This tweet discusses bypassing a WAF on an Nginx server using a specific bypass payload. The user mentions that the target was not their own site but ...September 4, 2025
This tweet talks about an old SSRF (Server-Side Request Forgery) vulnerability finding where the author was able to bypass the Akamai WAF (Web Applica ...September 4, 2025
This WAF bypass technique is specific to targets using the fetch API. If the web application firewall (WAF) target relies on fetch for requests, this ...September 4, 2025
This tweet highlights how skilled penetration testers bypass Web Application Firewalls (WAFs) to uncover vulnerabilities that might be hidden behind f ...September 4, 2025
The tweet shares two links to blogs that likely discuss methods for bypassing WAF (Web Application Firewall) protections. Although the exact vulnerabi ...September 3, 2025
This tweet announces Cyber Napoleon, an enterprise-grade cybersecurity framework that includes machine learning components like Random Forest and SVM, ...September 3, 2025
This writeup explains two important findings related to Cloudflare's WAF and server protection. The first part covers a bypass technique targetin ...September 3, 2025
This tweet highlights an issue with Cloudflare's 'Bot Fight Mode', a security feature designed to protect websites from malicious bots. ...September 3, 2025
This tweet highlights a beautiful and instructive bypass technique for cross-site scripting (XSS) vulnerabilities on web application firewalls (WAFs). ...September 2, 2025
Cloudflare Security Research Analysts announced a new Web Application Firewall (WAF) rule deployment to address a critical vulnerability tracked as CV ...September 2, 2025
This bypass technique is called Zero-Width Space Injection. It is used to evade Web Application Firewalls (WAFs) by injecting zero-width space charact ...September 2, 2025
This tweet discusses the default configuration of the Cloudflare Web Application Firewall (WAF). It notes that the default Cloudflare WAF setup mainly ...September 2, 2025
This tweet by Ibtissam Hammadi highlights an automated approach to bypassing Web Application Firewalls (WAFs) using Python programming and fuzzing tec ...September 1, 2025
The tweet is in Persian and recommends reading a write-up shared via a link. It states that the write-up explains the entire process from fuzzing to W ...August 31, 2025
This tweet discusses an attempt to execute a Cross-Site Scripting (XSS) attack that was blocked by the Akamai Web Application Firewall (WAF). The user ...August 31, 2025
This tweet highlights the importance of focusing on finding critical security bugs, particularly SQL Injection (SQLi), rather than spending time on Cr ...August 31, 2025
This tweet reveals a complex bypass technique aimed at circumventing Web Application Firewalls (WAFs) that filter XSS (Cross-Site Scripting) payloads ...August 30, 2025
Botasaurus is a powerful and excellent framework written in Python designed for building web scrapers that are nearly undefeatable by current Web Appl ...August 29, 2025
This tweet shares a method to bypass Web Application Firewalls (WAFs) to perform Cross-Site Scripting (XSS) attacks in the URL context. The bypass tec ...August 29, 2025
The tweet is a question asking whether a specific security tool can bypass a Web Application Firewall (WAF). It does not provide details about a parti ...August 29, 2025
This tweet mentions a great WAF bypass for client side path traversal vulnerability. Client side path traversal means the attacker can manipulate the ...August 29, 2025
This tweet mentions a detected pattern that can bypass a Web Application Firewall (WAF). The user found this pattern effective on two different target ...August 29, 2025
This tweet asks how to bypass Cloudflare WAF, but it doesn't provide any specific bypass payload or technical details. Therefore, we can discuss ...August 28, 2025
This tweet gives advice for beginners in bug bounty hunting. It suggests starting with less secure websites that are not protected by a Web Applicatio ...August 28, 2025
This tweet from a user is asking about bypassing firewall rules in Vercel, a cloud platform for hosting projects. The user wants to create a system by ...August 27, 2025
This tweet is about bypassing or creating custom firewall rules in the context of Vercel's hosting platform. The user is asking how to create a s ...August 27, 2025
This tweet is about advanced level cybersecurity research and skills. It mentions doing research and simulation projects related to Web Application Fi ...August 27, 2025
The tweet discusses 8 sneaky bypass attempts used by hackers in 2025 to evade Web Application Firewalls (WAFs). The focus is on the vendor SafeLine an ...August 27, 2025
This tweet discusses findings related to web security vulnerabilities found during exploration without bypassing any Web Application Firewall (WAF) or ...August 26, 2025
This report highlights an advanced WAF bypass tactic employed by Perplexity, targeting Cloudflare's protections and robots.txt rules. The bypass ...August 24, 2025