Skip to content
devloop edited this page Oct 6, 2024 · 2 revisions

Welcome to the Wapiti Wiki

Wapiti is an open-source web vulnerability scanner written in Python. It allows you to audit the security of your websites or web applications by performing "black-box" testing, meaning it doesn't need access to the application's source code. Instead, Wapiti crawls the website to find all accessible URLs and injects payloads to detect vulnerabilities.


What Can Wapiti Be Used For?

Wapiti is designed to help web developers, security professionals, and system administrators identify vulnerabilities in their web applications. Some common uses of Wapiti include:

  • Crawling Websites: Wapiti scans web pages by following links, forms, and inputs to identify potential attack vectors.

  • Detecting Vulnerabilities: Wapiti tests your web application for various security issues by using different attack modules. To see an exhaustive list of supported attacks, run the command:

    wapiti --list-modules
    
  • Performing Black-Box Testing: Unlike "white-box" testing tools that require access to the application's source code, Wapiti performs its scans externally, simulating an attacker's perspective.

  • Customizable Attacks: Wapiti allows users to choose which attack modules to run, or even create custom modules to suit specific use cases.

  • Reporting: After scanning, Wapiti generates detailed reports in various formats (HTML, JSON, XML) so you can review the vulnerabilities and take action.


Features

For a full list of Wapiti’s features, visit the Wapiti official website.


Getting Started

To start using Wapiti, install it via pip:

pip install wapiti3

You can then begin scanning your site with a simple command:

wapiti -u http://example.com

For more detailed documentation on how to configure and optimize your scans, explore the other wiki pages!