Tool to bypass 4xx HTTP response status code. For example bypass 403 forbidden on website. I hope this tool can help you to bypass some Web Application Security while pentesting.
Script uses multithreading, and is based on brute forcing so might have some false positives. Script uses colored output.
Results will be sorted by HTTP response status code ascending, content length descending, and ID ascending.
To filter out false positives, check each content length manually with the provided
cURL command. If it does not results in bypass, just ignore all other results with the same content length.
|Various HTTP methods||method|
|Various HTTP methods with ‘Content-Length: 0’ header||method|
|Cross-site tracing (XST) with HTTP TRACE and TRACK methods||method|
|File upload with HTTP PUT method||method|
|Various HTTP method overrides||method-override|
|Various HTTP headers||header|
|Various URL overrides||header|
|URL override with two ‘Host’ headers||header|
|Various URL path bypasses||path|
|Various URL scheme overrides||scheme-override|
|Basic authentication/authorization including null session||auth|
|Broken URL parsers||parser|
Tested on Kali Linux v2021.4 (64-bit).
Installation and Run
Open your preferred console from /src/ and run the commands shown below.
Install required tools:
Install required packages:
Run the script:
Be aware of rate limiting. Give it some time before you run the script again for the same domain in order to get better results.
Some websites require a user agent header. Download a user agent list from here.
Bypass 403 Forbidden HTTP response status code:
Bypass 401 Unauthorized HTTP response status code:
Broken URL parser check:
This tool is made for educational purposes. I hope it will help!