Dontgo403 is a tool to bypass 40X error.
git clone https://github.com/devploit/dontgo403; cd dontgo403; go get; go build
If you want to edit or add new bypasses, you can add it directly to the specific file in payloads folder and the tool will use it.
./dontgo403 -h
Command line application that automates different ways to bypass 40X codes.
Usage:
dontgo403 [flags]
Flags:
-b, –bypassIp string Try bypass tests with a specific IP address (or hostname). i.e.: ‘X-Forwarded-For: 192.168.0.1’ instead of ‘X-Forwarded-For: 127.0.0.1’
-H, –header strings Add a custom header to the requests (can be specified multiple times)
-h, –help help for dontgo403
-p, –proxy string Proxy URL. For example: http://127.0.0.1:8080
-u, –uri string Target URL
-a, –useragent string Set the User-Agent string (default ‘dontgo403/0.3‘)
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…
This took me like 4 days (+2 days for an update), but I got it…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…