## **PoC** [The code](https://github.com/AvalZ/WAF-A-MoLE) ## Details Given an input SQL injection query, it tries to produce a _semantic invariant_ query using ML that is able to bypass the target WAF. [paper](https://dl.acm.org/doi/abs/10.1145/3341105.3373962) [talk](https://www.youtube.com/watch?v=YiZCHQGERWQ)