iamj0ker / bypass-403Links
A simple script just made for self use for bypassing 403
☆2,022Updated last year
Alternatives and similar repositories for bypass-403
Users that are interested in bypass-403 are comparing it to the libraries listed below
Sorting:
- 403/401 Bypass Methods + Bash Automation + Your Support ;)☆1,564Updated 3 years ago
- Rockyou for web fuzzing☆2,998Updated 5 months ago
- ☆932Updated 3 weeks ago
- 🚫 Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fast…☆1,475Updated 7 months ago
- Automated & Manual Wordlists provided by Assetnote☆1,593Updated last month
- 40X/HTTP bypasser in Go. Features: Verb tampering, headers, #bugbountytips, User-Agents, extensions, default credentials...☆1,800Updated 2 years ago
- Puredns is a fast domain resolver and subdomain bruteforcing tool that can accurately filter out wildcard subdomains and DNS poisoned ent…☆2,096Updated last year
- An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws☆3,875Updated 3 months ago
- Mining URLs from dark corners of Web Archives for bug hunting/fuzzing/further probing☆2,968Updated last year
- SecretFinder - A python script for find sensitive data (apikeys, accesstoken,jwt,..) and search anything on javascript files☆2,372Updated last year
- declutters url lists for crawling/pentesting☆1,522Updated 11 months ago
- NucleiFuzzer is a robust automation tool that efficiently detects web application vulnerabilities, including XSS, SQLi, SSRF, and Open Re…☆1,815Updated 5 months ago
- An XSS exploitation command-line interface and payload generator.☆1,412Updated last year
- Nuclei Templates Collection☆1,071Updated last month
- A repository that includes all the important wordlists used while bug hunting.☆1,370Updated 2 years ago
- Burp Extension to find potential endpoints, parameters, and generate a custom target wordlist☆1,493Updated 3 weeks ago
- Burp Plugin to Bypass WAFs through the insertion of Junk Data☆1,409Updated 6 months ago
- Subdomain takeover vulnerability checker☆1,499Updated last year
- A python tool used to discover endpoints, potential parameters, a target specific wordlist for a given target and secrets☆1,475Updated 2 weeks ago
- Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal, GhostArchive & Intelligence X!☆2,509Updated last week
- Automatic SSTI detection tool with interactive interface☆1,343Updated 2 weeks ago
- A fast tool to scan CRLF vulnerability written in Go☆1,513Updated last week
- A tool for adding new lines to files, skipping duplicates☆1,604Updated 2 years ago
- Real-world infosec wordlists, updated regularly☆1,621Updated this week
- For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️⚔️🧙☆1,815Updated last year
- Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3☆2,058Updated 2 years ago
- Payload Arsenal for Pentration Tester and Bug Bounty Hunters☆914Updated 2 months ago
- 60k+ WordPress Nuclei templates, updated daily from Wordfence intel—filter by severity/tags/CVE and scan in one line. 🚀🔒☆1,187Updated this week
- A simple tool for bypassing file upload restrictions.☆890Updated last year
- GF Paterns For (ssrf,RCE,Lfi,sqli,ssti,idor,url redirection,debug_logic, interesting Subs) parameters grep☆1,394Updated last year