The tweet introduces Recon Reasoner, which is described as an AI-enhanced reconnaissance tool. This tool is designed to assist security researchers an ...July 8, 2025
This tweet suggests a discussion about bypassing Web Application Firewalls (WAFs) as opposed to Content Security Policies (CSP). The user indicates a ...July 8, 2025
This tweet shares a checklist video related to bypassing Web Application Firewalls (WAFs). It is aimed at bug bounty hunters and security researchers ...July 7, 2025
This WAF bypass concerns a Content Security Policy (CSP) bypass vulnerability. The bypass payload includes using the <base> HTML tag in a way th ...July 6, 2025
This tweet shares learning topics about various web security issues including Blind and Out-of-Band SQL Injection, Cross-Site Scripting (XSS), Web App ...July 6, 2025
This tweet expresses skepticism about claims of bypassing Cloudflare WAF with various payloads. The user points out that Cloudflare WAF never allows e ...July 5, 2025
This tweet announces a bypass for Cloudflare's Web Application Firewall (WAF), specifically related to a DOM-based Cross-Site Scripting (DOM XSS) ...July 5, 2025
This tweet mentions a WAF bypass discussed by Cycatz related to cybersecurity but does not specify the exact type of vulnerability or the vendor of th ...July 4, 2025
This tweet mentions several key areas of Web Application Penetration Testing Methodology including reconnaissance, authentication attacks, injection v ...July 4, 2025
Radware Cloud WAF has a vulnerability where it can be bypassed by specially crafted requests. This means attackers can send requests designed in a way ...July 4, 2025
This tweet mentions SafeLine WAF and asks if it can be bypassed using an unspecified method. SafeLine WAF is a web application firewall designed to pr ...July 3, 2025
This tweet shares a WAF bypass technique as part 1 of a series. The exact vendor of the Web Application Firewall (WAF) is not mentioned, nor is the sp ...July 3, 2025
The tweet describes an upgrade to an automation toolkit developed in Python that integrates several security testing capabilities, including passive a ...July 3, 2025
This tweet mentions several cybersecurity techniques and vulnerabilities including 2FA bypass tips, JavaScript analysis methods, XSS leading to cookie ...July 2, 2025
This bypass technique involves hiding Cross-Site Scripting (XSS) payloads inside SVG or MathML elements in an HTML document. Custom XSS sanitizers and ...July 2, 2025
This tweet reveals a bypass technique for the Cloudflare Web Application Firewall (WAF) targeting cross-site scripting (XSS) protection. Typically, a ...July 1, 2025
This tweet shares a resource called 'WAF Bypass Arsenal,' which is a cheatsheet that uses full-width Unicode symbols to bypass Web Applicati ...June 30, 2025
This tweet highlights several security issues related to web application firewalls (WAFs), focusing on a hardcoded, self-made WAF that uses well-known ...June 30, 2025
This tweet shares some clever tricks to bypass Web Application Firewalls (WAFs) that block the usage of the JavaScript `alert` function, commonly used ...June 30, 2025
This tweet demonstrates a Web Application Firewall (WAF) bypass technique using JavaScript concatenation to evade filtering and successfully execute C ...June 29, 2025
This tweet talks about #KNOXSS, which is a tool that provides several cross-site scripting (XSS) bypass techniques specifically designed for various m ...June 29, 2025
The tweet discusses the common challenge in Web Application Firewall (WAF) bypass attempts. Although many bypass payloads are shared daily, the effect ...June 29, 2025
This tweet shares a bug bounty tip about bypassing Web Application Firewalls (WAF) protections against Cross-Site Scripting (XSS) vulnerabilities. The ...June 29, 2025
This tweet describes a scenario where the user bypassed a Web Application Firewall (WAF) using a simple break in HTML code. While the exact WAF vendor ...June 29, 2025
This tweet shares a set of SQL injection (SQLi) write-ups by Ahmed Sultan, which include techniques such as Blind boolean-based injection, WAF bypass ...June 28, 2025
This tweet describes a WAF bypass technique specifically targeting XSS (Cross-Site Scripting) vulnerabilities. The payload used is an image tag with t ...June 28, 2025
This tweet indicates that an XSS bypass technique against WAFs is still valid in 2025. However, without direct access to the payload or details, the e ...June 28, 2025
This tweet discusses a dark web forum, possibly Dread, that talks about cybersecurity topics including methods to bypass the CloudFlare WAF. The phras ...June 28, 2025
The tweet discusses the challenge of bypassing Web Application Firewalls (WAFs) and mentions that while normalization techniques can hinder WAF effect ...June 28, 2025
The tweet discusses a scenario where a WAF (Web Application Firewall) detects bypass attempts by analyzing tags. The user asks how to bypass this dete ...June 28, 2025