v3.4.0 — Open Source

WAF bypass toolkit
for the AI era

Recon, scan, bypass, harden — the complete offensive security pipeline in one pip install. Zero dependencies. 4,000+ payloads. 25 WAF fingerprints.

$
4,000+
Attack Payloads
23
Payload Categories
25
WAF Fingerprints
175
CVE Payloads

Everything you need for WAF security testing

From reconnaissance to bypass to hardening — Fray covers the complete offensive security workflow.

AI-Powered Bypass

LLM-generated payloads adapt in real-time. Probe WAF → generate → test → mutate → retry. Works with OpenAI, Anthropic, or local models.

🛡

25 WAF Vendor Fingerprints

Detect Cloudflare, Akamai, AWS WAF, Azure Front Door, Imperva, Sucuri, Barracuda, F5, and 17 more — signature, anomaly, and hybrid modes.

🔍

27-Check Reconnaissance

TLS, DNS, subdomains, CORS, parameters, JavaScript analysis, API discovery, admin panels, WAF intel — all in one command.

🛠

20 Mutation Strategies

Encoding, case variation, null bytes, unicode normalization, comment injection, double encoding, and more — automatic per-WAF mutation.

📊

OWASP Hardening

Security headers graded A-F. OWASP Top 10 misconfig checks. Fix snippets for Nginx, Apache, Cloudflare Workers. One command.

🤖

14 MCP Tools

Use Fray as an AI agent from Claude Desktop, Claude Code, ChatGPT, or Cursor. Full Model Context Protocol integration.

🚀

Auto Scan Pipeline

Crawl → discover parameters → inject payloads → detect reflection. Smart mode auto-selects the best categories per target.

📡

Threat Intelligence Feed

Auto-discover new CVEs from NVD, CISA KEV, ExploitDB, Nuclei, and security RSS. Classify, translate to payloads, deduplicate, and add to your database.

📄

Rich Reporting

HTML, JSON, SARIF (GitHub Security tab), Markdown, and AI-optimized output. Webhook notifications to Slack, Discord, Teams.

📦

Zero Dependencies

Python stdlib only (plus rich for output). No Selenium, no Playwright, no compiled extensions. Works everywhere Python runs.

One tool, complete coverage

Every command works standalone or as part of the fray auto pipeline.

CommandWhat it doesWhen to use
fray autoFull pipeline: recon → scan → ai-bypass in one commandFirst run against a new target
fray scanCrawl → discover params → inject payloads → detect reflectionUnknown app, need to find injection points
fray recon27 checks: TLS, DNS, subdomains, CORS, params, JS, API, admin panelsPre-engagement target profiling
fray detectFingerprint 25 WAF vendors (signature / anomaly / hybrid)Always run first — informs everything else
fray test4,000+ payloads across 23 categories with adaptive throttlingKnown injection point, want broad payload coverage
fray bypass5-phase WAF evasion scorer with mutation feedback loopWAF is blocking you — deterministic evasion, no API key needed
fray ai-bypassProbe WAF → LLM generates payloads → test → mutate → header tricksbypass isn't working — let an LLM generate custom evasions
fray agentSelf-improving payload agent: probe → mutate → learn → cache patternsRepeat testing same WAF — gets smarter each run
fray hardenSecurity headers A-F grade + OWASP Top 10 misconfig checks + fix snippetsDefensive posture review, pre/post WAF change
fray feedThreat intel feed: auto-discover CVEs → translate to payloads → deduplicate → addKeep payload database current with new CVEs
fray graphVisual attack surface treeMap all endpoints before testing
fray osintWHOIS, emails, GitHub org, typosquatting detectionTarget discovery & brand monitoring

Not sure which bypass command to use? See the comparison guide →

Get started in 30 seconds

📦 PyPI (all platforms)

pip install fray

🍏 macOS

brew install fray

🐧 Linux / Kali

sudo apt install fray

💧 Windows

winget install fray

Or: pip install fray in PowerShell

💻 VS Code Extension

code --install-extension DaliSecurity.fray-security

View on Marketplace →

🤖 MCP / AI Agents

pip install "fray[mcp]"

Setup guide →

⚙ GitHub Actions

uses: dalisecurity/fray@v3

CI/CD guide →

🐛 Docker

docker pull dalisecurity/fray

Docker guide →

Works everywhere you work

💻

VS Code Extension

Scan, test, bypass, detect, harden — all from your editor. HTML reports + inline diagnostics.

NEW

GitHub Actions

Add uses: dalisecurity/fray@v3 to any workflow. Auto PR comments with results.

LIVE
🤖

MCP / AI Agents

14 tools for Claude Desktop, Claude Code, ChatGPT, Cursor. Ask AI to run security scans.

LIVE

4,000+ payloads across 23 categories

Curated from real CVEs, bug bounty reports, WAF bypass research, and community sources.

XSS

1,209 payloads — DOM, framework-specific, WAF bypass, encoding, async, SVG, MathML

SQL Injection

248 payloads — blind, time-based, error-based, stacked, UNION, WAF bypass

Command Injection

200 payloads — Unix/Windows, reverse shells, OOB, wildcard bypass

AI/LLM Prompt Injection

370 payloads — jailbreaks, system prompt extraction, encoding bypass

SSRF

122 payloads — cloud metadata, DNS rebinding, protocol smuggling

SSTI

122 payloads — Jinja2, Freemarker, Twig, Mako, EJS, Pug, Velocity

View all 23 categories →

Start testing your WAF today

Fray is free, open-source, and MIT licensed. Install in seconds and find what your WAF misses.