hi, i am trying to solve this lab [https://portswigger.net/web-security/sql-injection/blind/lab-conditional-responses](https://portswigger.net/web-security/sql-injection/blind/lab-conditional-responses) , which requires the burp intruder to test for each character using two payload positions and cluster bomb attack type and grep the “welcome back” conditional response. community version of burpsuite however has a time throttle and is incredibly slow. I am trying to use Wfuzz to do this but i dont have any idea. I also read somewhere that this could also be done using http fuzz module of patator. some insight please?