When bypassing a WAF, it's important to remember that not every WAF is configured the same way. Customizing your bypass based on other people's research is crucial for success. Each WAF may require a unique approach, so be prepared to adapt and craft your own bypass techniques.
For more details, check out the original tweet here: https://twitter.com/bountyoverload/status/1823285696355873062