wapiti

Edit Package wapiti

Wapiti allows you to audit the security of your web applications.

It performs "black-box" scans, i.e. it does not study the source code of the application but will scans the webpages of the deployed webapp, looking for scripts and forms where it can inject data.

Once it gets this list, Wapiti acts like a fuzzer, injecting payloads to see if a script is vulnerable.

Refresh
Refresh
Source Files
Filename Size Changed
wapiti-3.0.0.tar.gz 0000528316 516 KB
wapiti.changes 0000001548 1.51 KB
wapiti.spec 0000003202 3.13 KB
Latest Revision
Marcus Meissner's avatar Marcus Meissner (msmeissn) accepted request 565857 from Antoine Belvire's avatar Antoine Belvire (1Antoine1) (revision 2)
- Update to version 3.0.0:
  * This new release now relies on Python 3.
  * A session mechanism using sqlite3 allows you to stop the scan
    or/and attacks and resume them later.
  * The new behavior, when you stop Wapiti during the attack
    process (with Ctrl+C), is to let you choose between continuing,
    moving to the next attack-module, exiting with or without
    generating the report.
  * A total of 9 options can now help you to finely control the
    scanner by fixing the maximum allowed depth of crawling,
    skipping parameter names of your choice in URLs and forms,
    setting the maximum delay for scanning, choosing between 6
    modes of scan force, and more!
  * The SOCKS5 proxy support is also back in this release.
  * Improvements have been made to existing attack modules. For
    example by reducing false-positives for the blind sqli attack
    module.
  * Two new attack modules were added: buster (for
    directory/filename brute forcing) and shellshock (not really
    new but here it is).
  * Some options changed. The base URL must now be given through
    the -u option.
- New runtime dependencies:
  * python3-Mako
  * python3-PySocks
  * python3-lxml
  * python3-tld
  * python3-yaswfp
- Clean spec file with spec-cleaner.
Comments 0
openSUSE Build Service is sponsored by