Collecting flags by evading, poisoning, stealing, and fooling AI/ML.
-
Updated
Sep 14, 2022 - Jupyter Notebook
Collecting flags by evading, poisoning, stealing, and fooling AI/ML.
Checks if a given website, or list of websites, use the cloudflare service or not.
This script is a powerful and efficient tool for identifying vulnerabilities in web applications. Its multi-threading, fingerprinting, exploit verification, WAF bypass and logging features make it a valuable addition to any security tester's toolkit.
A Machine Learning Based Web Application firewall
A WAF Bypass tool assisting in the use of SQLMap Tampers list according to specific WAF vendors.
A Domain-Recon Automated Tool.
Scanner to send specially crafted requests and catch callbacks of systems that are impacted by log4j log4shell vulnerability and to detect vulnerable log4j versions on your local file-system
🔥 Web application firewalls (WAF) bypass
Firewall bypass script based on shodan search results
Generate primary obfuscated or secondary obfuscated CVE-2021-44228 or CVE-2021-45046 payloads to evade WAF detection.
Guide For WAF Bypass Techniques
Bypassing FILTER_SANITIZE_EMAIL & FILTER_VALIDATE_EMAIL filters in filter_var for SQL Injection ( xD )
php backdoors ( collection )
Bypass WAF SQL Injection SQLMAP
A SOCKS proxy written in Python that randomizes your source IP address. Round-robin your evil packets through SSH tunnels or give them billions of unique source addresses!
Encoder to bypass WAF filters using XOR operations.
REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications
Tool to bypass 403/40X response codes.
🔥 Web-application firewalls (WAFs) from security standpoint.
Add a description, image, and links to the waf-bypass topic page so that developers can more easily learn about it.
To associate your repository with the waf-bypass topic, visit your repo's landing page and select "manage topics."