Skip to main content

Advanced Web Application Security Scanner

Project description

Waymap - Web Vulnerability Scanner

Current Version: 7.1.0
Author: Trix Cyrus (Vicky)
Copyright: © 2024-25 Trixsec Org
Maintained: Yes

Waymap Logo

What is Waymap?

Waymap is a fast and optimized web vulnerability scanner designed to identify security flaws in web applications. With support for multiple scan types and customizable configurations, it is a versatile tool for ethical hackers, penetration testers, and security enthusiasts. Capable of scanning for 75+ Web Vulnerabilities with a completely standardized, professional UI/UX.


🆕 Latest Updates

v7.1.0 - API Security, Auth & Reporting 🚀

Release Date: December 2024

Fast, Optimized, and Comprehensive Web Vulnerability Scanner

Waymap v7.1.0 introduces powerful new capabilities for API security testing, advanced authentication, and professional reporting.

🌟 What's New?

🔌 API Security Testing
  • REST API Scanning: Test endpoints for missing auth, IDOR, and rate limiting.
  • GraphQL Support: Detect introspection, query depth issues, and schema exposure.
  • Method Testing: Automated testing of GET, POST, PUT, DELETE, PATCH methods.
🔐 Advanced Authentication
  • Multi-Protocol Support: Form-based, HTTP Basic, Digest, Bearer Token, and API Key.
  • Session Management: Maintain authenticated sessions across scans.
  • Custom Headers: Inject custom authentication headers.
📊 Professional Reporting
  • HTML Reports: Interactive dashboards with charts and detailed findings.
  • CSV Exports: Spreadsheet-compatible data for analysis.
  • Markdown: Documentation-ready reports.
  • PDF Reports: Professional PDF summaries.

Previous Updates

v7.0.0 - Major UI/UX Overhaul & Stability Release 🎉

Release Date: December 2024

This is a major release focused on consistency, stability, and professional user experience.

🎨 Complete UI/UX Standardization
  • Unified Interface: All 15 scan modules now have consistent output formatting
  • Professional Headers: Every scan starts with a cyan-colored header banner
  • Standardized Messages: Consistent icons and colors across all modules
  • Uniform Prompts: Consistent user interaction across all scan types
  • Completion Messages: Every scan properly indicates completion status
🔧 Core Improvements
  • Fixed Critical Bugs: Resolved JSON structure inconsistencies causing crashes
  • Circular Import Resolution: Fixed module dependency issues
  • Enhanced Threading: Consistent thread management across all modules
  • Graceful Exit Handling: Proper KeyboardInterrupt handling everywhere
  • Verbose Mode: Standardized debug output with --verbose flag
  • Result Saving: Fixed and standardized result saving across all scan types
📦 Modules Standardized (15/15)
  • Injection Scans: LFI, CMDi, SSTI, CRLF, CORS, Open Redirect, XSS
  • SQL Injection: Boolean, Error, Time-based
  • Profile Scans: High-Risk, Critical-Risk, Deep Scan
  • Orchestrators: SQLi, XSS
🐛 Bug Fixes
  • Fixed TypeError in result saving
  • Fixed missing verbose parameters
  • Fixed circular imports
  • Fixed missing dependencies
  • Fixed inconsistent JSON structures
📚 Documentation
  • Comprehensive standardization documentation
  • UI/UX guidelines
  • Updated command reference
  • Testing reports

🚀 Features

  • High-Risk Profile: CMS-specific high-risk vulnerability scanning (WordPress, Drupal)
  • Critical-Risk Profile: Critical CVE-based vulnerability scanning
  • DeepScan Profile: Comprehensive deep scanning (Headers, Backup Files, JS Analysis, Directory Fuzzing)

4. Crawling Capabilities

  • Crawl target websites with customizable depth (--crawl)
  • Automatically discover and extract URLs for scanning

5. Threaded Scanning

  • Speed up scans with multithreading (--threads)
  • Optimized thread management for better performance

6. Automation Features

  • Skip prompts using the --no-prompt option
  • Automatically handle missing directories, files, and session data
  • Consistent result saving in JSON format

7. Update Checker

  • Easily check for the latest updates (--check-updates)
  • Auto-notification of new versions

8. WAF Detection

  • Detect 160+ types of WAF/IPS systems
  • Usage: --check-waf https://example.com

🛠️ How to Use

Basic Commands

  1. Scan a single target:

    python waymap.py --crawl 3 --target https://example.com --scan {scan_type}
    
  2. Scan multiple targets from a file:

    python waymap.py --crawl 3 --multi-target targets.txt --scan {scan_type}
    
  3. Directly scan a single target without crawling:

    python waymap.py --target https://example.com/page?id=1 --scan {scan_type}
    
  4. Directly scan multiple targets from a file:

    python waymap.py --multi-target targets.txt --scan {scan_type}
    

    (Example URL type: https://example.com/page?id=1)

