<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Depasonico</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Depasonico"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Depasonico"/>
		<updated>2026-05-07T05:40:56Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Bywaf_Project&amp;diff=218388</id>
		<title>OWASP Bywaf Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Bywaf_Project&amp;diff=218388"/>
				<updated>2016-06-29T12:49:26Z</updated>
		
		<summary type="html">&lt;p&gt;Depasonico: /* Quick Download */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:100px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[Image:OWASP Inactive Banner.jpg|800px| link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Inactive_Projects]] &amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==ByWaf==&lt;br /&gt;
&lt;br /&gt;
ByWaf is back this time we used a framework called Veil this helps us to do the main core of the system for this reason the new ByWaf is called ByWaf RE (requiem) &lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
This framework is a platform to create, store and execute python tools for Web application penetration testing.&lt;br /&gt;
The main concept was to create something similar to metasploit.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
As part of this framework different components are provided to help contributors to add their own tools and execute them through ByWaf RE.&lt;br /&gt;
&lt;br /&gt;
==Setup==&lt;br /&gt;
&lt;br /&gt;
You need to run setup.sh to configure the tool and environment under: setup/setup.sh&lt;br /&gt;
ByWaf Re is portable using python standard libraries however for Windows environment some components and functionality is limited.&lt;br /&gt;
&lt;br /&gt;
  ./setup&lt;br /&gt;
&lt;br /&gt;
      -c|--clean    = Force Clean Install Of Any Dependencies&lt;br /&gt;
      -s|--silent   = Automates the installation&lt;br /&gt;
      -h|--help     = Show This Help Menu &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Execution==&lt;br /&gt;
&lt;br /&gt;
ByWaf Re has two modes to operate one is a simple command line execution where the functionality is just informational.&lt;br /&gt;
&lt;br /&gt;
  --update Update ByWaf to the latest version at github&lt;br /&gt;
  --version Displays version and quits&lt;br /&gt;
&lt;br /&gt;
The second mode is the interactive mode in order to run it:&lt;br /&gt;
&lt;br /&gt;
   ./bywaf.py or python bywaf.py&lt;br /&gt;
&lt;br /&gt;
==Features==&lt;br /&gt;
&lt;br /&gt;
[+] Auto-tab&lt;br /&gt;
&lt;br /&gt;
[+] Auto-fill&lt;br /&gt;
&lt;br /&gt;
[+] Internal commands:&lt;br /&gt;
   [-] info&lt;br /&gt;
   [-] options&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
This program is free software: you can redistribute it and/or modify&lt;br /&gt;
it under the terms of the GNU General Public License as published by&lt;br /&gt;
the Free Software Foundation, either version 3 of the License, or&lt;br /&gt;
Rafael Gil any later version.&lt;br /&gt;
&lt;br /&gt;
This program is distributed in the hope that it will be useful,&lt;br /&gt;
but WITHOUT ANY WARRANTY; without even the implied warranty of&lt;br /&gt;
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the&lt;br /&gt;
GNU General Public License for more details.&lt;br /&gt;
&lt;br /&gt;
You should have received a copy of the GNU General Public License&lt;br /&gt;
along with this program.  If not, see &amp;lt;http://www.gnu.org/licenses/&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
Contact:&lt;br /&gt;
&lt;br /&gt;
Home: https://www.owasp.org/index.php/OWASP_Bywaf_Project&lt;br /&gt;
&lt;br /&gt;
Mail: rafael.gillarios@owasp.org&lt;br /&gt;
&lt;br /&gt;
skype: depasonic0&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is ByWaf? ==&lt;br /&gt;
&lt;br /&gt;
ByWaf  provides:&lt;br /&gt;
&lt;br /&gt;
* Pentesting tool&lt;br /&gt;
* Auditing tool&lt;br /&gt;
* so on&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Project leader's name:&lt;br /&gt;
&lt;br /&gt;
* [mailto:rafael.gillarios@owasp.org Rafael Gil]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/depasonico/ByWaf-RE GitHub]&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
[http://wingware.com/ Wingware]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Tool presented at OWASP appsec EU in Cambridge June 2014&lt;br /&gt;
* [Nov 15 2013] Beta release&lt;br /&gt;
* [May  4 2014] Release v1.0&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
 {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=Breakers]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
&lt;br /&gt;
[[File:Bywaf_setup.JPG]]&lt;br /&gt;
&lt;br /&gt;
  [+] Setup execution&lt;br /&gt;
&lt;br /&gt;
[[File:ByWaf_RE_Main_Menu.jpeg]]&lt;br /&gt;
&lt;br /&gt;
  [+] ByWaf RE Main Menu in interactive mode&lt;br /&gt;
&lt;br /&gt;
[[File:Bywaf_payload_menu.JPG]]&lt;br /&gt;
&lt;br /&gt;
  [+] Payload menu&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
ByWaf is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
Veil Team:&lt;br /&gt;
&lt;br /&gt;
[https://www.veil-framework.com/ Thank you All]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of ByWaf, the priorities are:&lt;br /&gt;
* Create more payloads&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of ByWaf is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Development&lt;br /&gt;
* Researching&lt;br /&gt;
* Promoting&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_description =Desarrollar una aplicación  que agiliza el trabajo de un auditor a la hora de hacer un PenTest, su principal función es la de &amp;quot;detectar, evadir y dar un resultado (vulnerabilidad)&amp;quot; utilizando métodos conocidos de inyección de códigos y otros desarrollados por los integrantes a lo largo de su trayectoria profesional.&lt;br /&gt;
