## **PoC**
[The code](https://github.com/AvalZ/WAF-A-MoLE)
## Details
Given an input SQL injection query, it tries to produce a _semantic invariant_ query using ML that is able to bypass the target WAF.
[paper](https://dl.acm.org/doi/abs/10.1145/3341105.3373962)
[talk](https://www.youtube.com/watch?v=YiZCHQGERWQ)