This bypass technique targets Web Application Firewalls (WAFs) that attempt to block Log4Shell attacks by filtering payloads. Many companies set up th ...August 9, 2025
This tweet suggests that upcoming AI technologies, like GPT-5, could potentially create adaptive payloads that bypass Web Application Firewalls (WAFs) ...August 9, 2025
The tweet talks about a professional bug bounty hunter who found a complex vulnerability involving a 2 click XSS attack. This attack leads to multiple ...August 9, 2025
The tweet mentions a person named Hasan not knowing what a WAF (Web Application Firewall) is or how to bypass one. It does not provide any specific in ...August 8, 2025
The tweet highlights the challenge in web application security of effectively blocking Cross-Site Scripting (XSS) attacks using Web Application Firewa ...August 7, 2025
The tweet introduces BRS-XSS, a next-generation XSS detection suite designed for penetration testers. It features context-aware scanning, WAF bypass c ...August 7, 2025
Cloudflare detected that Perplexity AI used stealth crawlers to bypass protections such as robots.txt and Web Application Firewall (WAF) blocks. These ...August 6, 2025
The tweet describes an experience during bug hunting where the tester attempted an XXE (XML External Entity) attack but found that the developers do n ...August 6, 2025
The tweet highlights a critical security issue identified as CVE-2025-54571 affecting ModSecurity Web Application Firewall (WAF) versions 2.9.11 and b ...August 6, 2025
In a recent security engagement, a classic Cross-Site Scripting (XSS) vulnerability was successfully exploited despite the presence of a restrictive W ...August 5, 2025
This tweet highlights a new research study focused on bypassing Web Application Firewalls (WAFs). The research appears to be innovative and uses a com ...August 5, 2025
This tweet shares a resource about modern WAF (Web Application Firewall) bypass techniques that can be applied to large attack surfaces. Although the ...August 5, 2025
This tweet talks about a complete collection of web shells that are specially designed to bypass Web Application Firewall (WAF) restrictions during fi ...August 5, 2025
The tweet titled 'WAF This Way: Real-World Bypass Tactics from the Trenches' appears to discuss various tactics used to bypass Web Applicati ...August 4, 2025
This tweet announces the release of a resource featuring the top 20 WAF bypass chains. These bypass chains were created using Burp Suite in combinatio ...August 4, 2025
This tweet mentions knowledge related to bypassing security products from Akamai, specifically EDR (Endpoint Detection and Response) and WAF (Web Appl ...August 3, 2025
This tweet points out a bypass technique involving WAF (Web Application Firewall) protection provided by Cloudflare through the use of Proxychain. The ...August 2, 2025
In this blog post, we discuss a recent finding where a team of security researchers, including @0xmagdy and @h_hussein11, successfully bypassed a Web ...August 2, 2025
This tweet suggests a bypass technique for web application firewalls (WAFs) where prepending junk data to the payload can help bypass detection. Unlik ...July 30, 2025
This tweet highlights two methods for bypassing web application firewalls (WAFs) commonly used to protect web applications. First is Parameter Polluti ...July 30, 2025
This blogpost talks about a Web Application Firewall (WAF) bypass related to F5 WAFs and reverse proxies. F5 is a well-known vendor providing security ...July 30, 2025
CerberusX Tool is a new security tool designed to detect multiple types of Cross-Site Scripting (XSS) vulnerabilities. It also features automatic craw ...July 30, 2025
This tweet discusses a situation where a security researcher or attacker has identified a possible SQL injection (SQLi) vulnerability in a target webs ...July 30, 2025
The tweet is a request asking for an approach on how to bypass a Web Application Firewall (WAF) for Cross-Site Scripting (XSS) vulnerabilities. It doe ...July 29, 2025
The tweet hints at a possible way to bypass a Web Application Firewall (WAF) by changing the user agent (UA) to a mobile browser UA string. The idea i ...July 29, 2025
This tweet recommends using HTTP Request Smuggler as a top plugin in Burp Suite for effective bypass of Web Application Firewalls (WAFs) via HTTP requ ...July 29, 2025
The tweet highlights a significant cybersecurity concern about Web Application Firewalls (WAFs), specifically Cloud Armor's 2024 policy. It sugge ...July 28, 2025
This tweet shares a penetration testing tip regarding bypassing Web Application Firewall (WAF) protections. It suggests that instead of scanning JavaS ...July 28, 2025
This tweet claims a method to bypass a Web Application Firewall (WAF) specifically to exploit Stored Cross-Site Scripting (XSS) vulnerabilities. The a ...July 28, 2025