Develop an application that streamlines the auditor's job when making a Pen Test. It's main fuction is to detect, evade and display vulnerabilities. The tool works using coding methods developed by our teammembers throughout their experience.&lt;br /&gt;
|&lt;br /&gt;
| project_license =GNU GPL v3 License  (allows commercial use, but requires that modifications to your code stay open source, thus prohibiting proprietary forks of your project)&lt;br /&gt;
| leader_name1 =Rafael Gil&lt;br /&gt;
| leader_email1 =rafael.gillarios@owasp.org&lt;br /&gt;
| mailing_list_name = https://lists.owasp.org/mailman/listinfo/owasp_bywaf_project&lt;br /&gt;
| project_road_map = https://www.owasp.org/index.php/Projects/OWASP_Bywaf_Project/Roadmap&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP Tool]]&lt;/div&gt;</summary>
		<author><name>Depasonico</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Bywaf_Project&amp;diff=218373</id>
		<title>OWASP Bywaf Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Bywaf_Project&amp;diff=218373"/>
				<updated>2016-06-29T09:57:49Z</updated>
		
		<summary type="html">&lt;p&gt;Depasonico: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:100px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[Image:OWASP Inactive Banner.jpg|800px| link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Inactive_Projects]] &amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==ByWaf==&lt;br /&gt;
&lt;br /&gt;
ByWaf is back this time we used a framework called Veil this helps us to do the main core of the system for this reason the new ByWaf is called ByWaf RE (requiem) &lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
This framework is a platform to create, store and execute python tools for Web application penetration testing.&lt;br /&gt;
The main concept was to create something similar to metasploit.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
As part of this framework different components are provided to help contributors to add their own tools and execute them through ByWaf RE.&lt;br /&gt;
&lt;br /&gt;
==Setup==&lt;br /&gt;
&lt;br /&gt;
You need to run setup.sh to configure the tool and environment under: setup/setup.sh&lt;br /&gt;
ByWaf Re is portable using python standard libraries however for Windows environment some components and functionality is limited.&lt;br /&gt;
&lt;br /&gt;
  ./setup&lt;br /&gt;
&lt;br /&gt;
      -c|--clean    = Force Clean Install Of Any Dependencies&lt;br /&gt;
      -s|--silent   = Automates the installation&lt;br /&gt;
      -h|--help     = Show This Help Menu &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Execution==&lt;br /&gt;
&lt;br /&gt;
ByWaf Re has two modes to operate one is a simple command line execution where the functionality is just informational.&lt;br /&gt;
&lt;br /&gt;
  --update Update ByWaf to the latest version at github&lt;br /&gt;
  --version Displays version and quits&lt;br /&gt;
&lt;br /&gt;
The second mode is the interactive mode in order to run it:&lt;br /&gt;
&lt;br /&gt;
   ./bywaf.py or python bywaf.py&lt;br /&gt;
&lt;br /&gt;
==Features==&lt;br /&gt;
&lt;br /&gt;
[+] Auto-tab&lt;br /&gt;
&lt;br /&gt;
[+] Auto-fill&lt;br /&gt;
&lt;br /&gt;
[+] Internal commands:&lt;br /&gt;
   [-] info&lt;br /&gt;
   [-] options&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
This program is free software: you can redistribute it and/or modify&lt;br /&gt;
it under the terms of the GNU General Public License as published by&lt;br /&gt;
the Free Software Foundation, either version 3 of the License, or&lt;br /&gt;
Rafael Gil any later version.&lt;br /&gt;
&lt;br /&gt;
This program is distributed in the hope that it will be useful,&lt;br /&gt;
but WITHOUT ANY WARRANTY; without even the implied warranty of&lt;br /&gt;
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the&lt;br /&gt;
GNU General Public License for more details.&lt;br /&gt;
&lt;br /&gt;
You should have received a copy of the GNU General Public License&lt;br /&gt;
along with this program.  If not, see &amp;lt;http://www.gnu.org/licenses/&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
Contact:&lt;br /&gt;
&lt;br /&gt;
Home: https://www.owasp.org/index.php/OWASP_Bywaf_Project&lt;br /&gt;
&lt;br /&gt;
Mail: rafael.gillarios@owasp.org&lt;br /&gt;
&lt;br /&gt;
skype: depasonic0&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is ByWaf? ==&lt;br /&gt;
&lt;br /&gt;
ByWaf  provides:&lt;br /&gt;
&lt;br /&gt;
* Pentesting tool&lt;br /&gt;
* Auditing tool&lt;br /&gt;
* so on&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Project leader's name:&lt;br /&gt;
&lt;br /&gt;
* [mailto:rafael.gillarios@owasp.org Rafael Gil]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* https://github.com/depasonico/OWASP-ByWaf&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
[http://wingware.com/ Wingware]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Tool presented at OWASP appsec EU in Cambridge June 2014&lt;br /&gt;
* [Nov 15 2013] Beta release&lt;br /&gt;
* [May  4 2014] Release v1.0&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
 {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=Breakers]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
&lt;br /&gt;
[[File:Bywaf_setup.JPG]]&lt;br /&gt;
&lt;br /&gt;
  [+] Setup execution&lt;br /&gt;
&lt;br /&gt;
[[File:ByWaf_RE_Main_Menu.jpeg]]&lt;br /&gt;
&lt;br /&gt;
  [+] ByWaf RE Main Menu in interactive mode&lt;br /&gt;
&lt;br /&gt;
[[File:Bywaf_payload_menu.JPG]]&lt;br /&gt;
&lt;br /&gt;
  [+] Payload menu&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
