This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit

Project Information:template Best Practices: Use of Web Application Firewalls

Revision as of 18:10, 13 January 2009 by Paulo Coimbra (talk | contribs) (New page: ---- {| style="width:100%" border="0" align="center" ! colspan="8" align="center" style="background:#4058A0; color:white"|<font color="white">'''PROJECT INFORMATION''' |- | style="widt...)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

Project Name OWASP Wapiti Project
Web application vulnerability scanner / security auditor
Short Project Description

Wapiti allows to audit the security of web applications in an easy way. It performs a "black-box" scans acting like a fuzzer, injecting payloads to see if an application is vulnerable. It has two principal parts, a crawler that explores the pages of the application and the attack module that injects the payloads and evaluates their responses. Wapiti is easy to use and it can detect the most common vulnerabilities (XSS, SQL Injection, File Handler Errors...). It provides to the user a complete report (html format) with the found vulnerabilities.

Key Project Information Project Leader
Nicolas Surribas
Project Contibutors
Alberto Pastor Nieto
David del Pozo González
Mailing List
Subscribe here
Use here
GNU Lesser General Public License
Project Type
if any, add link
Release Status Main Links Related Projects
Provisory Apha Quality
(under review)
Please see here for complete information.

OWASP Wapiti Project
Project's Sourceforge Repository

ICT Romulus Project