain aliases and redirects
- Passive DNS Replication: Gather intelligence from DNS databases
- Expired Domain Detection: Identify forgotten subdomains
- IP History Reconstruction: Map historical server locations
Comprehensive subdomain discovery for alternative access:
- Brute-force Discovery: Dictionary attacks on subdomains
- Certificate Transparency Logs: Extract domains from SSL certificates
- Search Engine Scraping: Harvest subdomains from public indexes
- DNS Zone Transfer Attempts: Exploit misconfigured DNS servers
- Reverse IP Lookup: Find all domains on shared hosting
Advanced protocol-level attacks to bypass WAF inspection:
- CL.TE Attacks: Content-Length vs Transfer-Encoding conflicts
- TE.CL Attacks: Transfer-Encoding vs Content-Length confusion
- Header Obfuscation: Space and tab variations in headers
- Chunk Size Manipulation: Large and malformed chunk sizes
- Method Override: Smuggled GET, POST, PUT, DELETE requests
- Endpoint Diversification: Target admin panels, APIs, and internal endpoints
Authentication bypass through token manipulation:
- Algorithm "none" Attack: Remove signature verification
- Weak Secret Testing: Common and default JWT secrets
- Key Confusion: Use public keys as HMAC secrets
- Header Injection: KID, JKU, and X5U header attacks
- Timestamp Manipulation: Future expirations and fixed timestamps
- Role Escalation: Admin and superuser claim injection
Exploit GraphQL features to evade detection:
- Query Batching: Multiple queries in single request
- Array Batching: ID arrays with injection payloads
- Mutation Batching: Combined login and privilege escalation
- Introspection Abuse: Schema discovery with injection
- Alias Attacks: Multiple query aliases with different parameters
- Variable Manipulation: SQL injection through GraphQL variables
Binary protocol attacks to evade content inspection:
- Protocol Confusion: Mix gRPC, Protobuf, and REST content types
- Binary Encoding: SQL injection in binary payloads
- Content-Type Manipulation: Various gRPC content type headers
- Cloud Provider Mimicry: AWS, Google, and Azure gRPC headers
- WebSocket Protocol: gRPC-Web and WebSocket protocol attacks
- Proxy Header Injection: Combine gRPC with proxy headers
Client-side WAF bypass through WebAssembly exploitation:
- Memory Growth Injection - WASM memory expansion attacks
- Stack Overflow Payloads - Call stack exhaustion
- Heap Buffer Overflow - Dynamic memory corruption
- Type Confusion Attacks - Data type manipulation
- Import Injection - Malicious module imports
- Infinite Loop WASM - Resource exhaustion
- Memory Init Overflow - Initialization phase attacks
- Corrupted Function Index - Invalid function execution
- Malformed Section Order - Parser state confusion
- Export Table Overflow - Export manipulation
- Element Section Injection - Table corruption
- Global Section Corruption - Global variable attacks
- Custom Section Injection - Metadata exploitation
- Compressed WASM Malformed - Decompression attacks
Universal template injection across multiple engines:
- Multi-Engine RCE Polyglot - Cross-template engine exploitation
- File Read Exploits - Filesystem access through templates
- Python-Specific RCE - Jinja2/Django deep exploitation
- Java EL Injection - Expression Language attacks
- Twig-Specific Exploits - PHP/Symfony template bypass
- Freemarker RCE - Java template engine exploitation
- Velocity Template Injection - Apache Velocity attacks
- Thymeleaf Expression - Spring template engine
- Handlebars/Smarty Bypass - JavaScript/PHP templates
- Ruby ERB Injection - Ruby template exploitation
- Node.js Express/Jade - JavaScript server-side templates
- ASP.NET Razor - Microsoft template engine
- Environment Variable Leak - System environment exposure
- ClassLoader Manipulation - Java class loading attacks
- Reflection Exploits - Runtime reflection manipulation
- SQL via Templates - Database access through templates
- XXE via Templates - XML External Entity injection
AI-powered WAF bypass through adversarial attacks:
- Homoglyph Attacks - Visual character confusion
- Zero-Width Character Injection - Invisible character insertion
- Case Rotation Attacks - Mixed case obfuscation
- Multi-Byte Encoding Bypass - Character encoding manipulation
- HTML Entity Evasion - Entity encoding bypass
- Comment Obfuscation - SQL comment-based evasion
- Whitespace Manipulation - Tab/newline injection
- String Concatenation Bypass - Character splitting
- Hex Encoding Attacks - Hexadecimal representation
- Base64 Obfuscation - Base64 encoded payloads
- Regex Anchor Bypass - Regular expression evasion
- Null Byte Injection - String termination attacks
- Backslash Escaping - Escape sequence manipulation
- Multiline Evasion - Newline separation techniques
- Template Injection Bypass - Multi-engine template attacks
