This tweet is about advanced level cybersecurity research and skills. It mentions doing research and simulation projects related to Web Application Fi ...August 27, 2025
The tweet discusses 8 sneaky bypass attempts used by hackers in 2025 to evade Web Application Firewalls (WAFs). The focus is on the vendor SafeLine an ...August 27, 2025
This tweet discusses findings related to web security vulnerabilities found during exploration without bypassing any Web Application Firewall (WAF) or ...August 26, 2025
This report highlights an advanced WAF bypass tactic employed by Perplexity, targeting Cloudflare's protections and robots.txt rules. The bypass ...August 24, 2025
This tweet announces a new video where the author will try to bypass a WAF (Web Application Firewall) to test if it really protects a website. Along w ...August 24, 2025
This is a bypass for Akami WAF targeting Reflected XSS vulnerabilities. The payload uses a clever encoding technique that triggers an alert dialog by ...August 24, 2025
This post is about a WAF bypass for Akami WAF specifically targeting reflected Cross-Site Scripting (XSS) vulnerabilities. The payload used to bypass ...August 23, 2025
This tweet discusses a live hacking event called 1337UP0522 where the author found several interesting ways to bypass the ModSecurity Core Rule Set (C ...August 23, 2025
SQLMap AI v2.0.0 is a new release of the popular SQLMap tool, now enhanced with AI capabilities. It integrates multiple AI providers like Groq, OpenAI ...August 23, 2025
The tweet by @fa3487 mentions excitement about testing new Web Application Firewall (WAF) bypass features, but does not provide specific details about ...August 23, 2025
This tweet shares a new technique discovered to bypass Web Application Firewalls (WAFs) from Akamai and Cloudflare. The bypass specifically targets vu ...August 22, 2025
This tweet is a general statement indicating that there are continuous discoveries of new methods to bypass Web Application Firewalls (WAFs). The user ...August 22, 2025
This tweet reveals a Web Application Firewall (WAF) bypass technique targeting Akamai and Cloudflare WAFs. The bypass involves using a complex and obf ...August 22, 2025
This tweet praises Brutelogic's blogpost for being one of the best resources for XSS (Cross-Site Scripting) vulnerabilities. The user is asking t ...August 22, 2025
This tweet provides a brief checklist for bug hunters focusing on security vulnerabilities and bypass techniques. The tweet highlights an advanced Ser ...August 21, 2025
This tweet humorously describes a bug hunter's checklist when hunting for security vulnerabilities. The focus is on finding a Server-Side Request ...August 21, 2025
This tweet highlights an interesting bypass technique for context-aware Web Application Firewalls (WAFs) that struggle with HTML attribute encoding. E ...August 21, 2025
This tweet talks about a WAF bypass related to Server-Side Template Injection (SSTI). It indicates that if a WAF is blocking basic SSTI payloads such ...August 21, 2025
This tweet discusses modern Web Application Firewalls (WAFs) and their effectiveness against attacks. It mentions a new e-book that deeply examines ho ...August 20, 2025
This tweet describes a bypass technique for a Web Application Firewall (WAF) where the WAF was blocking the payload that included '//' seque ...August 20, 2025
This tweet indicates that the user has successfully bypassed a Web Application Firewall (WAF). The tweet mentions doing a bypass on WAF but does not p ...August 20, 2025
A recent partial Proof of Concept (PoC) exploit has been released for the authentication bypass vulnerability affecting Fortinet's FortiWeb Web A ...August 18, 2025
This tweet highlights an important security challenge: hackers often bypass Web Application Firewalls (WAFs) to exploit vulnerabilities that the firew ...August 18, 2025
This tweet is a question from a user asking about how others are able to bypass Web Application Firewalls (WAFs) such as Cloudflare and ModSecurity wh ...August 17, 2025
This tweet highlights a common scenario in web application security testing where a tester tries to bypass a Web Application Firewall (WAF) using a si ...August 17, 2025
This tweet suggests a methodology for finding potential targets for WAF bypass or other vulnerabilities using public internet scanning services like C ...August 17, 2025
A new security alert has been raised for FortiWeb WAF, a web application firewall. A cybersecurity researcher has published a Proof of Concept (PoC) e ...August 17, 2025
The tweet mentions a first WAF bypass but does not provide any specific information about the type of vulnerability, payload used, or WAF vendor. Ther ...August 16, 2025
This tweet refers to a blog or report about eight different sneaky WAF (Web Application Firewall) bypass attempts that hackers are expected to use in ...August 16, 2025
This WAF bypass involves adding a comma inside a string payload to evade detection. The original payload "soloboy");alert(origin);//" i ...August 16, 2025