This is an client server solution to find out the payloads that can be used to bypass Web Application Firewall. Client can use the cli to make the request to server to retrieve the payload corresponding to an attack type (xss|sql) against a particular site protected by an WAF.
Inspiration Project: WAFNinja
Go to the root directory of the source code and then run the following command if
go dependency is not set up for the project:
export $GOPATH && export GO114MODULE=on && go mod init && go get ./...