Bypass 4xx HTTP response status codes and more. The tool is based on Python Requests, PycURL, and HTTP Client.
β255Feb 25, 2026Updated 2 months ago
Alternatives and similar repositories for forbidden
Users that are interested in forbidden are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A script for automatize boolean-based blind SQL injections (MVP).β54Aug 29, 2022Updated 3 years ago
- πα΄ Κα΄Ι΄Ι’ Κα΄α΄ α΄Κsα΄ sΚα΄ΚΚπβ11Apr 28, 2022Updated 4 years ago
- Yet another content discovery toolβ118Nov 16, 2024Updated last year
- Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hacβ¦β1,172Jan 21, 2026Updated 3 months ago
- β15May 6, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- π« Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fastβ¦β1,590Apr 12, 2026Updated 2 weeks ago
- web application pentesting tools for dockerβ17Aug 9, 2022Updated 3 years ago
- Jeeves SQLI Finderβ214May 13, 2022Updated 3 years ago
- WRecon, is a tool for the recognition of vulnerabilities and blackbox information for wordpress.β20Apr 12, 2026Updated 2 weeks ago
- Fast CLI tool to find the parameters that can be used to find SSRF or Out-of-band resource loadβ296Sep 22, 2024Updated last year
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!β1,074Mar 24, 2026Updated last month
- CLI tool for discovering related base domains using WhoisXMLAPI's reverse Whois endpointsβ12Jun 15, 2024Updated last year
- Information Gathering tool - DNS / Subdomains / Ports / Directories enumerationβ1,229Mar 23, 2026Updated last month
- Small python script to look for common vulnerabilities on SMTP server.β48Dec 17, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer β’ AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Automated Recon Tool Installerβ16Jun 29, 2022Updated 3 years ago
- 40X/HTTP bypasser in Go. Features: Verb tampering, headers, #bugbountytips, User-Agents, extensions, default credentials...β1,833Jul 3, 2023Updated 2 years ago
- A Burp Suite extension for identifying injection flaws (LFI, RCE, SQLi), authentication/authorization issues, and HTTP 403 access violatiβ¦β400Mar 6, 2026Updated last month
- β‘·β πππππ ππΈβ β’Ύ is a Passive Open Source Intelligence (OSINT) Automated Reconnaissance (framework)β959May 21, 2025Updated 11 months ago
- wsvuls - website vulnerability scanner detect issues [ outdated server software and insecure HTTP headers.]β57Mar 26, 2022Updated 4 years ago
- There is my vuln POC and EXP. Some of POC were collected, most of POC and EXP were written by myself.β13May 28, 2022Updated 3 years ago
- Burpsuite Extension to bypass 403 restricted directoryβ1,681Jun 29, 2023Updated 2 years ago
- An XSS exploitation command-line interface and payload generator.β1,419Jan 19, 2025Updated last year
- Nuclei Templates to reproduce Cracking the lens's Researchβ130Jan 8, 2022Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive β’ AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Perform OSINT on external targets using Shodanβ24Feb 7, 2024Updated 2 years ago
- Weekly updated list of missing CVEs in nuclei templates official repository. Mainly built for bug bounty, but useful for penetration testβ¦β431Apr 20, 2026Updated last week
- Burp Extension to find potential endpoints, parameters, and generate a custom target wordlistβ1,511Jan 8, 2026Updated 3 months ago
- A simple script just made for self use for bypassing 403β2,083May 30, 2024Updated last year
- Discover new target domains using Content Security Policyβ513Apr 21, 2026Updated last week
- β383May 17, 2023Updated 2 years ago
- 403/401 Bypass Methods + Bash Automation + Your Support ;)β1,603Jun 6, 2022Updated 3 years ago
- Subdomain takeover vulnerability checkerβ1,536Sep 10, 2024Updated last year
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilitiesβ31Jan 17, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Parse FFUF results in GUI with option to sort based by response code , size , keywordβ101Sep 9, 2024Updated last year
- DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on itβ454Jan 9, 2024Updated 2 years ago
- Useful "Match and Replace" burpsuite rulesβ369Sep 26, 2023Updated 2 years ago
- A fully automated, reliable, and accurate scanner for finding Spring4Shell and Spring Cloud RCE vulnerabilitiesβ656Apr 7, 2022Updated 4 years ago
- Heuristic Vulnerable Parameter Scannerβ603Jan 8, 2024Updated 2 years ago
- S3 bucket enumeratorβ30Apr 7, 2019Updated 7 years ago
- WebStor efficiently enumerates all websites across your organizationβs networks and those in your DNS records - including cloud-hosted seβ¦β157Mar 31, 2024Updated 2 years ago