→ waf-checker.com ←
- 19+ attack categories out of the box: SQL Injection, XSS, Path Traversal, Command Injection, SSRF, NoSQL Injection, LFI, LDAP Injection, XXE, SSTI, CRLF, and more
- 9 advanced bypass categories with encoding variations, protocol smuggling, and framework-specific payloads
- 344+ payloads loaded dynamically from PAPAMICA/waf-payloads
- False positive testing to verify legitimate traffic isn't being blocked
- HTTP method testing across GET, POST, PUT, and DELETE
- Auto WAF detection — identifies Cloudflare, AWS WAF, Imperva, ModSecurity, Akamai, F5 BIG-IP, and 15+ other WAFs
- Advanced bypass techniques — double encoding, unicode, mixed case, comment obfuscation
- WAF-specific bypass generation — tailored strategies per detected WAF
- HTTP manipulation testing — verb tampering, parameter pollution, content-type confusion, request smuggling
- Technology fingerprinting — CMS detection (WordPress, Drupal, Joomla, Shopify…), frameworks, web servers, CDN/WAF, analytics tools, and 25+ JavaScript libraries
- DNS analysis — A, AAAA, CNAME, MX, NS, TXT, SOA records with infrastructure detection
- WHOIS & IP geolocation — ISP, organization, ASN, location, reverse DNS (PTR)
- Subdomain discovery — via Certificate Transparency logs (crt.sh) and DNS brute-force
- Reverse IP lookup — discover all domains hosted on the same IP (shared hosting detection)
- SSL/TLS certificate details — issuer, validity, Subject Alternative Names (SANs), serial number
- CMS deep analysis — WordPress themes, plugins with versions; Drupal modules
- Path probing — robots.txt, sitemap.xml, security.txt, common admin paths
- Cookie analysis — Secure, HttpOnly, SameSite flags
- Open Graph & social metadata extraction
- RSS/Atom feeds & email address discovery
- Export results as JSON, HTML report, or screenshot (PNG)
- Grade scoring (A+ to F) of HTTP security headers
- Detailed analysis of CSP, HSTS, X-Frame-Options, X-Content-Type-Options, Referrer-Policy, Permissions-Policy
- Information disclosure detection — server version, powered-by headers, debug headers
- Actionable recommendations for each missing or misconfigured header
- Export results as JSON, HTML report, or screenshot (PNG)
- Performance score (0–100) with issues count and status
- Lighthouse-style scores (estimated locally) — Performance, Accessibility, Best Practices, SEO
- Core Web Vitals — FCP, LCP, TBT, CLS, Speed Index, TTI with color-coded feedback
- Timing breakdown — DNS lookup, TTFB, download, total load time
- Size breakdown — total page weight and per-type (HTML, JavaScript, images, fonts)
- Optimization advice and penalty/improvement hints
- Export results as JSON, HTML report, or screenshot (PNG)
- Complete DNS resolution — A, AAAA, CNAME, MX, NS, TXT records
- WHOIS data with IP geolocation, ISP, ASN, and reverse DNS
- Email security audit — SPF & DMARC validation
- Subdomain enumeration — Certificate Transparency + DNS brute-force
- Reverse IP lookup — all domains sharing the same IP address
- Infrastructure detection — CDN, email, and DNS providers from record patterns
- Export results as JSON, HTML report, or screenshot (PNG)
- Overall SEO score (0–100) with checks passed / total
- Score by category — Meta Tags, Technical, Indexability, Content, Performance, Social, Links, URL, Accessibility
- Meta tags verification — title, description, viewport, canonical, language, charset, favicon, DOCTYPE, robots
- Sitemap & robots.txt analysis, page discovery, structured data (JSON-LD)
- Content analysis — word count, readability, keyword density, text-to-HTML ratio
- Links audit — internal/external, nofollow, empty anchors
- Accessibility checks — lang, skip nav, ARIA landmarks, form labels
- Export results as JSON, HTML report, or screenshot (PNG)
- Streaming results via Server-Sent Events (SSE) — see results as they come in
