commands
// 2026-01-05
// ID: REF-Wapiti Command List
Wapiti Command List
Wapiti Command Guide
Wapiti is a web application vulnerability scanner. It performs "black-box" scans (it doesn't study the source code) of the web application by crawling the webpages of the deployed webapp, looking for scripts and forms where it can inject data.
Top 10 Useful Commands
1. Basic Scan
wapiti -u http://example.com
Explanation: Standard scan.
2. Scope
wapiti -u http://example.com -s folder
Explanation: Limit scope to the URL folder.
3. Modules
wapiti -u http://example.com -m xss,sql_blind
Explanation: Only test for XSS and Blind SQLi.
4. Auth
wapiti -u http://example.com -a user%password
Explanation: Basic authentication.
5. Cookie
wapiti -u http://example.com -c cookie.json
Explanation: Load cookies from file.
6. Exclude URL
wapiti -u http://example.com -x http://example.com/logout
Explanation: Do not scan logout page.
7. Output Format
wapiti -u http://example.com -f html -o report.html
Explanation: Generate HTML report.
8. Timeout
wapiti -u http://example.com --timeout 10
Explanation: Set request timeout.
9. Level (Depth)
wapiti -u http://example.com -d 5
Explanation: Crawling depth.
10. Verify SSL
wapiti -u https://example.com --verify-ssl 0
Explanation: Disable SSL verification.
The Most Powerful Command
wapiti -u http://target.com -m all -f html -o report.html --color
Explanation: Full module scan with a readable HTML report output.