Example Usage
# EvilWAF generates a local CA to intercept HTTPS traffic. Trust it once. # Run EvilWAF first — CA is auto-generated at startup # Then find the cert: ls /tmp/evilwaf_ca_*/evilwaf-ca.pem # Linux — trust system-wide sudo cp /tmp/evilwaf_ca_*/evilwaf-ca.pem /usr/local/share/ca-certificates/evilwaf-ca.crt sudo update-ca-certificates # macOS sudo security add-trusted-cert -d -r trustRoot -k /Library/Keychains/System.keychain \ /tmp/evilwaf_ca_*/evilwaf-ca.pem # For tools like sqlmap, pass --ignore-proxy=False or equivalent for your tool.