Skip to content

Latest commit

 

History

History
33 lines (20 loc) · 1.39 KB

README.md

File metadata and controls

33 lines (20 loc) · 1.39 KB

WAF Payload Generator

License GitHub stars GitHub issues

A simple payload generator to bypass Web Application Firewalls (WAF) by converting text payloads to various encodings.

Introduction

The WAF Payload Generator is a lightweight tool designed to help security researchers, penetration testers, and developers generate payloads to bypass Web Application Firewalls. It converts input payloads into various encodings, making it harder for WAFs to detect and block malicious inputs.


Features

  • Supports conversion 'N' to 'N' text encodings.
  • Simple command-line interface for easy usage.
  • Lightweight and fast operation.

Usage

To use the WAF Payload Generator, simply run the script and provide the input payload as a command-line argument. The script will then generate payloads in various encodings.

$ dotnet run "payload_to_encode"

License

This project is licensed under the MIT License.