├── .gitignore ├── LICENSE ├── README.md ├── papers ├── Artificial Neural Network based WAF for SQL Injection.pdf ├── Beyond SQLi - Obfuscate and Bypass WAFs.txt ├── Bypassing Web Application Firewalls with HTTP Parameter Pollution.pdf ├── Evading All Web-Application Firewalls XSS Filters.pdf ├── Modern WAF Fingerprinting and XSS Filter Bypass.pdf ├── Poking A Hole In The Firewall.pdf ├── Qualys Guide - Protocol-Level WAF Evasion.pdf ├── SANS Guide - WAF Evasion Testing.pdf ├── WASC WAF Evaluation Criteria.pdf └── Web Application Firewalls - Evaluation and Analysis.pdf └── presentations ├── BlackHat US 12 - Protocol Level WAF Evasion (Slides).pdf ├── BlackHat US 16 - Analysis of Attack Detection Logic.pdf ├── Methods To Bypass A Web Application Firewall.pdf ├── OWASP WAF Profiling & Evasion.pdf ├── Our Favourite XSS WAF Filters And How To Bypass Them.pdf ├── Playing Around with WAFs.pdf ├── WAF Bypasses and PHP Exploits (Slides).pdf └── WEb Application Firewall Bypassing (How to Defeat the Blue Team).pdf /.gitignore: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/paulveillard/cybersecurity-waf/HEAD/.gitignore -------------------------------------------------------------------------------- /LICENSE: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/paulveillard/cybersecurity-waf/HEAD/LICENSE -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/paulveillard/cybersecurity-waf/HEAD/README.md -------------------------------------------------------------------------------- /papers/Artificial Neural Network based WAF for SQL Injection.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/paulveillard/cybersecurity-waf/HEAD/papers/Artificial Neural Network based WAF for SQL Injection.pdf -------------------------------------------------------------------------------- /papers/Beyond SQLi - Obfuscate and Bypass WAFs.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/paulveillard/cybersecurity-waf/HEAD/papers/Beyond SQLi - Obfuscate and Bypass WAFs.txt -------------------------------------------------------------------------------- /papers/Bypassing Web Application Firewalls with HTTP Parameter Pollution.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/paulveillard/cybersecurity-waf/HEAD/papers/Bypassing Web Application Firewalls with HTTP Parameter Pollution.pdf -------------------------------------------------------------------------------- /papers/Evading All Web-Application Firewalls XSS Filters.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/paulveillard/cybersecurity-waf/HEAD/papers/Evading All Web-Application Firewalls XSS Filters.pdf -------------------------------------------------------------------------------- /papers/Modern WAF Fingerprinting and XSS Filter Bypass.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/paulveillard/cybersecurity-waf/HEAD/papers/Modern WAF Fingerprinting and XSS Filter Bypass.pdf -------------------------------------------------------------------------------- /papers/Poking A Hole In The Firewall.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/paulveillard/cybersecurity-waf/HEAD/papers/Poking A Hole In The Firewall.pdf -------------------------------------------------------------------------------- /papers/Qualys Guide - Protocol-Level WAF Evasion.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/paulveillard/cybersecurity-waf/HEAD/papers/Qualys Guide - Protocol-Level WAF Evasion.pdf -------------------------------------------------------------------------------- /papers/SANS Guide - WAF Evasion Testing.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/paulveillard/cybersecurity-waf/HEAD/papers/SANS Guide - WAF Evasion Testing.pdf -------------------------------------------------------------------------------- /papers/WASC WAF Evaluation Criteria.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/paulveillard/cybersecurity-waf/HEAD/papers/WASC WAF Evaluation Criteria.pdf -------------------------------------------------------------------------------- /papers/Web Application Firewalls - Evaluation and Analysis.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/paulveillard/cybersecurity-waf/HEAD/papers/Web Application Firewalls - Evaluation and Analysis.pdf -------------------------------------------------------------------------------- /presentations/BlackHat US 12 - Protocol Level WAF Evasion (Slides).pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/paulveillard/cybersecurity-waf/HEAD/presentations/BlackHat US 12 - Protocol Level WAF Evasion (Slides).pdf -------------------------------------------------------------------------------- /presentations/BlackHat US 16 - Analysis of Attack Detection Logic.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/paulveillard/cybersecurity-waf/HEAD/presentations/BlackHat US 16 - Analysis of Attack Detection Logic.pdf -------------------------------------------------------------------------------- /presentations/Methods To Bypass A Web Application Firewall.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/paulveillard/cybersecurity-waf/HEAD/presentations/Methods To Bypass A Web Application Firewall.pdf -------------------------------------------------------------------------------- /presentations/OWASP WAF Profiling & Evasion.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/paulveillard/cybersecurity-waf/HEAD/presentations/OWASP WAF Profiling & Evasion.pdf -------------------------------------------------------------------------------- /presentations/Our Favourite XSS WAF Filters And How To Bypass Them.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/paulveillard/cybersecurity-waf/HEAD/presentations/Our Favourite XSS WAF Filters And How To Bypass Them.pdf -------------------------------------------------------------------------------- /presentations/Playing Around with WAFs.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/paulveillard/cybersecurity-waf/HEAD/presentations/Playing Around with WAFs.pdf -------------------------------------------------------------------------------- /presentations/WAF Bypasses and PHP Exploits (Slides).pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/paulveillard/cybersecurity-waf/HEAD/presentations/WAF Bypasses and PHP Exploits (Slides).pdf -------------------------------------------------------------------------------- /presentations/WEb Application Firewall Bypassing (How to Defeat the Blue Team).pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/paulveillard/cybersecurity-waf/HEAD/presentations/WEb Application Firewall Bypassing (How to Defeat the Blue Team).pdf --------------------------------------------------------------------------------