/bypassWAF

用于mssql手注生成混淆payload

Primary LanguagePython

bypassWAF

bypassWAF:mssql手注混淆payload,可用于bypass 安全狗+宝塔,环境(iis+aspx)

实战使用:http://www.safe6.cn/article/218

generationData_bypass:用于生成垃圾数据