ByWaf is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
Veil Team:&lt;br /&gt;
&lt;br /&gt;
[https://www.veil-framework.com/ Thank you All]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of ByWaf, the priorities are:&lt;br /&gt;
* Create more payloads&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of ByWaf is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Development&lt;br /&gt;
* Researching&lt;br /&gt;
* Promoting&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_description =Desarrollar una aplicación  que agiliza el trabajo de un auditor a la hora de hacer un PenTest, su principal función es la de &amp;quot;detectar, evadir y dar un resultado (vulnerabilidad)&amp;quot; utilizando métodos conocidos de inyección de códigos y otros desarrollados por los integrantes a lo largo de su trayectoria profesional.&lt;br /&gt;
Develop an application that streamlines the auditor's job when making a Pen Test. It's main fuction is to detect, evade and display vulnerabilities. The tool works using coding methods developed by our teammembers throughout their experience.&lt;br /&gt;
|&lt;br /&gt;
| project_license =GNU GPL v3 License  (allows commercial use, but requires that modifications to your code stay open source, thus prohibiting proprietary forks of your project)&lt;br /&gt;
| leader_name1 =Rafael Gil&lt;br /&gt;
| leader_email1 =rafael.gillarios@owasp.org&lt;br /&gt;
| mailing_list_name = https://lists.owasp.org/mailman/listinfo/owasp_bywaf_project&lt;br /&gt;
| project_road_map = https://www.owasp.org/index.php/Projects/OWASP_Bywaf_Project/Roadmap&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP Tool]]&lt;/div&gt;</summary>
		<author><name>Depasonico</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Bywaf_payload_menu.JPG&amp;diff=218372</id>
		<title>File:Bywaf payload menu.JPG</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Bywaf_payload_menu.JPG&amp;diff=218372"/>
				<updated>2016-06-29T09:55:52Z</updated>
		
		<summary type="html">&lt;p&gt;Depasonico: Payload menu&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Payload menu&lt;/div&gt;</summary>
		<author><name>Depasonico</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Bywaf_setup.JPG&amp;diff=218370</id>
		<title>File:Bywaf setup.JPG</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Bywaf_setup.JPG&amp;diff=218370"/>
				<updated>2016-06-29T09:53:48Z</updated>
		
		<summary type="html">&lt;p&gt;Depasonico: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Depasonico</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:ByWaf_RE_Main_Menu.jpeg&amp;diff=218367</id>
		<title>File:ByWaf RE Main Menu.jpeg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:ByWaf_RE_Main_Menu.jpeg&amp;diff=218367"/>
				<updated>2016-06-29T09:44:07Z</updated>
		
		<summary type="html">&lt;p&gt;Depasonico: This is the main window for interactive mode.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is the main window for interactive mode.&lt;/div&gt;</summary>
		<author><name>Depasonico</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Bywaf_Project&amp;diff=218366</id>
		<title>OWASP Bywaf Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Bywaf_Project&amp;diff=218366"/>
				<updated>2016-06-29T09:37:44Z</updated>
		
		<summary type="html">&lt;p&gt;Depasonico: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:100px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[Image:OWASP Inactive Banner.jpg|800px| link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Inactive_Projects]] &amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==ByWaf==&lt;br /&gt;
&lt;br /&gt;
ByWaf is back this time we used a framework called Veil this helps us to do the main core of the system for this reason the new ByWaf is called ByWaf RE (requiem) &lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
This framework is a platform to create, store and execute python tools for Web application penetration testing.&lt;br /&gt;
The main concept was to create something similar to metasploit.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
As part of this framework different components are provided to help contributors to add their own tools and execute them through ByWaf RE.&lt;br /&gt;
&lt;br /&gt;
==Setup==&lt;br /&gt;
&lt;br /&gt;
You need to run setup.sh to configure the tool and environment under: setup/setup.sh&lt;br /&gt;
ByWaf Re is portable using python standard libraries however for Windows environment some components and functionality is limited.&lt;br /&gt;
&lt;br /&gt;
  ./setup&lt;br /&gt;
&lt;br /&gt;
      -c|--clean    = Force Clean Install Of Any Dependencies&lt;br /&gt;
      -s|--silent   = Automates the installation&lt;br /&gt;
      -h|--help     = Show This Help Menu &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Execution==&lt;br /&gt;
&lt;br /&gt;
ByWaf Re has two modes to operate one is a simple command line execution where the functionality is just informational.&lt;br /&gt;
&lt;br /&gt;
  --update Update ByWaf to the latest version at github&lt;br /&gt;
  --version Displays version and quits&lt;br /&gt;
&lt;br /&gt;
The second mode is the interactive mode in order to run it:&lt;br /&gt;
&lt;br /&gt;
   ./bywaf.py or python bywaf.py&lt;br /&gt;
&lt;br /&gt;
==Features==&lt;br /&gt;
&lt;br /&gt;
[+] Auto-tab&lt;br /&gt;
&lt;br /&gt;
[+] Auto-fill&lt;br /&gt;
&lt;br /&gt;
[+] Internal commands:&lt;br /&gt;
   [-] info&lt;br /&gt;
   [-] options&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
This program is free software: you can redistribute it and/or modify&lt;br /&gt;
it under the terms of the GNU General Public License as published by&lt;br /&gt;
