Bypass 4xx HTTP response status codes and more. The tool is based on Python Requests, PycURL, and HTTP Client.
β257Feb 25, 2026Updated last month
Alternatives and similar repositories for forbidden
Users that are interested in forbidden are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A script for automatize boolean-based blind SQL injections (MVP).β54Aug 29, 2022Updated 3 years ago
- πα΄ Κα΄Ι΄Ι’ Κα΄α΄ α΄Κsα΄ sΚα΄ΚΚπβ11Apr 28, 2022Updated 3 years ago
- Yet another content discovery toolβ119Nov 16, 2024Updated last year
- Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hacβ¦β1,164Jan 21, 2026Updated 2 months ago
- β15May 6, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting β’ AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- π« Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fastβ¦β1,564Mar 16, 2026Updated 2 weeks ago
- web application pentesting tools for dockerβ17Aug 9, 2022Updated 3 years ago
- Jeeves SQLI Finderβ216May 13, 2022Updated 3 years ago
- WRecon, is a tool for the recognition of vulnerabilities and blackbox information for wordpress.β19Nov 30, 2022Updated 3 years ago
- Fast CLI tool to find the parameters that can be used to find SSRF or Out-of-band resource loadβ296Sep 22, 2024Updated last year
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!β1,065Updated this week
- CLI tool for discovering related base domains using WhoisXMLAPI's reverse Whois endpointsβ12Jun 15, 2024Updated last year
- Information Gathering tool - DNS / Subdomains / Ports / Directories enumerationβ1,225Mar 23, 2026Updated last week
- Small python script to look for common vulnerabilities on SMTP server.β48Dec 17, 2023Updated 2 years ago
- NordVPN Special Discount Offer β’ AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Automated Recon Tool Installerβ16Jun 29, 2022Updated 3 years ago
- 40X/HTTP bypasser in Go. Features: Verb tampering, headers, #bugbountytips, User-Agents, extensions, default credentials...β1,818Jul 3, 2023Updated 2 years ago
- A Burp Suite extension for identifying injection flaws (LFI, RCE, SQLi), authentication/authorization issues, and HTTP 403 access violatiβ¦β398Mar 6, 2026Updated 3 weeks ago
- β‘·β πππππ ππΈβ β’Ύ is a Passive Open Source Intelligence (OSINT) Automated Reconnaissance (framework)β955May 21, 2025Updated 10 months ago
- wsvuls - website vulnerability scanner detect issues [ outdated server software and insecure HTTP headers.]β57Mar 26, 2022Updated 4 years ago
- There is my vuln POC and EXP. Some of POC were collected, most of POC and EXP were written by myself.β13May 28, 2022Updated 3 years ago
- Burpsuite Extension to bypass 403 restricted directoryβ1,674Jun 29, 2023Updated 2 years ago
- An XSS exploitation command-line interface and payload generator.β1,422Jan 19, 2025Updated last year
- Nuclei Templates to reproduce Cracking the lens's Researchβ130Jan 8, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Perform OSINT on external targets using Shodanβ23Feb 7, 2024Updated 2 years ago
- Weekly updated list of missing CVEs in nuclei templates official repository. Mainly built for bug bounty, but useful for penetration testβ¦β427Mar 23, 2026Updated last week
- A simple script just made for self use for bypassing 403β2,037May 30, 2024Updated last year
- Burp Extension to find potential endpoints, parameters, and generate a custom target wordlistβ1,503Jan 8, 2026Updated 2 months ago
- Discover new target domains using Content Security Policyβ508Mar 16, 2026Updated 2 weeks ago
- β383May 17, 2023Updated 2 years ago
- 403/401 Bypass Methods + Bash Automation + Your Support ;)β1,581Jun 6, 2022Updated 3 years ago
- Subdomain takeover vulnerability checkerβ1,531Sep 10, 2024Updated last year
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilitiesβ31Jan 17, 2022Updated 4 years ago
- DigitalOcean Gradient AI Platform β’ AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Parse FFUF results in GUI with option to sort based by response code , size , keywordβ101Sep 9, 2024Updated last year
- DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on itβ453Jan 9, 2024Updated 2 years ago
- Useful "Match and Replace" burpsuite rulesβ366Sep 26, 2023Updated 2 years ago
- A fully automated, reliable, and accurate scanner for finding Spring4Shell and Spring Cloud RCE vulnerabilitiesβ657Apr 7, 2022Updated 3 years ago
- Heuristic Vulnerable Parameter Scannerβ602Jan 8, 2024Updated 2 years ago
- S3 bucket enumeratorβ30Apr 7, 2019Updated 6 years ago
- WebStor efficiently enumerates all websites across your organizationβs networks and those in your DNS records - including cloud-hosted seβ¦β156Mar 31, 2024Updated last year