4. New v7.1.0 Arguments

API Scanning

  • --scan api: Enable API scanning mode
  • --api-type: Specify API type (rest or graphql)
  • --api-endpoints: Comma-separated list of endpoints (e.g., /api/v1/users,/api/v1/login)

Authentication

  • --auth-type: Authentication type (form, basic, digest, bearer, api_key)
  • --auth-url: Login URL (for form auth)
  • --username / -u: Username
  • --password / -pw: Password
  • --token: Bearer token or API key
  • --auth-header: Custom header name for API key (default: X-API-Key)

Reporting

  • --report-format: Output formats (html, csv, markdown, pdf)
  • --output-dir: Directory to save reports (default: reports/)

5. Example Usage

Standard Scan:

python waymap.py --target http://testphp.vulnweb.com --scan xss

API Scan (REST):

python waymap.py --target http://api.example.com --scan api --api-type rest --token "eyJhbG..."

Authenticated Scan:

python waymap.py --target http://example.com --auth-type form -u admin -pw secret --scan all

Generate Reports:

python waymap.py --target http://example.com --scan all --report-format html,pdf

6. Profile-based scanning

python waymap.py --target https://example.com --profile high-risk
python waymap.py --target https://example.com --profile critical-risk
python waymap.py --target https://example.com --profile deepscan

7. Verbose mode for detailed output

python waymap.py --target https://example.com --scan xss --verbose
  1. No-prompt mode for automation:
    python waymap.py --multi-target targets.txt --scan cors --no-prompt
    

Thread Configuration

  1. Use threading for faster scans:
    python waymap.py --crawl 3 --target https://example.com --scan ssti --threads 10
    

SQL Injection Techniques

  1. Boolean-based SQLi:

    python waymap.py --target https://example.com --scan sqli --technique B
    
  2. Error-based SQLi:

    python waymap.py --target https://example.com --scan sqli --technique E
    
  3. Time-based SQLi:

    python waymap.py --target https://example.com --scan sqli --technique T
    

Update Check

  1. Ensure you have the latest version:
    python waymap.py --check-updates
    

Check Help

python waymap.py -h

📊 What's New in v7.0.0

Before v7.0.0:

  • Inconsistent output formatting across modules
  • Different color themes for different scans
  • Varying prompt styles
  • Threading inconsistencies
  • Result saving bugs

After v7.0.0:

  • 100% Consistent UI/UX across all 15 modules
  • Professional Output with standardized colors and icons
  • Reliable Threading with proper stop_scan event handling
  • Fixed Result Saving with consistent JSON structure
  • Graceful Exit handling everywhere
  • Verbose Mode for debugging
  • Production Ready with polished user experience

Repository Views Views (After 05-01-2025)

Waymap makes web vulnerability scanning efficient and accessible. Start securing your applications today! 🎯


Credits

  • Thanks SQLMAP For Payloads XML File

Support & Issues

If you face any issues in Waymap, please submit them here: https://github.com/TrixSec/waymap/issues

⭐ Star The Repo And Fork It


Follow Us on Telegram

Stay updated with the latest tools and hacking resources. Join our Telegram Channel by clicking the logo below:

Telegram


Happy Hacking! 🎯

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

waymap-7.1.0.tar.gz (1.3 MB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

waymap-7.1.0-py3-none-any.whl (19.9 kB view details)

Uploaded Python 3

File details

Details for the file waymap-7.1.0.tar.gz.

File metadata

  • Download URL: waymap-7.1.0.tar.gz
  • Upload date:
  • Size: 1.3 MB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.14.0

File hashes

Hashes for waymap-7.1.0.tar.gz
Algorithm Hash digest
SHA256 050056470856c2a59da5439e9f21c22fd00d0d7754b7eecd2bfb35f4213a28cf
MD5 09c39c5a7559cb6c9509c654b4c6843c
BLAKE2b-256 df924860418c1b187dc8d54f3a2d9b5adadf56e45fe114a4f7a17f70b535d84d

See more details on using hashes here.

File details

Details for the file waymap-7.1.0-py3-none-any.whl.

File metadata

  • Download URL: waymap-7.1.0-py3-none-any.whl
  • Upload date:
  • Size: 19.9 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.14.0

File hashes

Hashes for waymap-7.1.0-py3-none-any.whl
Algorithm Hash digest
SHA256 fcd00968471e01cdb00d0f9c9d4429c441903e7b0dbe582ffb7d25540c49f9aa
MD5 10dd5c7924e1fbc72733c7a21ca282d2
BLAKE2b-256 af59d22161de863088a7bd940a2d085abf48dc1d71efb0b743c465cc99006e84

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page