- JavaScript Obfuscation - Char code conversion
- CSS Expression Attacks - CSS-based code execution
- Data URL Bypass - Data URI scheme attacks
- Protocol Relative URLs - Scheme-less URL attacks
- DOM-Based Evasion - Client-side execution bypass
- Event Handler Bypass - SVG and HTML event exploitation
- Time-Based SQLi Evasion - Timing attack detection bypass
- Boolean-Based Blind SQLi - Boolean logic manipulation
- Union-Based SQLi - Union query obfuscation
- Stacked Queries Evasion - Multiple query execution
- Second-Order Injection - Delayed exploitation techniques
- XPath Injection Bypass - XML path manipulation
- LDAP Injection Evasion - Directory service attacks
- Command Injection Obfuscation - OS command execution bypass
- Path Traversal Bypass - Directory traversal obfuscation
- SSRF Payload Evasion - Server-side request forgery
- XXE Obfuscation - XML External Entity bypass
- Deserialization Attacks - Object serialization exploitation
- Buffer Overflow Evasion - Memory corruption attempts
- Format String Attacks - Format string vulnerability exploitation
- Integer Overflow - Numerical boundary attacks
- Type Confusion - Data type manipulation
- Regular Expression DoS - ReDoS attack vectors
- HTTP Parameter Pollution - Parameter manipulation attacks
- JSON Injection Evasion - JSON parsing attacks
- GraphQL Query Evasion - GraphQL-specific bypasses
- JWT Token Manipulation - Token tampering techniques
- Protobuf Bypass - Protocol buffer attacks
- HTTP/2 Stream Evasion - HTTP/2 protocol exploitation
- WebSocket Injection - WebSocket protocol attacks
- Ultimate Polyglot Payload - Combined evasion techniques
Advanced HTTP/2 protocol exploitation to bypass next-generation WAFs:
- Stream Priority Hijacking - Manipulate request processing order
- RST_STREAM Flood Attacks - Resource exhaustion through stream resets
- WINDOW_UPDATE Overflow - Flow control mechanism bypass
- PRIORITY Hijacking - Traffic prioritization manipulation
- PING Flood Attacks - Server resource drain
- SETTINGS Flood - Configuration parameter overload
- CONTINUATION Frame Flood - Header fragmentation attacks
- HPACK Table Overflow - Header compression corruption
- GOAWAY Session Hijack - Connection termination exploitation
- DATA Frame Injection - Direct request smuggling
- Malformed Frames - Protocol parser confusion
- Stream Conflict Attacks - ID collision exploitation
- Zero-Length Bombardment - Parser stress testing
Important: Read This Before Using EvilWAF
- This tool is designed for authorized security testing only
- You must have explicit permission to test the target systems
- Intended for educational purposes, security research, and authorized penetration testing
- Not for malicious or illegal activities
- Users are solely responsible for how they use this tool
- The developers are not liable for any misuse or damage caused
- Ensure compliance with local, state, and federal laws
Website Features:
- Historical DNS records
- IP history for domains
- Subdomain enumeration
- Free tier available Usage: Search for domain → View DNS History
Website Features:
- IP History lookup
- DNS record history
- Reverse IP lookup
- Completely free Tools:
- IP History: https://viewdns.info/iphistory/
- Reverse IP: https://viewdns.info/reverseip/
Website Features:
- Historical DNS data
- Reverse IP lookup
- Domain history
- Free limited queries
Website Features:
- Reverse IP lookup
- Historical WHOIS
- Free API limited.
##support I DO NOT offer support for provide illigal issue but I will help you to reach your goal
evilwaf is made by matrix leons
If this program has been helpful to you, please consider giving us a star on Github Your support means a value to this and helps others discover the project, your star is more powerfull behind this tool.
# 1. Create virtual environment
python3 -m venv myenv
# 2. Activate virtual environment
source myenv/bin/activate
git clone https://github.com/matrixleons/evilwaf.git
cd evilwaf
pip3 install -r requirements.txt
python3 evilwaf.py -d https://site.com -o results.json(Recommended)
python3 evilwaf.py -d site.com -o results.json
python3 evilwaf.py -d site.com / https://site.com
[ Tool output example]
[+] PHASE 2: DNS History Bypass
[*] Testing 14 IP variants
[-] 35.187.93.140 Bypass Success
[-] 35.187.93.1 Bypass Failed
[-] 35.187.93.2 Bypass Failed
[-] 35.187.93.10 Bypass Failed
[-] 35.187.93.50 Bypass Failed
[-] 35.187.93.100 Bypass Failed
[-] 35.187.93.200 Bypass Failed
[-] 35.187.93.254 Bypass Failed
[-] 35.187.93.255 Bypass Failed
[-] 35.187.93.101 Bypass Failed
[-] 35.187.93.102 Bypass Failed
[-] 35.187.93.103 Bypass Failed
[-] 35.187.93.253 Bypass Failed
[-] 35.187.93.252 Bypass Failed
Docker Installation
docker build -t evilwaf .
docker run -it evilwaf -d example.com
*****done*****