the Free Software Foundation, either version 3 of the License, or&lt;br /&gt;
Rafael Gil any later version.&lt;br /&gt;
&lt;br /&gt;
This program is distributed in the hope that it will be useful,&lt;br /&gt;
but WITHOUT ANY WARRANTY; without even the implied warranty of&lt;br /&gt;
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the&lt;br /&gt;
GNU General Public License for more details.&lt;br /&gt;
&lt;br /&gt;
You should have received a copy of the GNU General Public License&lt;br /&gt;
along with this program.  If not, see &amp;lt;http://www.gnu.org/licenses/&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
Contact:&lt;br /&gt;
&lt;br /&gt;
Home: https://www.owasp.org/index.php/OWASP_Bywaf_Project&lt;br /&gt;
&lt;br /&gt;
Mail: rafael.gillarios@owasp.org&lt;br /&gt;
&lt;br /&gt;
skype: depasonic0&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is ByWaf? ==&lt;br /&gt;
&lt;br /&gt;
ByWaf  provides:&lt;br /&gt;
&lt;br /&gt;
* Pentesting tool&lt;br /&gt;
* Auditing tool&lt;br /&gt;
* so on&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Project leader's name:&lt;br /&gt;
&lt;br /&gt;
* [mailto:rafael.gillarios@owasp.org Rafael Gil]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* https://github.com/depasonico/OWASP-ByWaf&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
[http://wingware.com/ Wingware]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Tool presented at OWASP appsec EU in Cambridge June 2014&lt;br /&gt;
* [Nov 15 2013] Beta release&lt;br /&gt;
* [May  4 2014] Release v1.0&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
 {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=Breakers]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
On going...&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
ByWaf is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Development team members:&lt;br /&gt;
&lt;br /&gt;
* Adar Grof&lt;br /&gt;
* Chris Luciano&lt;br /&gt;
&lt;br /&gt;
Testing team members:&lt;br /&gt;
&lt;br /&gt;
* Luis Brauer&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* Adan Bazan&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of ByWaf, the priorities are:&lt;br /&gt;
* Wafterpreter&lt;br /&gt;
* Base plugins&lt;br /&gt;
* Extra plugins&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of ByWaf is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Development&lt;br /&gt;
* Researching&lt;br /&gt;
* Promoting&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_description =Desarrollar una aplicación  que agiliza el trabajo de un auditor a la hora de hacer un PenTest, su principal función es la de &amp;quot;detectar, evadir y dar un resultado (vulnerabilidad)&amp;quot; utilizando métodos conocidos de inyección de códigos y otros desarrollados por los integrantes a lo largo de su trayectoria profesional.&lt;br /&gt;
Develop an application that streamlines the auditor's job when making a Pen Test. It's main fuction is to detect, evade and display vulnerabilities. The tool works using coding methods developed by our teammembers throughout their experience.&lt;br /&gt;
|&lt;br /&gt;
| project_license =GNU GPL v3 License  (allows commercial use, but requires that modifications to your code stay open source, thus prohibiting proprietary forks of your project)&lt;br /&gt;
| leader_name1 =Rafael Gil&lt;br /&gt;
| leader_email1 =rafael.gillarios@owasp.org&lt;br /&gt;
| mailing_list_name = https://lists.owasp.org/mailman/listinfo/owasp_bywaf_project&lt;br /&gt;
| project_road_map = https://www.owasp.org/index.php/Projects/OWASP_Bywaf_Project/Roadmap&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP Tool]]&lt;/div&gt;</summary>
		<author><name>Depasonico</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Bywaf_Project&amp;diff=218365</id>
		<title>OWASP Bywaf Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Bywaf_Project&amp;diff=218365"/>
				<updated>2016-06-29T09:36:31Z</updated>
		
		<summary type="html">&lt;p&gt;Depasonico: /* Description */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:100px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[Image:OWASP Inactive Banner.jpg|800px| link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Inactive_Projects]] &amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==ByWaf==&lt;br /&gt;
&lt;br /&gt;
ByWaf is back this time we used a framework called Veil this helps us to do the main core of the system for this reason the new ByWaf is called ByWaf RE (requiem) &lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
This framework is a platform to create, store and execute python tools for Web application penetration testing.&lt;br /&gt;
The main concept was to create something similar to metasploit.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
As part of this framework different components are provided to help contributors to add their own tools and execute them through ByWaf RE.&lt;br /&gt;
&lt;br /&gt;
=Setup=&lt;br /&gt;
&lt;br /&gt;
You need to run setup.sh to configure the tool and environment under: setup/setup.sh&lt;br /&gt;
ByWaf Re is portable using python standard libraries however for Windows environment some components and functionality is limited.&lt;br /&gt;
&lt;br /&gt;
  ./setup&lt;br /&gt;
&lt;br /&gt;
      -c|--clean    = Force Clean Install Of Any Dependencies&lt;br /&gt;
      -s|--silent   = Automates the installation&lt;br /&gt;
      -h|--help     = Show This Help Menu &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Execution=&lt;br /&gt;
&lt;br /&gt;
ByWaf Re has two modes to operate one is a simple command line execution where the functionality is just informational.&lt;br /&gt;
&lt;br /&gt;
