
WafW00F is a powerful tool for detecting and identifying Web Application Firewalls (WAFs) on target websites. Essential for bug bounty hunters and red teamers, WafW00F helps you fingerprint WAF types before launching deeper attacks. This cheatsheet provides the most used commands, options, and practical tips for reconnaissance and evasion.
WafW00F Cheatsheet
The Web Application Firewall Detection Tool
Basic WafW00F Commands
wafw00f https://example.com
wafw00f https://site1.com https://site2.com
wafw00f -i targets.txt
wafw00f --proxy http://127.0.0.1:8080 https://example.com
wafw00f https://example.com:8443
wafw00f -v https://example.com
WAF Detection Techniques
wafw00f --find-redirects https://example.com
wafw00f --no-redirect https://example.com
wafw00f --force https://example.com
wafw00f --test-all https://example.com
wafw00f -H "X-Forwarded-For: 1.2.3.4" https://example.com
wafw00f --random-agent https://example.com
Output Formatting
wafw00f -o json https://example.com
wafw00f -o csv https://example.com
wafw00f -o txt https://example.com
wafw00f -o json -f results.json https://example.com
wafw00f -q https://example.com
wafw00f -vv https://example.com
Advanced Techniques
wafw00f --request-delay 2 https://example.com
wafw00f --no-cache https://example.com
wafw00f --verify-ssl=false https://example.com
wafw00f --timeout 10 https://example.com
wafw00f --list
wafw00f --update
Common Use Cases
wafw00f -v --find-redirects --test-all -o json -f results.json https://example.com
wafw00f --random-agent --request-delay 3 --no-cache https://example.com
wafw00f -i targets.txt -o csv -f results.csv