The YAWAST Antecedent Web Application Security Toolkit
YAWAST is an application meant to simplify initial analysis and information gathering for penetration testers and security auditors. It performs basic checks in these categories:
- TLS/SSL - Versions and cipher suites supported; common issues.
- Information Disclosure - Checks for common information leaks.
- Presence of Files or Directories - Checks for files or directories that could indicate a security issue.
- Common Vulnerabilities
- Missing Security Headers
This is meant to provide a easy way to perform initial analysis and information discovery. It's not a full testing suite, and it certainly isn't Metasploit. The idea is to provide a quick way to perform initial data collection, which can then be used to better target further tests. It is especially useful when used in conjunction with Burp Suite (via the
- Checks Performed
- Usage & Parameters
- Scanning TLS/SSL
- Sample Output
Please see yawast.org for full documentation.
The most common usage scenario is as simple as:
yawast scan <url1> <url2>
Detailed usage information is available on the YAWAST web site.
- Fork it (https://github.com/adamcaudill/yawast/fork)
- Create your feature branch (
git checkout -b my-new-feature origin/develop)
- Commit your changes (
git commit -am 'Add some feature')
- Push to the branch (
git push origin my-new-feature)
- Create a new Pull Request
Issues that are labeled as beginner are great starting points for new contributors. These are less complex issues that will help make you familiar with working on YAWAST.
Contributions, in the form of feature requests and pull requests are both welcome and encouraged. YAWAST will only evolve if users are willing and able to give back, and work too make YAWAST better for everyone.
Information on development standards, and guidelines for issues are available in our CONTRIBUTING document.