  --update Update ByWaf to the latest version at github&lt;br /&gt;
  --version Displays version and quits&lt;br /&gt;
&lt;br /&gt;
The second mode is the interactive mode in order to run it:&lt;br /&gt;
&lt;br /&gt;
   ./bywaf.py or python bywaf.py&lt;br /&gt;
&lt;br /&gt;
=Features=&lt;br /&gt;
&lt;br /&gt;
[+] Auto-tab&lt;br /&gt;
&lt;br /&gt;
[+] Auto-fill&lt;br /&gt;
&lt;br /&gt;
[+] Internal commands:&lt;br /&gt;
   [-] info&lt;br /&gt;
   [-] options&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
This program is free software: you can redistribute it and/or modify&lt;br /&gt;
it under the terms of the GNU General Public License as published by&lt;br /&gt;
the Free Software Foundation, either version 3 of the License, or&lt;br /&gt;
Rafael Gil any later version.&lt;br /&gt;
&lt;br /&gt;
This program is distributed in the hope that it will be useful,&lt;br /&gt;
but WITHOUT ANY WARRANTY; without even the implied warranty of&lt;br /&gt;
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the&lt;br /&gt;
GNU General Public License for more details.&lt;br /&gt;
&lt;br /&gt;
You should have received a copy of the GNU General Public License&lt;br /&gt;
along with this program.  If not, see &amp;lt;http://www.gnu.org/licenses/&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
Contact:&lt;br /&gt;
&lt;br /&gt;
Home: https://www.owasp.org/index.php/OWASP_Bywaf_Project&lt;br /&gt;
&lt;br /&gt;
Mail: rafael.gillarios@owasp.org&lt;br /&gt;
&lt;br /&gt;
skype: depasonic0&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is ByWaf? ==&lt;br /&gt;
&lt;br /&gt;
ByWaf  provides:&lt;br /&gt;
&lt;br /&gt;
* Pentesting tool&lt;br /&gt;
* Auditing tool&lt;br /&gt;
* so on&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Quick Guide ==&lt;br /&gt;
&lt;br /&gt;
* http://youtu.be/frpT7vQdzCc&lt;br /&gt;
* http://youtu.be/KWlsYZCzAIA&lt;br /&gt;
* http://youtu.be/KpRVVlWN2tQ&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Project leader's name:&lt;br /&gt;
&lt;br /&gt;
* [mailto:rafael.gillarios@owasp.org Rafael Gil]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* https://github.com/depasonico/OWASP-ByWaf&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
[http://wingware.com/ Wingware]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Tool presented at OWASP appsec EU in Cambridge June 2014&lt;br /&gt;
* [Nov 15 2013] Beta release&lt;br /&gt;
* [May  4 2014] Release v1.0&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
 {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=Breakers]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
On going...&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
ByWaf is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Development team members:&lt;br /&gt;
&lt;br /&gt;
* Adar Grof&lt;br /&gt;
* Chris Luciano&lt;br /&gt;
&lt;br /&gt;
Testing team members:&lt;br /&gt;
&lt;br /&gt;
* Luis Brauer&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* Adan Bazan&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of ByWaf, the priorities are:&lt;br /&gt;
* Wafterpreter&lt;br /&gt;
* Base plugins&lt;br /&gt;
* Extra plugins&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of ByWaf is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Development&lt;br /&gt;
* Researching&lt;br /&gt;
* Promoting&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_description =Desarrollar una aplicación  que agiliza el trabajo de un auditor a la hora de hacer un PenTest, su principal función es la de &amp;quot;detectar, evadir y dar un resultado (vulnerabilidad)&amp;quot; utilizando métodos conocidos de inyección de códigos y otros desarrollados por los integrantes a lo largo de su trayectoria profesional.&lt;br /&gt;
Develop an application that streamlines the auditor's job when making a Pen Test. It's main fuction is to detect, evade and display vulnerabilities. The tool works using coding methods developed by our teammembers throughout their experience.&lt;br /&gt;
|&lt;br /&gt;
| project_license =GNU GPL v3 License  (allows commercial use, but requires that modifications to your code stay open source, thus prohibiting proprietary forks of your project)&lt;br /&gt;
| leader_name1 =Rafael Gil&lt;br /&gt;
| leader_email1 =rafael.gillarios@owasp.org&lt;br /&gt;
| mailing_list_name = https://lists.owasp.org/mailman/listinfo/owasp_bywaf_project&lt;br /&gt;
| project_road_map = https://www.owasp.org/index.php/Projects/OWASP_Bywaf_Project/Roadmap&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP Tool]]&lt;/div&gt;</summary>
		<author><name>Depasonico</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Bywaf_Project&amp;diff=218364</id>
		<title>OWASP Bywaf Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Bywaf_Project&amp;diff=218364"/>
				<updated>2016-06-29T09:36:16Z</updated>
		
		<summary type="html">&lt;p&gt;Depasonico: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:100px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[Image:OWASP Inactive Banner.jpg|800px| link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Inactive_Projects]] &amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==ByWaf==&lt;br /&gt;
&lt;br /&gt;
ByWaf is back this time we used a framework called Veil this helps us to do the main core of the system for this reason the new ByWaf is called ByWaf RE (requiem) &lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
This framework is a platform to create, store and execute python tools for Web application penetration testing.&lt;br /&gt;
The main concept was to create something similar to metasploit.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
