This tweet discusses a technique to bypass the Cloudflare Web Application Firewall (WAF). While the specific payload used for bypass is not provided i ...June 27, 2025
This research presents a novel bypass technique targeting LLM-based WAFs, specifically the LLaMA Prompt Guard. The attack exploits the way the WAF use ...June 27, 2025
This tweet shares tips for bypassing a Web Application Firewall (WAF) that blocks the use of the 'alert' function to prevent Cross-Site Scri ...June 27, 2025
This tweet shares a valuable resource for security researchers and bug bounty hunters interested in bypassing Web Application Firewalls (WAFs), specif ...June 26, 2025
WAF Bypass Tool is an open source tool designed to test the security of any Web Application Firewall (WAF). It helps security teams identify false pos ...June 26, 2025
This tweet highlights several important aspects of web application firewall (WAF) bypass and pentesting techniques. First, it mentions database detect ...June 26, 2025
The tweet advises beginners learning about XSS vulnerabilities not to limit themselves to basic alert box pop-ups, which are common in CTF challenges. ...June 25, 2025
This tweet presents a method to bypass the CloudFlare Web Application Firewall (WAF) focusing on Cross-Site Scripting (XSS) vulnerability in 2025. The ...June 25, 2025
The tweet requests information about general WAF bypass techniques beyond using Shodan and censys alternate IP addresses. Since no specific payload or ...June 25, 2025
This tweet discusses a method to bypass the Cloudflare WAF (Web Application Firewall) not by using any IP leaks or complex hacking tricks but by lever ...June 24, 2025
This post is a checklist for bypassing Web Application Firewalls (WAFs). It includes generic techniques that might help bypass different WAFs. One of ...June 24, 2025
This tweet highlights a sophisticated and deep method to bypass Cloudflare's Web Application Firewall (WAF). The bypass technique exploits inhere ...June 24, 2025
This tip highlights a technique to bypass web application firewalls (WAFs) or IP restriction functions by manipulating how IP addresses are represente ...June 24, 2025
This tweet mentions a potential method to bypass a Web Application Firewall (WAF) specifically for stored Cross-Site Scripting (XSS) vulnerabilities. ...June 24, 2025
This tweet describes a reflected cross-site scripting (XSS) vulnerability exploit through an open redirect parameter (u) which is used to execute java ...June 24, 2025
The tweet mentions that the team has good resources to bypass the WAF but does not provide any specific details about the vulnerability type, the WAF ...June 23, 2025
This tweet is about hunting for Cross-Site Scripting (XSS) vulnerabilities and includes tips for bypassing Web Application Firewalls (WAFs). The paylo ...June 23, 2025
This tweet reveals an interesting technique used to bypass Web Application Firewalls (WAF). The user @OriginalSicksec explains how a Link Shortener se ...June 22, 2025
This tweet is about Tencent Cloud EO EdgeOne, a cloud service product that provides an all-in-one security solution including Web Application Firewall ...June 21, 2025
This bypass technique targets SQL Injection (SQLi) vulnerabilities by using JSON-based payloads to evade Web Application Firewall (WAF) detection. Tra ...June 21, 2025
The tweet mentions a technique called payload obfuscation used to bypass Web Application Firewall (WAF) protections. This is a generic method applicab ...June 21, 2025
This tweet alleges an access sale to a large Irish e-commerce platform, mentioning that the access includes the webmaster panel. It claims that a bypa ...June 21, 2025
This tweet introduces a bypass technique called 'Full-Width Unicode Symbols Cheatsheet' which can be used to bypass Web Application Firewall ...June 21, 2025
This tweet mentions an XSS bypass for the T-Sec Web Application Firewall (WAF). However, it does not provide the payload or specific technical details ...June 20, 2025
This tweet shares an experience from Day 17 of a learning challenge where the user learned to use sqlmap, a popular tool for automated SQL injection d ...June 20, 2025
This tweet discusses FFUF, a versatile tool used in web security testing, specifically for tasks such as directory brute-forcing, WAF bypass, paramete ...June 18, 2025
This tweet shares a technique to bypass Web Application Firewalls (WAFs) by manipulating HTTP headers that represent client IP addresses. The command ...June 18, 2025
This tweet mentions WAF bypass techniques specifically targeting stored XSS (Cross-Site Scripting) vulnerabilities. Stored XSS is a type of security f ...June 18, 2025
This tweet discusses a bug bounty technique that involves discovering the origin IP address in order to bypass Web Application Firewall (WAF) protecti ...June 18, 2025
Web Application Firewalls (WAFs) play a crucial role in protecting web applications from Cross-Site Scripting (XSS) attacks by detecting and blocking ...June 18, 2025