Check your WAF before an attacker does
☆1,479Mar 14, 2026Updated last month
Alternatives and similar repositories for waf-bypass
Users that are interested in waf-bypass are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A simple tool for bypassing file upload restrictions.☆901Jul 22, 2024Updated last year
- An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws☆3,983Oct 4, 2025Updated 6 months ago
- ☆543Jun 26, 2024Updated last year
- A python tool used to discover endpoints, potential parameters, a target specific wordlist for a given target and secrets☆1,543Mar 8, 2026Updated last month
- 🚫 Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fast…☆1,590Apr 12, 2026Updated 2 weeks ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- 1337 Wordlists for Bug Bounty Hunting☆954Updated this week
- Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules…☆5,998Jul 12, 2024Updated last year
- A python script to scan for Apache Tomcat server vulnerabilities.☆894Jan 12, 2026Updated 3 months ago
- User-Agent , X-Forwarded-For and Referer SQLI Fuzzer☆384May 19, 2023Updated 2 years ago
- Everything about Web Application Firewalls (WAFs) from Security Standpoint! 🔥☆7,452Mar 26, 2026Updated last month
- Community curated list of nuclei templates for finding "unknown" security vulnerabilities.☆91May 2, 2024Updated last year
- Detect and bypass web application firewalls and protection systems☆2,894Aug 11, 2024Updated last year
- Burp Extension to find potential endpoints, parameters, and generate a custom target wordlist☆1,511Jan 8, 2026Updated 3 months ago
- A cheat sheet that contains advanced queries for SQL Injection of all types.☆3,171May 13, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A Burp Suite extension to add OpenAI (GPT) on Burp and help you with your Bug Bounty recon to discover endpoints, params, URLs, subdomain…☆889May 3, 2023Updated 2 years ago
- NucleiFuzzer is a robust automation tool that efficiently detects web application vulnerabilities, including XSS, SQLi, SSRF, and Open Re…☆1,836Apr 17, 2026Updated 2 weeks ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7,481Apr 23, 2026Updated last week
- Hidden parameters discovery suite☆2,050Sep 8, 2024Updated last year
- 🌙🦊 Dalfox is a powerful open-source XSS scanner and utility focused on automation.☆4,945Updated this week
- Rockyou for web fuzzing☆3,133Mar 11, 2026Updated last month
- Automatic SSRF fuzzer and exploitation tool☆3,533Sep 4, 2025Updated 7 months ago
- Afuzz is an automated web path fuzzing tool for the Bug Bounty projects.☆309Jul 15, 2023Updated 2 years ago
- A Security Tool for Bug Bounty, Pentest and Red Teaming.☆4,245Apr 14, 2026Updated 2 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- This map lists the essential techniques to bypass anti-virus and EDR☆3,253Mar 28, 2025Updated last year
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,821May 22, 2024Updated last year
- A simple Burp Suite extension to crawl JavaScript (JS) files in passive mode and display the results directly on the issues☆377Jul 25, 2023Updated 2 years ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆1,074Mar 24, 2026Updated last month
- A simple script just made for self use for bypassing 403☆2,083May 30, 2024Updated last year
- HTTP parameter discovery suite.☆6,209Feb 20, 2025Updated last year
- A Burp Suite extension that integrates OpenAI's GPT to perform an additional passive scan for discovering highly bespoke vulnerabilities …☆2,290Jun 9, 2024Updated last year
- 对Auth/Waf 自动化bypass的burpsuite插件☆1,130Feb 28, 2026Updated 2 months ago
- Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hac…☆1,173Jan 21, 2026Updated 3 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- An XSS exploitation command-line interface and payload generator.☆1,419Jan 19, 2025Updated last year
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications☆1,339Aug 7, 2025Updated 8 months ago
- The Havoc Framework☆8,311Dec 18, 2025Updated 4 months ago
- Burp Plugin to Bypass WAFs through the insertion of Junk Data☆1,471Jul 14, 2025Updated 9 months ago
- declutters url lists for crawling/pentesting☆1,551Feb 23, 2025Updated last year
- Quick SQLMap Tamper Suggester☆1,400Jul 18, 2022Updated 3 years ago
- Quickly discover exposed hosts on the internet using multiple search engines.☆2,905Updated this week