Kali Linux

403Bypasser : Automates The Techniques Used To Circumvent Access Control Restrictions On Target Pages

403bypasser automates the techniques used to circumvent access control restrictions on target pages. 403bypasser will continue to be improved and it is open to contributions.

Installation

  • Clone the repository to your machine. git clone https://github.com/yunemse48/403bypasser.git
  • Install required modules by running the code pip install -r requirements.txt
  • READY!

Usage

Arguments

ArgumentDescriptionExamplesNote
-usingle URL to scanhttp://example.com or http://example.com/All these example usages are interpreted in the same way
-Upath to list of URLs./urllist.txt, ../../urllist.txt, etc.Just provide the path where the file is located 🙂
-dsingle directory to scanadmin or /admin or admin/ or /admin/All these example usages are interpreted in the same way
-Dpath to list of directories./dirlist.txt, ../../dirlist.txt, etc.Just provide the path where the file is located 🙂

Usage 1: python3 403bypasser.py -u https://example.com -d /secret
Usage 2: python3 403bypasser.py -u https://example.com -D dirlist.txt
Usage 3: python3 403bypasser.py -U urllist.txt -d /secret
Usage 4: python3 403bypasser.py -U urllist.txt -D dirlist.txt

IMPORTANT NOTE: All the followings are interpreted the same. Therefore, which pattern you use is just a matter of preference.

  • python3 403bypasser.py -u https://example.com -d secret
  • python3 403bypasser.py -u https://example.com -d /secret
  • python3 403bypasser.py -u https://example.com -d /secret/
  • python3 403bypasser.py -u https://example.com -d secret/
  • python3 403bypasser.py -u https://example.com/ -d secret
    ALL THE SAME!

Since Python is a cross-platform language, one can run this program on different operating systems.

Output

The output of the program is saved (in the current directory) in a file with the name of the domain name given as input.
For example:
python3 403bypasser.py -u https://example.com -d /secret is given. Then the output is saved to example.txt in the current directory.

R K

Recent Posts

Vermilion : Mastering Linux Post-Exploitation For Red Team Success

Vermilion is a simple and lightweight CLI tool designed for rapid collection, and optional exfiltration…

1 day ago

AD-CS-Forest-Exploiter : Mastering Security Through PowerShell For AD CS Misconfiguration

ADCFFS is a PowerShell script that can be used to exploit the AD CS container…

1 day ago

Usage Of Tartufo – A Comprehensive Guide To Securing Your Git Repositories

Tartufo will, by default, scan the entire history of a git repository for any text…

1 day ago

Loco : A Rails-Inspired Framework For Rust Developers

Loco is strongly inspired by Rails. If you know Rails and Rust, you'll feel at…

2 days ago

Monolith : The Ultimate Tool For Storing Entire Web Pages As Single HTML Files

A data hoarder’s dream come true: bundle any web page into a single HTML file.…

2 days ago