This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit

OWASP Bywaf Project

Revision as of 08:24, 29 June 2016 by Depasonico (talk | contribs)

Jump to: navigation, search
OWASP Inactive Banner.jpg


ByWaf is back this time we used a framework called Veil this helps us to do the main core of the system for this reason the new ByWaf is called ByWaf RE (requiem)


This framework is a platform to create, store and execute python tools for Web application penetration testing. The main concept was to create something similar to metasploit.



This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or Rafael Gil any later version.

This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.

You should have received a copy of the GNU General Public License along with this program. If not, see <>.



Mail: [email protected]

skype: depasonic0

What is ByWaf?

ByWaf provides:

  • Pentesting tool
  • Auditing tool
  • so on

Quick Guide

Project Leader

Project leader's name:

Quick Download



News and Events

  • Tool presented at OWASP appsec EU in Cambridge June 2014
  • [Nov 15 2013] Beta release
  • [May 4 2014] Release v1.0


Owasp-incubator-trans-85.png Owasp-builders-small.png
Project Type Files TOOL.jpg

On going...


ByWaf is developed by a worldwide team of volunteers. The primary contributors to date have been:

Development team members:

  • Adar Grof
  • Chris Luciano

Testing team members:

  • Luis Brauer


  • Adan Bazan

As of ByWaf, the priorities are:

  • Wafterpreter
  • Base plugins
  • Extra plugins

Involvement in the development and promotion of ByWaf is actively encouraged! You do not have to be a security expert in order to contribute. Some of the ways you can help:

  • Development
  • Researching
  • Promoting

What does this OWASP project offer you?
What releases are available for this project?
what is this project?
Name: N/A
Purpose: Desarrollar una aplicación que agiliza el trabajo de un auditor a la hora de hacer un PenTest, su principal función es la de "detectar, evadir y dar un resultado (vulnerabilidad)" utilizando métodos conocidos de inyección de códigos y otros desarrollados por los integrantes a lo largo de su trayectoria profesional.

Develop an application that streamlines the auditor's job when making a Pen Test. It's main fuction is to detect, evade and display vulnerabilities. The tool works using coding methods developed by our teammembers throughout their experience.

License: GNU GPL v3 License (allows commercial use, but requires that modifications to your code stay open source, thus prohibiting proprietary forks of your project)
who is working on this project?
Project Leader(s):
  • Rafael Gil @
how can you learn more?
Project Pamphlet: Not Yet Created
Project Presentation:
Mailing list: Mailing List Archives
Project Roadmap: View
Key Contacts
  • Contact Rafael Gil @ to contribute to this project
  • Contact Rafael Gil @ to review or sponsor this project
current release
last reviewed release

other releases