- Color-coded status codes:
403green — WAF blocked the attack (protected)200red — payload passed through (vulnerable)3xxorange — redirect (requires investigation)4xxyellow — other client error
- Filterable results by status code with real-time summary bars
Fully customizable payload management through the built-in configuration panel:
- Browse all categories with payload counts
- Add, edit, or remove individual payloads
- Create custom categories
- Separate attack payloads and false positive payloads per category
- Export/import payload configurations
- Changes persist in localStorage
Detailed vulnerability assessment reports with scoring:
- WAF effectiveness score — percentage of attacks blocked
- Risk level assessment — Critical, High, Medium, Low
- Vulnerability breakdown by severity
- Category-level analysis with bypass rates
- Actionable recommendations
- Export results as JSON, CSV, or HTML report
- Professional HTML report with executive summary
- Per-category vulnerability assessment with scores
- Screenshot support for sharing (PNG with branding)
- All recon/audit features support JSON, HTML, and screenshot export
- REST API for all tools — WAF checker, full recon, security headers, speed test, SEO audit, HTTP manipulation
- Rate limit — 1 request per minute per IP (headers:
X-RateLimit-Limit,X-RateLimit-Remaining,X-RateLimit-Reset) - No authentication — public API, URL auto-normalized
- JSON responses — use
curl,jq, or any HTTP client; save with-o file.json - WAF Checker endpoint (
/api/v1/waf-checker) with full advanced options: methods, categories, pagination, followRedirect, enhanced/advanced payloads, auto WAF detection, encoding variations, HTTP manipulation - Error codes — 400 (bad param), 404 (not found), 429 (rate limit), 500/502 (server/target error)
- Documentation — in-app panel and machine-readable
GET /api/v1/docs
- Test up to 100 URLs simultaneously
- Concurrent processing with progress tracking
- Per-URL results with bypass rate analysis
- Automatic saving of scan results to browser localStorage
- Browse and review past scans with summary statistics
- Quick re-scan from history entries
WAF-Checker is built as a Cloudflare Worker with static assets:
- Backend (
app/src/api.ts) — Worker handling API requests, payload delivery, WAF testing, reconnaissance, and DNS/WHOIS lookups - Frontend (
app/src/static/) — Single-page app with cyberpunk UI - Payloads — Loaded dynamically at runtime from GitHub to keep the worker bundle clean
wrangler.toml # Cloudflare Worker configuration
app/src/
├── api.ts # Main Worker entry point & API routes
├── payloads.ts # Payload types (data loaded from GitHub)
├── advanced-payloads.ts # Encoding & bypass generation functions
├── encoding.ts # WAF bypass encoding utilities
├── waf-detection.ts # WAF fingerprinting & detection
├── http-manipulation.ts # HTTP protocol manipulation techniques
├── reporting.ts # Export & analytics module
├── batch.ts # Batch testing module
└── static/
├── index.html # Main web interface
├── main.js # Frontend logic & UI
├── style.css # Cyberpunk theme & styling
└── favicon.svg # App icon
- Node.js (v18+)
- Wrangler CLI
# Clone the repository
git clone https://github.com/PAPAMICA/waf-checker.git
cd waf-checker
# Install dependencies
npm install
# Start local dev server
npx wrangler devOpen http://localhost:8787 in your browser.
-
Login to Cloudflare:
npx wrangler login
-
Update
wrangler.tomlwith youraccount_id -
Deploy:
npx wrangler deploy
Payloads are maintained in a separate repository: PAPAMICA/waf-payloads
To modify the default payloads:
- Fork or edit the payloads.json
- Update the
GITHUB_PAYLOADS_URLinapp/src/api.tsif using a custom source
You can also add custom payloads directly in the web interface via Configure Payloads — changes are saved in your browser's localStorage.
MIT
Built by Mickael Asseline












