Offensive Security Tool: EvilWAF – Web Application Firewall Bypass Toolkit

by | Oct 3, 2025 | Tools

Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon

Reading Time: 2 Minutes

EvilWAF – Web Application Firewall Bypass Toolkit

EvilWAF, developed by matrixleons, is an advanced firewall bypass and fingerprinting tool designed to detect and bypass Web Application Firewalls (WAF). It supports multiple evasion techniques for comprehensive security assessment.

Key Features

  • WAF Fingerprinting: Identify and detect specific WAF solutions
  • Multiple Bypass Techniques:
    • Header Manipulation
    • DNS History Analysis
    • Subdomain Enumeration
  • Firewall Evasion: Advanced methods to bypass security controls
  • Comprehensive Scanning: Multi-technique approach for maximum effectiveness

See Also: So you want to be a hacker?
Offensive Security and Ethical Hacking Course

Supported WAF Detection and bypass

Cloudflare, Akamai, Imperva, ModSecurity, and more

 

WAF Bypass Techniques

 

1. Header Manipulation

 

Advanced HTTP header manipulation to evade WAF detection:

  • User-Agent Rotation: Cycle through different browser signatures
  • X-Forwarded-For Spoofing: Fake originating IP addresses
  • Accept-Encoding Manipulation: Alter compression headers
  • Cookie Parameter Pollution: Overload cookie parameters

2. DNS History Analysis

 

Leverage DNS records to discover hidden entry points:

  • Historical DNS Lookups: Find old IP addresses and subdomains
  • CNAME Chain Analysis: Trace domain aliases and redirects
  • Passive DNS Replication: Gather intelligence from DNS databases
  • Expired Domain Detection: Identify forgotten subdomains
  • IP History Reconstruction: Map historical server locations

3. Subdomain Enumeration

 

Comprehensive subdomain discovery for alternative access:

  • Brute-force Discovery: Dictionary attacks on subdomains
  • Certificate Transparency Logs: Extract domains from SSL certificates
  • Search Engine Scraping: Harvest subdomains from public indexes
  • DNS Zone Transfer Attempts: Exploit misconfigured DNS servers
  • Reverse IP Lookup: Find all domains on shared hosting

4. HTTP Request Smuggling

 

Advanced protocol-level attacks to bypass WAF inspection:

  • CL.TE Attacks: Content-Length vs Transfer-Encoding conflicts
  • TE.CL Attacks: Transfer-Encoding vs Content-Length confusion
  • Header Obfuscation: Space and tab variations in headers
  • Chunk Size Manipulation: Large and malformed chunk sizes
  • Method Override: Smuggled GET, POST, PUT, DELETE requests
  • Endpoint Diversification: Target admin panels, APIs, and internal endpoints

5. JWT Algorithm Confusion

 

Authentication bypass through token manipulation:

  • Algorithm “none” Attack: Remove signature verification
  • Weak Secret Testing: Common and default JWT secrets
  • Key Confusion: Use public keys as HMAC secrets
  • Header Injection: KID, JKU, and X5U header attacks
  • Timestamp Manipulation: Future expirations and fixed timestamps
  • Role Escalation: Admin and superuser claim injection

6. GraphQL Query Batching

 

Exploit GraphQL features to evade detection:

  • Query Batching: Multiple queries in single request
  • Array Batching: ID arrays with injection payloads
  • Mutation Batching: Combined login and privilege escalation
  • Introspection Abuse: Schema discovery with injection
  • Alias Attacks: Multiple query aliases with different parameters
  • Variable Manipulation: SQL injection through GraphQL variables

7. gRPC/Protobuf Bypass

 

Binary protocol attacks to evade content inspection:

  • Protocol Confusion: Mix gRPC, Protobuf, and REST content types
  • Binary Encoding: SQL injection in binary payloads
  • Content-Type Manipulation: Various gRPC content type headers
  • Cloud Provider Mimicry: AWS, Google, and Azure gRPC headers
  • WebSocket Protocol: gRPC-Web and WebSocket protocol attacks
  • Proxy Header Injection: Combine gRPC with proxy headers

 

Installation

Method 1: Clone from GitHub (Recommended)

git clone https://github.com/matrixleons/evilwaf.git

cd evilwaf

pip3 install -r requirements.txt

python3 evilwaf.py -d https;//site.com -o results.json(Recommended)

python3 evilwaf.py -d site.com -o results.json 

python3 evilwaf.py -d site.com / https://site.com

            [ Tool output example]



[+] PHASE 2: DNS History Bypass
[*] Testing 14 IP variants
[-] 35.187.93.140                            Bypass Success
[-] 35.187.93.1                              Bypass Failed
[-] 35.187.93.2                              Bypass Failed
[-] 35.187.93.10                             Bypass Failed
[-] 35.187.93.50                             Bypass Failed
[-] 35.187.93.100                            Bypass Failed
[-] 35.187.93.200                            Bypass Failed
[-] 35.187.93.254                            Bypass Failed
[-] 35.187.93.255                            Bypass Failed
[-] 35.187.93.101                            Bypass Failed
[-] 35.187.93.102                            Bypass Failed
[-] 35.187.93.103                            Bypass Failed
[-] 35.187.93.253                            Bypass Failed
[-] 35.187.93.252                            Bypass Failed







Docker Installation

docker build -t evilwaf .
docker run -it evilwaf -d example.com

*****done*****

Disclaimer

Important: Read This Before Using EvilWAF

  • This tool is designed for authorized security testing only
  • You must have explicit permission to test the target systems
  • Intended for educational purposessecurity research, and authorized penetration testing
  • Not for malicious or illegal activities

Legal Compliance:

  • Users are solely responsible for how they use this tool
  • The developers are not liable for any misuse or damage caused
  • Ensure compliance with local, state, and federal laws

Website Features:

  • Historical DNS records
  • IP history for domains
  • Subdomain enumeration
  • Free tier available Usage: Search for domain → View DNS History

Website Features:

Website Features:

  • Historical DNS data
  • Reverse IP lookup
  • Domain history
  • Free limited queries
  •  

Website Features:

  • Reverse IP lookup
  • Historical WHOIS
  • Free API limited.

 

Clone the repo from here: GitHub Link

Merch

Recent Tools

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This