Waymap CLI Usage

Command reference for Waymap v7.2.0. This page mirrors the project's usage.md and covers every CLI option with examples.

Quick Command Patterns

# Basic scan
python waymap.py --target https://example.com --scan xss --crawl 2

# Full scan with reports
python waymap.py --target https://example.com --scan all --report-format html,csv --output-dir reports

# Multi-target scan
python waymap.py --multi-target targets.txt --scan sqli

# API scan (REST / GraphQL)
python waymap.py --target https://api.example.com --scan api --api-type rest
python waymap.py --target https://api.example.com/graphql --scan api --api-type graphql

# WordPress profile
python waymap.py --target https://example.com --profile wordpress

# Google dork discovery
python waymap.py --dork "inurl:.php?id="
Tip: after PyPI install you can use waymap instead of python waymap.py.

Full CLI Synopsis

python waymap.py [--target URL | --multi-target FILE] [--scan TYPE] [--crawl N] [--threads N]
                [--profile wordpress]
                [--technique BET]
                [--api-type rest|graphql] [--api-endpoints /users,/login]
                [--auth-type form|basic|digest|bearer|api_key]
                [--auth-url URL] [--username USER] [--password PASS]
                [--token TOKEN] [--auth-header HEADER]
                [--report-format html,csv,markdown,pdf] [--output-dir DIR]
                [--dork "query"] [--dork-api-key KEY] [--dork-output FILE]
                [--wpscan-token TOKEN]
                [--check-waf] [--waf URL] [--check-updates]
                [--no-prompt] [--verbose]

Target Options

--target / -t

Single target URL to scan.

python waymap.py --target https://example.com --scan recon

--multi-target / -mt

File containing one target URL per line.

python waymap.py --multi-target targets.txt --scan misconfig

Scan Configuration

--scan / -s

Select a scan type.

Standard / Core scans

Module-based scans

python waymap.py --target https://example.com --scan recon
python waymap.py --target https://example.com --scan injection-advanced
python waymap.py --target https://example.com --scan cache-smuggling

--crawl / -c

Crawl depth for target discovery (0–10).

python waymap.py --target https://example.com --scan xss --crawl 3

--threads

Thread count for scan operations.

python waymap.py --target https://example.com --scan all --threads 4

--technique / -k

SQLi technique string: B (boolean), E (error), T (time).

python waymap.py --target "https://example.com/page.php?id=1" --scan sqli --technique BET

--profile / -p

Run a scan profile (currently: wordpress).

python waymap.py --target https://example.com --profile wordpress

Authentication

Supported --auth-type: form, basic, digest, bearer, api_key.

# Form auth
python waymap.py --target https://example.com --scan all \
  --auth-type form --auth-url https://example.com/login \
  --username admin --password pass

# Bearer token
python waymap.py --target https://example.com --scan api \
  --auth-type bearer --token "YOUR_TOKEN"

# API key
python waymap.py --target https://example.com --scan api \
  --auth-type api_key --token "API_KEY" --auth-header "X-API-Key"

API Scanning

# REST API scan
python waymap.py --target https://api.example.com --scan api --api-type rest

# GraphQL API scan
python waymap.py --target https://api.example.com/graphql --scan api --api-type graphql

# REST scan with explicit endpoints
python waymap.py --target https://api.example.com --scan api --api-type rest \
  --api-endpoints /users,/login,/tokens

Discovery (Google Dorks)

python waymap.py --dork "inurl:.php?id="
python waymap.py --dork "site:example.com inurl:?" --dork-output custom_targets.txt

WPScan API

python waymap.py --target https://example.com --profile wordpress --wpscan-token "TOKEN"

WAF Detection

python waymap.py --target https://example.com --check-waf
python waymap.py --waf https://example.com

Reporting

python waymap.py --target https://example.com --scan all \
  --report-format html,csv,markdown --output-dir reports

Utility & UX

python waymap.py --check-updates
python waymap.py --target https://example.com --scan all --no-prompt
python waymap.py --target https://example.com --scan recon --verbose

Results are stored in sessions/<domain>/waymap_full_results.json.