Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/Dheerajmadhukar/4-ZERO-3
403/401 Bypass Methods + Bash Automation + Your Support ;)
https://github.com/Dheerajmadhukar/4-ZERO-3
Last synced: 22 days ago
JSON representation
403/401 Bypass Methods + Bash Automation + Your Support ;)
- Host: GitHub
- URL: https://github.com/Dheerajmadhukar/4-ZERO-3
- Owner: Dheerajmadhukar
- License: mit
- Created: 2021-02-25T17:25:51.000Z (almost 4 years ago)
- Default Branch: main
- Last Pushed: 2022-06-06T21:51:50.000Z (over 2 years ago)
- Last Synced: 2024-11-19T14:32:46.505Z (24 days ago)
- Language: Shell
- Homepage:
- Size: 16.6 MB
- Stars: 1,328
- Watchers: 21
- Forks: 250
- Open Issues: 9
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-hacking-lists - Dheerajmadhukar/4-ZERO-3 - 403/401 Bypass Methods + Bash Automation + Your Support ;) (Shell)
README
[![License](https://img.shields.io/badge/license-MIT-_red.svg)](https://opensource.org/licenses/MIT)
![Follow on Twitter](https://img.shields.io/twitter/follow/Dheerajmadhukar?style=social)### >_ Introduction
**4-ZERO-3**
Tool to bypass 403/401. This script contain all the possible techniques to do the same.- **NOTE** : If you see multiple [200 Ok]/bypasses as output, you must check the Content-Length. If the content-length is same for multiple [200 Ok]/bypasses means false positive. Reason can be "301/302" or "../" [Payload] DON'T PANIC.
- Script will print `cURL` PAYLOAD if possible bypass found.### >_ Preview
![4-ZERO-3_priview](https://github.com/Dheerajmadhukar/4-ZERO-3/blob/main/img/4-ZERO-3_priview.gif)### >_ Help
```bash
root@me_dheeraj:$ bash 403-bypass.sh -h
```### >_ Usage / Modes
- Scan with specific payloads:
* [ `--header` ] Support HEADER based bypasses/payloads
```bash
root@me_dheeraj:$ bash 403-bypass.sh -u https://target.com/secret --header
```
* [ `--protocol` ] Support PROTOCOL based bypasses/payloads
```bash
root@me_dheeraj:$ bash 403-bypass.sh -u https://target.com/secret --protocol
```
* [ `--port` ] Support PORT based bypasses/payloads
```bash
root@me_dheeraj:$ bash 403-bypass.sh -u https://target.com/secret --port
```
* [ `--HTTPmethod` ] Support HTTP Method based bypasses/payloads
```bash
root@me_dheeraj:$ bash 403-bypass.sh -u https://target.com/secret --HTTPmethod
```
* [ `--encode` ] Support URL Encoded bypasses/payloads
```bash
root@me_dheeraj:$ bash 403-bypass.sh -u https://target.com/secret --encode
```
* [ `--SQLi` ] Support MySQL mod_Security & libinjection bypasses/payloads [** New **]
```bash
root@me_dheeraj:$ bash 403-bypass.sh -u https://target.com/secret --SQLi
```
- Complete Scan {includes all exploits/payloads} for an endpoint [ --exploit ]
```bash
root@me_dheeraj:$ bash 403-bypass.sh -u https://target.com/secret --exploit
```##### Prerequisites
- apt install curl [Debian]## Support
If you like `4-ZERO-3` and it help you in work, money/bounty, pentesting, recon or just brings you happy feelings, please show your support !
:stop_sign: **Please avoid opening GitHub issues for support requests or questions!**
buy me a beer to keep me powered :)