A Burp extension has been developed to evade TLS fingerprinting, allowing users to bypass WAF and spoof any browser. This tool can be used to modify and hide the fingerprint of the TLS connection, making it harder for WAFs to detect and block malicious traffic. More details can be found on the GitHub repository: https://github.com/sleeyax/burp-awesome-tls