Skip to content

This tool aims to aid in identifying potential vulnerabilities in web applications, promoting better security practices.

Notifications You must be signed in to change notification settings

77r4sed/403-bypasser

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 

Repository files navigation

A command-line tool designed to test and bypass 403 Forbidden responses on web servers. It employs various techniques, including path manipulation, query parameter bypassing, and custom headers to gain access to restricted resources.

Usage

To run the tool, use the following command :
============================================================
               python 403-bypasser.py <url> [options]
============================================================
Parameters

    <url>: The target URL to test for bypass.
    -t, --threads <number>: Number of threads for parallel attempts (default: 5).
    -p, --proxy <proxy>: Proxy to use in the format: http://proxy:port.
    --timeout <seconds>: Request timeout in seconds (default: 5).
    --retries <number>: Number of retries for failed requests (default: 3).
    --log <log_file>: Specify a log file (default: bypass_log.txt).
    --config <config_file>: Load additional headers and paths from a configuration file.
    
    
============================================================
                     DISCLAIMER

This tool is intended for educational purposes and should only be used on servers you own or have explicit permission to test. Unauthorized access to computer systems is illegal.
============================================================

About

This tool aims to aid in identifying potential vulnerabilities in web applications, promoting better security practices.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages