A simple payload generator to bypass Web Application Firewalls (WAF) by converting text payloads to various encodings.
The WAF Payload Generator is a lightweight tool designed to help security researchers, penetration testers, and developers generate payloads to bypass Web Application Firewalls. It converts input payloads into various encodings, making it harder for WAFs to detect and block malicious inputs.
- Supports conversion 'N' to 'N' text encodings.
- Simple command-line interface for easy usage.
- Lightweight and fast operation.
To use the WAF Payload Generator, simply run the script and provide the input payload as a command-line argument. The script will then generate payloads in various encodings.
$ dotnet run "payload_to_encode"
This project is licensed under the MIT License.