Zamanry / byp4xx

Pyhton script for HTTP 40X responses bypassing. Features: Verb tampering, headers, #bugbountytips tricks and 2454 User-Agents.

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

byp4xx.py

    __                __ __           
   / /_  __  ______  / // / _  ___  __
  / __ \/ / / / __ \/ // /_| |/_/ |/_/
 / /_/ / /_/ / /_/ /__  __/>  <_>  <  
/_.___/\__, / .___/  /_/ /_/|_/_/|_|  
      /____/_/                        

Python script for 40X responses bypassing. Methods from #bugbountytips, headers, verb tampering and user agents.

Installation:

git clone https://github.com/lobuhi/byp4xx.git
cd byp4xx
chmod u+x byp4xx.py
./byp4xx.py
or
python3 byp4xx.py

Usage: Start URL with http or https.

python3 byp4xx.py <cURL options> <target>

Some cURL options you may use as example:
  -L follow redirections (30X responses)
  -x <ip>:<port> to set a proxy
  -m <seconds> to set a timeout
  -H for new headers
  -d for data in the POST requests body
  -...

Example:

python3 byp4xx.py https://www.google.es/test

Features:

  • Multiple HTTP verbs/methods
  • Multiple methods mentioned in #bugbountytips
  • Multiple headers: Referer, X-Custom-IP-Authorization...
  • Accepts any cURL option
  • New module, test for 2454 UserAgents from SecList

Tips:

About

Pyhton script for HTTP 40X responses bypassing. Features: Verb tampering, headers, #bugbountytips tricks and 2454 User-Agents.


Languages

Language:Python 100.0%