Skip to content

Shiva108/waesG2

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

24 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

WAES - Web Auto Enum & Scanner

License: MIT Bash CI

⚠️ Security Notice: Never commit API keys, credentials, or sensitive data. Use config/secrets.sh.example as a template and store actual secrets in secrets.sh (git-ignored). See SECURITY.md for details.

WAES (Web Auto Enum & Scanner) is a professional-grade bash-based web enumeration and reconnaissance platform designed for Capture The Flag (CTF) competitions, Bug Bounty hunting, and Penetration Testing engagements.

Features

  • 🎯 Multi-Stage Scanning: Fast, Full, Deep, and Advanced scan modes
  • πŸ”§ Profile-Driven: Pre-configured YAML profiles for different use cases
  • πŸ›‘οΈ WAF Detection & Evasion: Automatic firewall detection with bypass techniques
  • πŸ” Comprehensive Enumeration: DNS, subdomain, metadata, cloud bucket scanning
  • πŸ” Security Testing: SSL/TLS, XSS, SQLi, CMS, API, authentication testing
  • πŸš€ Advanced Scanning: Nuclei integration, fuzzing, JavaScript analysis
  • πŸ“Š Professional Reporting: HTML, JSON, CSV, XML, and Markdown exports
  • πŸ’Ύ State Management: Resume interrupted scans from where they left off
  • πŸ”Œ Extensible: Plugin system for custom integrations
  • 🐳 Container-Ready: Full Docker and Docker Compose support

Quick Start

Installation

# Clone the repository
git clone https://github.com/yourusername/waesG2.git
cd waesG2

# Run the installer
sudo ./install.sh

# Make waesG2.sh executable
chmod +x waesG2.sh

Basic Usage

# Fast reconnaissance scan
./waesG2.sh -u example.com -t fast

# Full scan with standard profile
./waesG2.sh -u https://example.com --profile web-app

# Advanced scan with all modules
./waesG2.sh -u example.com -t advanced

# Bug bounty profile
./waesG2.sh -u example.com --profile bug-bounty

# CTF optimized scan
./waesG2.sh -u 10.10.10.10 --profile ctf-box

# Dry run (test without scanning)
./waesG2.sh -u example.com --profile quick-scan --dry-run

Scan Types

Type Duration Description
fast 2-3 min Quick reconnaissance (WAF, tech fingerprint, HTTP enum)
full 10-15 min Balanced scan (fast + deep + standard nmap)
deep 30-45 min In-depth analysis (fuzzing, security tests)
advanced 45-60 min Complete assessment (all modules)

Scan Profiles

Profile Use Case Duration Key Features
quick-scan Fast recon 2-3 min DNS, tech fingerprint, WAF detect
web-app Standard assessment 10-15 min SSL, XSS, CMS, JS analysis
bug-bounty Bug hunting 20-30 min All security tests, OSINT, nuclei
ctf-box CTF competition 5-10 min SQLi, fuzzing, writeup gen, chains

Command Line Options

Usage: ./waesG2.sh [OPTIONS]

Required:
  -u, --url <target>           Target URL, IP, or domain

Scan Options:
  -t, --type <type>            Scan type: fast|full|deep|advanced (default: full)
  -p, --port <port>            Target port (default: 80/443)
  --profile <name>             Load scan profile (quick-scan|web-app|bug-bounty|ctf-box)

Features:
  --ssl-analyze                Enable SSL/TLS analysis
  --xss                        Enable XSS scanning
  --sqli                       Enable SQL injection testing
  --cms                        Enable CMS detection and scanning
  --nuclei                     Enable Nuclei vulnerability scanning
  --osint                      Enable OSINT enumeration
  --fuzzing                    Enable fuzzing attacks
  --dry-run                    Test without actual scanning

Control:
  -r, --resume                 Resume previous scan
  --stealth <level>            Stealth mode: low|medium|high|paranoid
  -o, --output <dir>           Output directory (default: ./report)

Information:
  -h, --help                   Show this help message
  --list-profiles              List available scan profiles
  --version                    Show version information

Directory Structure

waesG2/
β”œβ”€β”€ waesG2.sh               # Main entry point
β”œβ”€β”€ install.sh              # Dependency installer
β”œβ”€β”€ test_waesG2.sh          # Comprehensive test suite
β”œβ”€β”€ config/                 # Configuration files
β”‚   β”œβ”€β”€ config.sh           # Main configuration
β”‚   β”œβ”€β”€ config.sh.example   # Example configuration
β”‚   └── secrets.sh.example  # API keys template (NEVER commit actual keys!)
β”œβ”€β”€ lib/                    # Core library modules
β”œβ”€β”€ profiles/               # Scan profiles (YAML)
β”œβ”€β”€ plugins/                # Extension plugins
β”œβ”€β”€ tools/                  # Helper utilities
β”œβ”€β”€ logs/                   # Test results and logs
β”œβ”€β”€ report/                 # Scan output (generated)
└── docs/                   # Documentation

Requirements

  • OS: Linux (Kali, Debian, Ubuntu, Arch, RHEL)
  • Bash: Version 4.0 or higher
  • Tools: nmap, nikto, gobuster, wafw00f, sslscan, and more (auto-installed)
  • Privileges: Root/sudo for network scanning

Documentation

Troubleshooting

Common Issues

Issue Solution
Permission denied Run with sudo or fix permissions: chmod +x waesG2.sh
command not found: nmap Run sudo ./install.sh to install dependencies
Test timeouts Add --dry-run flag to test without network calls
Profile not found Check profile name with --list-profiles
State file errors Delete old state files: rm -f report/.waesG2_state_*.json

Debug Mode

# Enable verbose output
./waesG2.sh -u example.com -t fast -v

# Check script syntax
bash -n waesG2.sh
bash -n lib/*.sh

# Run tests
./test_waesG2.sh

Docker Usage

# Build the image
docker build -t waesG2:latest .

# Run a scan
docker run --rm -v $(pwd)/report:/opt/waesG2/report waesG2:latest -u example.com

# Using Docker Compose
docker-compose up -d

Contributing

Contributions are welcome! Please read our Contributing Guidelines and Code of Conduct before submitting pull requests.

Security

See SECURITY.md for security policies and responsible disclosure.

License

This project is licensed under the MIT License - see the LICENSE file for details.

Disclaimer

⚠️ This tool is provided for educational and authorized testing purposes only. Unauthorized access to computer systems is illegal. Always obtain proper authorization before conducting security assessments. The authors are not responsible for misuse.

Author

WAES Project Team

Acknowledgments

  • All the amazing open-source security tools integrated into WAES
  • The security research community
  • Contributors and testers

Version: 1.0.0
Status: Active Development
Tests: CI

About

No description, website, or topics provided.

Resources

License

Code of conduct

Contributing

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages