Evasive techniques
To be able to trick the API when security controls are in place, such as a WAF that scans requests for common attacks, input validation that restricts the type of input, or a rate limit that restricts how many requests can be sent:
Add string terminators to attacks
Add case switching to attacks
Encode payloads
Combine different evasion techniques
Rinse and repeat
Apply evasive techniques to all attacks