Raptor WAF – Web Application Firewall Using DFA

  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  

Raptor WAF is a simple web application firewall made in C, using KISS principle, to make poll use select() function, is not better than epoll() or kqueue() from *BSD but is portable, the core of match engine using DFA to detect XSS, SQLi and path traversal.

Short video:

WAF stands for Web Application Firewall. It is widely used nowadays to detect and defend SQL Injections and XSS.

  • You can block XSS, SQL injection attacks and path traversal with Raptor
  • You can use blacklist of IPs to block some users at config/blacklist ip.txt
  • You can use IPv6 and IPv4 at communications
  • At the future DoS protector, request limit, rule interpreter and Malware detector at uploads.
  • At the future SSL/TLS.

Installation:

git clone https://github.com/CoolerVoid/raptor_wafcd raptor_waf; make; bin/raptor

 

Example:

Up some HTTPd server at port 80

bin/Raptor -h localhost -p 80 -r 8883 -w 4 -o loglog.txt

 

you can test at http://localhost:8883/test.php

For documentation of this tool please visit click here.

Download now: Raptor

The following two tabs change content below.

Unallocated Author

Please note that the article you are reading has an unallocated author as the original author is no longer employed at latesthackingnews.com, this has been put in place to adhere with general data protection regulations (GDPR). If you have any further queries, please contact: [email protected]

Unallocated Author

Please note that the article you are reading has an unallocated author as the original author is no longer employed at latesthackingnews.com, this has been put in place to adhere with general data protection regulations (GDPR). If you have any further queries, please contact: [email protected]

Leave a Reply