[go: up one dir, main page]

Skip to content
/ byp4xx Public
forked from lobuhi/byp4xx

Pyhton script for HTTP 40X responses bypassing. Features: Verb tampering, headers, #bugbountytips tricks and 2454 User-Agents.

Notifications You must be signed in to change notification settings

Zamanry/byp4xx

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

84 Commits
 
 
 
 
 
 

Repository files navigation

byp4xx.py

    __                __ __           
   / /_  __  ______  / // / _  ___  __
  / __ \/ / / / __ \/ // /_| |/_/ |/_/
 / /_/ / /_/ / /_/ /__  __/>  <_>  <  
/_.___/\__, / .___/  /_/ /_/|_/_/|_|  
      /____/_/                        

Python script for 40X responses bypassing. Methods from #bugbountytips, headers, verb tampering and user agents.

Installation:

git clone https://github.com/lobuhi/byp4xx.git
cd byp4xx
chmod u+x byp4xx.py
./byp4xx.py
or
python3 byp4xx.py

Usage: Start URL with http or https.

python3 byp4xx.py <cURL options> <target>

Some cURL options you may use as example:
  -L follow redirections (30X responses)
  -x <ip>:<port> to set a proxy
  -m <seconds> to set a timeout
  -H for new headers
  -d for data in the POST requests body
  -...

Example:

python3 byp4xx.py https://www.google.es/test

Features:

  • Multiple HTTP verbs/methods
  • Multiple methods mentioned in #bugbountytips
  • Multiple headers: Referer, X-Custom-IP-Authorization...
  • Accepts any cURL option
  • New module, test for 2454 UserAgents from SecList

Tips:

About

Pyhton script for HTTP 40X responses bypassing. Features: Verb tampering, headers, #bugbountytips tricks and 2454 User-Agents.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 100.0%