Skip to content

papocch10/encode-me

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 

Repository files navigation

encode-me

This tool takes in input a payload and generates a list of encoded payloads based on 34 tampering functions (credits to whatwaf). The list of encoded payloads can be used to test the WAF.

Usage

Generate about 40k encoded payload based on tampering functions

go run encode-me.go -p "<script> alert(1) </script>"  > list.txt

The list may contain duplicates. So let's delete them using awk

awk '!seen[$0]++' list.txt > listFinal.txt

Authors

Author: Fabio 'pap0cch10' Mariani - Twitter: papocchio0

Based on an idea by Francesco Lacerenza - Twitter: @lacerenza_fra

About

Payload encoder for bypass WAF

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages