Welcome to w3af’s documentation — w3af (original) (raw)
- Docs »
- Welcome to w3af’s documentation
- Edit on GitHub
This document is the user’s guide for the Web Application Attack and Audit Framework (w3af), its goal is to provide a basic overview of what the framework is, how it works and what you can do with it.
w3af is a complete environment for auditing and exploiting Web applications. This environment provides a solid platform for web vulnerability assessments and penetration tests.
Github repository | ![]() |
---|---|
w3af homepage | ![]() |
IRC channel | ![]() |
Users mailing list | ![]() |
Developers mailing list | ![]() |
Twitter feed | ![]() |
Contents¶
- Installation
- Advanced installation
- Updating to the latest version
- Introduction
- Running w3af
- Automation using scripts
- Authentication
- Common use cases
- Advanced use cases
- w3af inside docker
- Scan REST APIs
- Exploiting Web application vulnerabilities
- Web Application Payloads
- Bug reporting
- Contribute
GUI documentation¶
REST API documentation¶
- REST API Introduction
- Starting the REST API service
- Authentication
- Config file format
- Serve using TLS/SSL
- REST API Source code
- REST API clients
- API endpoints
* The /scans/ resource
* The /kb/ resource
* The /version resource
* The /traffic/ resource
* The /urls/ resource
* The /fuzzable-requests/ resource
* The /exceptions/ resource