As part of this framework different components are provided to help contributors to add their own tools and execute them through ByWaf RE.&lt;br /&gt;
&lt;br /&gt;
In order to use the tool the following steps need to be followed:&lt;br /&gt;
&lt;br /&gt;
=Setup=&lt;br /&gt;
&lt;br /&gt;
You need to run setup.sh to configure the tool and environment under: setup/setup.sh&lt;br /&gt;
ByWaf Re is portable using python standard libraries however for Windows environment some components and functionality is limited.&lt;br /&gt;
&lt;br /&gt;
  ./setup&lt;br /&gt;
&lt;br /&gt;
      -c|--clean    = Force Clean Install Of Any Dependencies&lt;br /&gt;
      -s|--silent   = Automates the installation&lt;br /&gt;
      -h|--help     = Show This Help Menu &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Execution=&lt;br /&gt;
&lt;br /&gt;
ByWaf Re has two modes to operate one is a simple command line execution where the functionality is just informational.&lt;br /&gt;
&lt;br /&gt;
  --update Update ByWaf to the latest version at github&lt;br /&gt;
  --version Displays version and quits&lt;br /&gt;
&lt;br /&gt;
The second mode is the interactive mode in order to run it:&lt;br /&gt;
&lt;br /&gt;
   ./bywaf.py or python bywaf.py&lt;br /&gt;
&lt;br /&gt;
=Features=&lt;br /&gt;
&lt;br /&gt;
[+] Auto-tab&lt;br /&gt;
&lt;br /&gt;
[+] Auto-fill&lt;br /&gt;
&lt;br /&gt;
[+] Internal commands:&lt;br /&gt;
   [-] info&lt;br /&gt;
   [-] options&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
This program is free software: you can redistribute it and/or modify&lt;br /&gt;
it under the terms of the GNU General Public License as published by&lt;br /&gt;
the Free Software Foundation, either version 3 of the License, or&lt;br /&gt;
Rafael Gil any later version.&lt;br /&gt;
&lt;br /&gt;
This program is distributed in the hope that it will be useful,&lt;br /&gt;
but WITHOUT ANY WARRANTY; without even the implied warranty of&lt;br /&gt;
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the&lt;br /&gt;
GNU General Public License for more details.&lt;br /&gt;
&lt;br /&gt;
You should have received a copy of the GNU General Public License&lt;br /&gt;
along with this program.  If not, see &amp;lt;http://www.gnu.org/licenses/&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
Contact:&lt;br /&gt;
&lt;br /&gt;
Home: https://www.owasp.org/index.php/OWASP_Bywaf_Project&lt;br /&gt;
&lt;br /&gt;
Mail: rafael.gillarios@owasp.org&lt;br /&gt;
&lt;br /&gt;
skype: depasonic0&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is ByWaf? ==&lt;br /&gt;
&lt;br /&gt;
ByWaf  provides:&lt;br /&gt;
&lt;br /&gt;
* Pentesting tool&lt;br /&gt;
* Auditing tool&lt;br /&gt;
* so on&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Quick Guide ==&lt;br /&gt;
&lt;br /&gt;
* http://youtu.be/frpT7vQdzCc&lt;br /&gt;
* http://youtu.be/KWlsYZCzAIA&lt;br /&gt;
* http://youtu.be/KpRVVlWN2tQ&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Project leader's name:&lt;br /&gt;
&lt;br /&gt;
* [mailto:rafael.gillarios@owasp.org Rafael Gil]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* https://github.com/depasonico/OWASP-ByWaf&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
[http://wingware.com/ Wingware]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Tool presented at OWASP appsec EU in Cambridge June 2014&lt;br /&gt;
* [Nov 15 2013] Beta release&lt;br /&gt;
* [May  4 2014] Release v1.0&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
 {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=Breakers]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
On going...&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
ByWaf is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Development team members:&lt;br /&gt;
&lt;br /&gt;
* Adar Grof&lt;br /&gt;
* Chris Luciano&lt;br /&gt;
&lt;br /&gt;
Testing team members:&lt;br /&gt;
&lt;br /&gt;
* Luis Brauer&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* Adan Bazan&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of ByWaf, the priorities are:&lt;br /&gt;
* Wafterpreter&lt;br /&gt;
* Base plugins&lt;br /&gt;
* Extra plugins&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of ByWaf is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Development&lt;br /&gt;
* Researching&lt;br /&gt;
* Promoting&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_description =Desarrollar una aplicación  que agiliza el trabajo de un auditor a la hora de hacer un PenTest, su principal función es la de &amp;quot;detectar, evadir y dar un resultado (vulnerabilidad)&amp;quot; utilizando métodos conocidos de inyección de códigos y otros desarrollados por los integrantes a lo largo de su trayectoria profesional.&lt;br /&gt;
Develop an application that streamlines the auditor's job when making a Pen Test. It's main fuction is to detect, evade and display vulnerabilities. The tool works using coding methods developed by our teammembers throughout their experience.&lt;br /&gt;
|&lt;br /&gt;
| project_license =GNU GPL v3 License  (allows commercial use, but requires that modifications to your code stay open source, thus prohibiting proprietary forks of your project)&lt;br /&gt;
| leader_name1 =Rafael Gil&lt;br /&gt;
| leader_email1 =rafael.gillarios@owasp.org&lt;br /&gt;
| mailing_list_name = https://lists.owasp.org/mailman/listinfo/owasp_bywaf_project&lt;br /&gt;
| project_road_map = https://www.owasp.org/index.php/Projects/OWASP_Bywaf_Project/Roadmap&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP Tool]]&lt;/div&gt;</summary>
		<author><name>Depasonico</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Bywaf_Project&amp;diff=218363</id>
		<title>OWASP Bywaf Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Bywaf_Project&amp;diff=218363"/>
