Quick Start

Get Fray running in under 60 seconds.

New in v3.4.0 — Payload database expanded to 4,003 payloads across 23 categories, VS Code extension published to Marketplace, fray feed threat intelligence command, and fray agent self-improving bypass engine. See full changelog →

Install

pip install fray

Run your first scan

# Detect the WAF vendor
fray detect https://example.com

# Smart scan — auto-selects best payload categories
fray test https://example.com --smart -y

# Full pipeline: recon → scan → ai-bypass
fray auto https://example.com

Key concepts

TermMeaning
PayloadA crafted input string designed to test WAF rules (e.g. XSS, SQLi)
BypassA payload that the WAF fails to block
Block ratePercentage of payloads the WAF successfully blocked
Smart modeAuto-selects the most relevant payload categories for the target
Stealth modeUA rotation, jitter, throttle to avoid detection

What's next?