Conversation
Summary of ChangesHello @Qandil, I'm Gemini Code Assist1! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed! This pull request enhances the existing list of web tools by incorporating WAFtester, a comprehensive command-line interface utility designed for Web Application Firewall security testing. The addition provides users with a new resource for WAF fingerprinting, performance benchmarking, and automated bypass discovery, thereby enriching the repository's collection of security-focused utilities. Highlights
🧠 New Feature in Public Preview: You can now enable Memory to help Gemini Code Assist learn from your team's feedback. This makes future code reviews more consistent and personalized to your project's style. Click here to enable Memory in your admin console. Changelog
Activity
Using Gemini Code AssistThe full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips. Invoking Gemini You can request assistance from Gemini at any point by creating a comment using either
Customization To customize Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a Limitations & Feedback Gemini Code Assist may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counter productive. You can react with 👍 and 👎 on @gemini-code-assist comments. If you're interested in giving your feedback about your experience with Gemini Code Assist for Github and other Google products, sign up here. You can also get AI-powered code generation, chat, as well as code reviews directly in the IDE at no cost with the Gemini Code Assist IDE Extension. Footnotes
|
| * [masscan](https://github.com/robertdavidgraham/masscan) - Internet scale portscanner. | ||
| * [Keyscope](https://github.com/SpectralOps/keyscope) - an extensible key and secret validation tool for auditing active secrets against multiple SaaS vendors | ||
| * [Decompiler.com](https://www.decompiler.com/) - Java, Android, Python, C# online decompiler. | ||
| * [WAFtester](https://github.com/waftester/waftester) - WAF security testing CLI that fingerprints 197+ WAF vendors, benchmarks detection rates, and automates bypass discovery with 70+ evasion techniques. |
There was a problem hiding this comment.
The description is a bit long and contains specific numbers (197+, 70+) that might become outdated. For better conciseness and to make it more future-proof, consider shortening the description.
| * [WAFtester](https://github.com/waftester/waftester) - WAF security testing CLI that fingerprints 197+ WAF vendors, benchmarks detection rates, and automates bypass discovery with 70+ evasion techniques. | |
| * [WAFtester](https://github.com/waftester/waftester) - WAF security testing CLI that fingerprints WAF vendors, benchmarks detection rates, and automates bypass discovery. |
|
Leave me alone
null
…On Fri 13 Feb 2026 at 18:57, gemini-code-assist[bot] < ***@***.***> wrote:
*gemini-code-assist[bot]* left a comment (carpedm20/awesome-hacking#204)
<#204 (comment)>
Summary of Changes
Hello @Qandil <https://github.com/Qandil>, I'm Gemini Code Assist1
<#m_5014853545504618641_user-content-fn-1-7707d6000dd9904d92ed031340abda74>!
I'm currently reviewing this pull request and will post my feedback
shortly. In the meantime, here's a summary to help you and other reviewers
quickly get up to speed!
This pull request enhances the existing list of web tools by incorporating
WAFtester, a comprehensive command-line interface utility designed for Web
Application Firewall security testing. The addition provides users with a
new resource for WAF fingerprinting, performance benchmarking, and
automated bypass discovery, thereby enriching the repository's collection
of security-focused utilities.
Highlights
- *New Tool Added*: WAFtester, an open-source CLI tool for WAF
security testing, has been added to the Web Tools section.
- *WAFtester Capabilities*: WAFtester fingerprints over 197 WAF
vendors, benchmarks detection rates with quantitative scoring, and
automates bypass discovery using 70+ evasion techniques. It also supports
SARIF, SonarQube, and GitLab SAST for CI/CD integration.
🧠 *New Feature in Public Preview:* You can now enable *Memory* to help *Gemini
Code Assist* learn from your team's feedback. This makes future code
reviews more consistent and personalized to your project's style. *Click
here <https://codeassist.google/code-review/login> to enable Memory in your
admin console.*
*Changelog*
- *README.md*
- Added a new entry for WAFtester under the Web Tools section.
*Activity*
- No specific human activity has been recorded on this pull request
yet.
*Using Gemini Code Assist*
The full guide for Gemini Code Assist can be found on our documentation
page
<https://developers.google.com/gemini-code-assist/docs/review-github-code>,
here are some quick tips.
*Invoking Gemini*
You can request assistance from Gemini at any point by creating a comment
using either /gemini <command> or @gemini-code-assist <command>. Below is
a summary of the supported commands on the current page.
Feature Command Description
Code Review /gemini review Performs a code review for the current pull
request in its current state.
Pull Request Summary /gemini summary Provides a summary of the current
pull request in its current state.
Comment @gemini-code-assist <https://github.com/gemini-code-assist> Responds
in comments when explicitly tagged, both in pull request comments and
review comments.
Help /gemini help Displays a list of available commands.
*Customization*
To customize Gemini Code Assist for GitHub experience, repository
maintainers can create a configuration file and/or provide a custom code
review style guide (such as PEP-8 for Python) by creating and adding files
to a .gemini/ folder in the base of the repository. Detailed instructions
can be found here
<https://developers.google.com/gemini-code-assist/docs/customize-gemini-behavior-github>
.
*Limitations & Feedback*
Gemini Code Assist may make mistakes. Please leave feedback on any
instances where its feedback is incorrect or counter productive. You can
react with 👍 and 👎 on @gemini-code-assist
<https://github.com/gemini-code-assist> comments. If you're interested in
giving your feedback about your experience with Gemini Code Assist for
Github and other Google products, sign up here
<https://google.qualtrics.com/jfe/form/SV_2cyuGuTWsEw84yG>.
*You can also get AI-powered code generation, chat, as well as code
reviews directly in the IDE at no cost with the Gemini Code Assist IDE
Extension <https://cloud.google.com/products/gemini/code-assist>.*
Footnotes
1.
Review the Privacy Notices <https://policies.google.com/privacy>, Generative
AI Prohibited Use Policy
<https://policies.google.com/terms/generative-ai/use-policy>, Terms of
Service <https://policies.google.com/terms>, and learn how to
configure Gemini Code Assist in GitHub here
<https://developers.google.com/gemini-code-assist/docs/customize-gemini-behavior-github>.
Gemini can make mistakes, so double check it and use code with caution
<https://support.google.com/legal/answer/13505487>. ↩
<#m_5014853545504618641_user-content-fnref-1-7707d6000dd9904d92ed031340abda74>
—
Reply to this email directly, view it on GitHub
<#204 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/A5M6JPRANST6NJCVTEV372D4LYM73AVCNFSM6AAAAACVCCW6NSVHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMZTQOJYHAZTAOJSGA>
.
You are receiving this because you are subscribed to this thread.Message
ID: ***@***.***>
|
|
It seems you've replied to an email notification from GitHub. If you wish to stop receiving notifications for this pull request, you can unsubscribe via the link provided in the email or adjust your notification settings on GitHub. I will not respond further to this thread. |
Hi! I'd like to add WAFtester to the Web > Tools section.
WAFtester is an open-source CLI tool for WAF security testing that:
GitHub: https://github.com/waftester/waftester
Thank you for maintaining this list!