				<updated>2016-06-29T09:34:14Z</updated>
		
		<summary type="html">&lt;p&gt;Depasonico: /* Description */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:100px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[Image:OWASP Inactive Banner.jpg|800px| link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Inactive_Projects]] &amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==ByWaf==&lt;br /&gt;
&lt;br /&gt;
ByWaf is back this time we used a framework called Veil this helps us to do the main core of the system for this reason the new ByWaf is called ByWaf RE (requiem) &lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
This framework is a platform to create, store and execute python tools for Web application penetration testing.&lt;br /&gt;
The main concept was to create something similar to metasploit.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
As part of this framework different components are provided to help contributors to add their own tools and execute them through ByWaf RE.&lt;br /&gt;
&lt;br /&gt;
In order to use the tool the following steps need to be followed:&lt;br /&gt;
&lt;br /&gt;
=Setup=&lt;br /&gt;
&lt;br /&gt;
You need to run setup.sh to configure the tool and environment under: setup/setup.sh&lt;br /&gt;
ByWaf Re is portable using python standard libraries however for Windows environment some components and functionality is limited.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Execution=&lt;br /&gt;
&lt;br /&gt;
ByWaf Re has two modes to operate one is a simple command line execution where the functionality is just informational.&lt;br /&gt;
&lt;br /&gt;
  --update Update ByWaf to the latest version at github&lt;br /&gt;
  --version Displays version and quits&lt;br /&gt;
&lt;br /&gt;
The second mode is the interactive mode in order to run it:&lt;br /&gt;
&lt;br /&gt;
   ./bywaf.py or python bywaf.py&lt;br /&gt;
&lt;br /&gt;
=Features=&lt;br /&gt;
&lt;br /&gt;
[+] Auto-tab&lt;br /&gt;
&lt;br /&gt;
[+] Auto-fill&lt;br /&gt;
&lt;br /&gt;
[+] Internal commands:&lt;br /&gt;
   [-] info&lt;br /&gt;
   [-] options&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
This program is free software: you can redistribute it and/or modify&lt;br /&gt;
it under the terms of the GNU General Public License as published by&lt;br /&gt;
the Free Software Foundation, either version 3 of the License, or&lt;br /&gt;
Rafael Gil any later version.&lt;br /&gt;
&lt;br /&gt;
This program is distributed in the hope that it will be useful,&lt;br /&gt;
but WITHOUT ANY WARRANTY; without even the implied warranty of&lt;br /&gt;
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the&lt;br /&gt;
GNU General Public License for more details.&lt;br /&gt;
&lt;br /&gt;
You should have received a copy of the GNU General Public License&lt;br /&gt;
along with this program.  If not, see &amp;lt;http://www.gnu.org/licenses/&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
Contact:&lt;br /&gt;
&lt;br /&gt;
Home: https://www.owasp.org/index.php/OWASP_Bywaf_Project&lt;br /&gt;
&lt;br /&gt;
Mail: rafael.gillarios@owasp.org&lt;br /&gt;
&lt;br /&gt;
skype: depasonic0&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is ByWaf? ==&lt;br /&gt;
&lt;br /&gt;
ByWaf  provides:&lt;br /&gt;
&lt;br /&gt;
* Pentesting tool&lt;br /&gt;
* Auditing tool&lt;br /&gt;
* so on&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Quick Guide ==&lt;br /&gt;
&lt;br /&gt;
* http://youtu.be/frpT7vQdzCc&lt;br /&gt;
* http://youtu.be/KWlsYZCzAIA&lt;br /&gt;
* http://youtu.be/KpRVVlWN2tQ&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Project leader's name:&lt;br /&gt;
&lt;br /&gt;
* [mailto:rafael.gillarios@owasp.org Rafael Gil]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* https://github.com/depasonico/OWASP-ByWaf&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
[http://wingware.com/ Wingware]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Tool presented at OWASP appsec EU in Cambridge June 2014&lt;br /&gt;
* [Nov 15 2013] Beta release&lt;br /&gt;
* [May  4 2014] Release v1.0&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
 {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=Breakers]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
On going...&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
ByWaf is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Development team members:&lt;br /&gt;
&lt;br /&gt;
* Adar Grof&lt;br /&gt;
* Chris Luciano&lt;br /&gt;
&lt;br /&gt;
Testing team members:&lt;br /&gt;
&lt;br /&gt;
* Luis Brauer&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* Adan Bazan&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of ByWaf, the priorities are:&lt;br /&gt;
* Wafterpreter&lt;br /&gt;
* Base plugins&lt;br /&gt;
* Extra plugins&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of ByWaf is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Development&lt;br /&gt;
* Researching&lt;br /&gt;
* Promoting&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_description =Desarrollar una aplicación  que agiliza el trabajo de un auditor a la hora de hacer un PenTest, su principal función es la de &amp;quot;detectar, evadir y dar un resultado (vulnerabilidad)&amp;quot; utilizando métodos conocidos de inyección de códigos y otros desarrollados por los integrantes a lo largo de su trayectoria profesional.&lt;br /&gt;
Develop an application that streamlines the auditor's job when making a Pen Test. It's main fuction is to detect, evade and display vulnerabilities. The tool works using coding methods developed by our teammembers throughout their experience.&lt;br /&gt;
|&lt;br /&gt;
