You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
-**Provider YAML definitions**: 10 major WAFs (Cloudflare, AWS WAF, Azure, Akamai, F5, Imperva, ModSecurity/CRS, Google Cloud Armor, Fortinet, Palo Alto) with signatures and blind spots in `src/waf_signatures/providers/*.yaml`
119
+
-**Passive + active fingerprinting**: Header-based detection first; if inconclusive, a probe suite sends targeted SQLi payloads and scores providers by which probes get blocked
120
+
-**Probe suite**: Standard GET/POST parameter probes, plus **charset probe** (IBM037-encoded body with `Content-Type: charset=ibm037`) and **header-injection probe** (payload in `X-Forwarded-For`) to detect WAFs that don’t inspect those vectors
121
+
-**Provider-specific bypass chains**: Each provider has an ordered list of strategies (encoding, comment, charset, JSON syntax, size overflow, header abuse, etc.); the engine applies the chain to generate obfuscated payload variants
122
+
-**20+ transform techniques**: `randomcase`, `space2comment`, `mysql_version_comment`, `double_urlencode`, `encode_ibm037`, `prepend_json_operator`, `pad_to_8kb`, `move_to_header`, and more
123
+
-**Backward compatibility**: Scanner still uses `WAFDetector.detect()` and `get_bypass_payloads()`; legacy `WAFType` / `WAFDetectionResult` / `TamperEngine` remain for compatibility
120
124
121
125
### 🤖 AI-Powered Features
122
126
-**GPT-4 Payload Generation**: Context-aware payloads that adapt to WAF blocks
0 commit comments