WVAT is an open-source CLI tool to analyse a domain, its subdomains and respective pages, extracting the used technologies to find their vulnerabilities in order to cross-reference them with known exploits.
To contribute, please refer to Contributing.
$ npm install -g wvat
$ wvat COMMAND
running command...
$ wvat (-v|--version|version)
wvat/1.4.0 linux-x64 node-v10.16.3
$ wvat --help [COMMAND]
USAGE
$ wvat COMMAND
...
wvat about [COMMAND]
wvat analyse DOMAIN
wvat crawl DOMAIN
wvat cves TECHNOLOGY
wvat error-codes
wvat exploits CVE
wvat help [COMMAND]
wvat inspect URL
wvat update-cve-cache
wvat whois DOMAIN
Describes WVAT and its functionalities
USAGE
$ wvat about [COMMAND]
ARGUMENTS
COMMAND name of the command to obtain its description, args, flags and examples
EXAMPLES
about
about whois
See code: src/commands/about.js
Generate full domain report
USAGE
$ wvat analyse DOMAIN
ARGUMENTS
DOMAIN domain to search subdomains
OPTIONS
-c, --config=config
Wvat config json file path
Imports a json file with the following fields:
"allow_data_reporting"[default: false] - Allows us to collect information on error
"webtech_command"[default: null] - How to call webtech
"amass_path"[default: "bin/amass"] - path to amass executable
-d, --depth=depth
[default: 2] Maximum page crawling depth
-g, --graph
Generate a graph of subdomains
-j, --noCveCache
Search without using local CVE cache
-k, --crawlingTimeout=crawlingTimeout
Subdomains crawling timeout
-n, --noCrawlingCache
Perform page crawling without using cache
-t, --timeout=timeout
Maximum application execution time (in seconds)
-u, --updateCveCache
Force update the local CVE cache
-v, --verbose
Verbose Mode (outputs all messages to screen)
-w, --whitelist=whitelist
Text file with subdomains to analyze
EXAMPLES
analyse https://www.google.com
analyse https://www.youtube.com -d 2 --verbose
analyse https://www.github.com -t 10 --noCveCache --noCrawlingCache
See code: src/commands/analyse.js
Searches for all subdomains for a given domain
USAGE
$ wvat crawl DOMAIN
ARGUMENTS
DOMAIN domain to search subdomains
OPTIONS
-c, --config=config
Wvat config json file path
Imports a json file with the following fields:
"allow_data_reporting"[default: false] - Allows us to collect information on error
"webtech_command"[default: null] - How to call webtech
"amass_path"[default: "bin/amass"] - path to amass executable
-d, --depth=depth
[default: 2] Maximum page crawling depth
-g, --graph
Generate a graph of subdomains
-k, --crawlingTimeout=crawlingTimeout
Subdomains crawling timeout
-n, --noCrawlingCache
Perform page crawling without using cache
-t, --timeout=timeout
Maximum application execution time (in seconds)
-v, --verbose
Verbose Mode (outputs all messages to screen)
-w, --whitelist=whitelist
Text file with subdomains to analyze
See code: src/commands/crawl.js
Searches CVEs for a given technology
USAGE
$ wvat cves TECHNOLOGY
ARGUMENTS
TECHNOLOGY technology to search CVEs
OPTIONS
-c, --config=config
Wvat config json file path
Imports a json file with the following fields:
"allow_data_reporting"[default: false] - Allows us to collect information on error
"webtech_command"[default: null] - How to call webtech
"amass_path"[default: "bin/amass"] - path to amass executable
-d, --depth=depth
[default: 2] Maximum page crawling depth
-g, --graph
Generate a graph of subdomains
-j, --noCveCache
Search without using local CVE cache
-k, --crawlingTimeout=crawlingTimeout
Subdomains crawling timeout
-n, --noCrawlingCache
Perform page crawling without using cache
-t, --timeout=timeout
Maximum application execution time (in seconds)
-u, --updateCveCache
Force update the local CVE cache
-v, --verbose
Verbose Mode (outputs all messages to screen)
-w, --whitelist=whitelist
Text file with subdomains to analyze
EXAMPLES
cves "React Native" --noCveCache
cves "Windows Server" --updateCveCache
See code: src/commands/cves.js
Displays the meaning of the possible error codes generated by the tool
USAGE
$ wvat error-codes
See code: src/commands/error-codes.js
Searches known exploits for a given CVE
USAGE
$ wvat exploits CVE
ARGUMENTS
CVE CVE to search know exploits
See code: src/commands/exploits.js
display help for wvat
USAGE
$ wvat help [COMMAND]
ARGUMENTS
COMMAND command to show help for
OPTIONS
--all see all commands in CLI
See code: @oclif/plugin-help
Analyses a given webpage and displays its technologies
USAGE
$ wvat inspect URL
ARGUMENTS
URL Webpage URL
OPTIONS
-c, --config=config Wvat config json file path
Imports a json file with the following fields:
"allow_data_reporting"[default: false] - Allows us to collect information on error
"webtech_command"[default: null] - How to call webtech
"amass_path"[default: "bin/amass"] - path to amass executable
-t, --timeout=timeout Maximum application execution time (in seconds)
-v, --verbose Verbose Mode (outputs all messages to screen)
See code: src/commands/inspect.js
Updates local CVE cache file
USAGE
$ wvat update-cve-cache
See code: src/commands/update-cve-cache.js
Searches for network information for a given domain
USAGE
$ wvat whois DOMAIN
ARGUMENTS
DOMAIN domain to obtain network information
OPTIONS
-c, --config=config Wvat config json file path
Imports a json file with the following fields:
"allow_data_reporting"[default: false] - Allows us to collect information on error
"webtech_command"[default: null] - How to call webtech
"amass_path"[default: "bin/amass"] - path to amass executable
-t, --timeout=timeout Maximum application execution time (in seconds)
-v, --verbose Verbose Mode (outputs all messages to screen)
EXAMPLES
whois google.com
whois youtube.com --verbose
See code: src/commands/whois.js