| project_license =GNU GPL v3 License  (allows commercial use, but requires that modifications to your code stay open source, thus prohibiting proprietary forks of your project)&lt;br /&gt;
| leader_name1 =Rafael Gil&lt;br /&gt;
| leader_email1 =rafael.gillarios@owasp.org&lt;br /&gt;
| mailing_list_name = https://lists.owasp.org/mailman/listinfo/owasp_bywaf_project&lt;br /&gt;
| project_road_map = https://www.owasp.org/index.php/Projects/OWASP_Bywaf_Project/Roadmap&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP Tool]]&lt;/div&gt;</summary>
		<author><name>Depasonico</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Bywaf_Project&amp;diff=218347</id>
		<title>OWASP Bywaf Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Bywaf_Project&amp;diff=218347"/>
				<updated>2016-06-29T08:24:41Z</updated>
		
		<summary type="html">&lt;p&gt;Depasonico: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:100px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[Image:OWASP Inactive Banner.jpg|800px| link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Inactive_Projects]] &amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==ByWaf==&lt;br /&gt;
&lt;br /&gt;
ByWaf is back this time we used a framework called Veil this helps us to do the main core of the system for this reason the new ByWaf is called ByWaf RE (requiem) &lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
This framework is a platform to create, store and execute python tools for Web application penetration testing.&lt;br /&gt;
The main concept was to create something similar to metasploit.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
This program is free software: you can redistribute it and/or modify&lt;br /&gt;
it under the terms of the GNU General Public License as published by&lt;br /&gt;
the Free Software Foundation, either version 3 of the License, or&lt;br /&gt;
Rafael Gil any later version.&lt;br /&gt;
&lt;br /&gt;
This program is distributed in the hope that it will be useful,&lt;br /&gt;
but WITHOUT ANY WARRANTY; without even the implied warranty of&lt;br /&gt;
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the&lt;br /&gt;
GNU General Public License for more details.&lt;br /&gt;
&lt;br /&gt;
You should have received a copy of the GNU General Public License&lt;br /&gt;
along with this program.  If not, see &amp;lt;http://www.gnu.org/licenses/&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
Contact:&lt;br /&gt;
&lt;br /&gt;
Home: https://www.owasp.org/index.php/OWASP_Bywaf_Project&lt;br /&gt;
&lt;br /&gt;
Mail: rafael.gillarios@owasp.org&lt;br /&gt;
&lt;br /&gt;
skype: depasonic0&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is ByWaf? ==&lt;br /&gt;
&lt;br /&gt;
ByWaf  provides:&lt;br /&gt;
&lt;br /&gt;
* Pentesting tool&lt;br /&gt;
* Auditing tool&lt;br /&gt;
* so on&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Quick Guide ==&lt;br /&gt;
&lt;br /&gt;
* http://youtu.be/frpT7vQdzCc&lt;br /&gt;
* http://youtu.be/KWlsYZCzAIA&lt;br /&gt;
* http://youtu.be/KpRVVlWN2tQ&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Project leader's name:&lt;br /&gt;
&lt;br /&gt;
* [mailto:rafael.gillarios@owasp.org Rafael Gil]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* https://github.com/depasonico/OWASP-ByWaf&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
[http://wingware.com/ Wingware]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Tool presented at OWASP appsec EU in Cambridge June 2014&lt;br /&gt;
* [Nov 15 2013] Beta release&lt;br /&gt;
* [May  4 2014] Release v1.0&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
 {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=Breakers]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
On going...&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
ByWaf is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Development team members:&lt;br /&gt;
&lt;br /&gt;
* Adar Grof&lt;br /&gt;
* Chris Luciano&lt;br /&gt;
&lt;br /&gt;
Testing team members:&lt;br /&gt;
&lt;br /&gt;
* Luis Brauer&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* Adan Bazan&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of ByWaf, the priorities are:&lt;br /&gt;
* Wafterpreter&lt;br /&gt;
* Base plugins&lt;br /&gt;
* Extra plugins&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of ByWaf is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Development&lt;br /&gt;
* Researching&lt;br /&gt;
* Promoting&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_description =Desarrollar una aplicación  que agiliza el trabajo de un auditor a la hora de hacer un PenTest, su principal función es la de &amp;quot;detectar, evadir y dar un resultado (vulnerabilidad)&amp;quot; utilizando métodos conocidos de inyección de códigos y otros desarrollados por los integrantes a lo largo de su trayectoria profesional.&lt;br /&gt;
Develop an application that streamlines the auditor's job when making a Pen Test. It's main fuction is to detect, evade and display vulnerabilities. The tool works using coding methods developed by our teammembers throughout their experience.&lt;br /&gt;
|&lt;br /&gt;
| project_license =GNU GPL v3 License  (allows commercial use, but requires that modifications to your code stay open source, thus prohibiting proprietary forks of your project)&lt;br /&gt;
| leader_name1 =Rafael Gil&lt;br /&gt;
| leader_email1 =rafael.gillarios@owasp.org&lt;br /&gt;
| mailing_list_name = https://lists.owasp.org/mailman/listinfo/owasp_bywaf_project&lt;br /&gt;
| project_road_map = https://www.owasp.org/index.php/Projects/OWASP_Bywaf_Project/Roadmap&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP Tool]]&lt;/div&gt;</summary>
		<author><name>Depasonico</name></author>	</entry>

	</feed>