Black & White Path
Black & White Path
Apr 25, 2026 · Information Security

How I Bypassed a WAF with SQL Injection: A Step‑by‑Step Walkthrough

The article details a hands‑on investigation of a web application firewall that strips SQL keywords, shows how order‑by and CASE‑WHEN payloads can be used to probe column limits, construct blind injection strings, and ultimately achieve data extraction despite multiple filtering layers.

CASE WHEN payloadInformation SecuritySQL Injection
0 likes · 7 min read
How I Bypassed a WAF with SQL Injection: A Step‑by‑Step Walkthrough
Black & White Path
Black & White Path
Mar 11, 2026 · Information Security

ByPassTamperPlus: Enhanced SQLMap Tamper Scripts for Advanced WAF Bypass

ByPassTamperPlus is a Python‑based collection of SQLMap tamper scripts tailored for MSSQL, MySQL and Oracle across multiple versions, employing version‑specific syntax, functions and obfuscation techniques to improve payload survivability against modern Web Application Firewalls, while acknowledging inherent limitations.

MSSQLMySQLOracle
0 likes · 6 min read
ByPassTamperPlus: Enhanced SQLMap Tamper Scripts for Advanced WAF Bypass
Black & White Path
Black & White Path
Feb 16, 2026 · Cloud Computing

Distributed IP Proxy Pool on Tencent SCF to Bypass WAF Limits

The article introduces Cloud ProxyPool, a Go‑based distributed IP proxy pool built on Tencent Cloud Functions (SCF) that bypasses WAF IP restrictions, provides step‑by‑step deployment, client configuration, CA certificate installation, proxy settings, a monitoring dashboard, and outlines supported use cases such as crawler IP rotation, IP testing, HTTPS interception, and integration with tools like Burp Suite.

GoIP ProxySCF
0 likes · 4 min read
Distributed IP Proxy Pool on Tencent SCF to Bypass WAF Limits
MaGe Linux Operations
MaGe Linux Operations
Jul 6, 2022 · Information Security

How to Bypass a WAF and Capture the Flag on Minu-1 – A Complete Pen‑Test Walkthrough

This step‑by‑step guide demonstrates how to enumerate a vulnerable host, identify and fingerprint its Web Application Firewall, apply multiple WAF‑bypass techniques—including fuzzing, command injection, binary abuse and URL‑encoding tricks—to obtain a stable shell, perform privilege escalation, decode a JWT token and finally retrieve the root flag.txt.

JWT crackingLinux exploitationPenetration Testing
0 likes · 16 min read
How to Bypass a WAF and Capture the Flag on Minu-1 – A Complete Pen‑Test Walkthrough