403-Bypass-Jagat Tool to bypass 403/401. This script contain all the possible techniques to do the same.
- NOTE : If you see multiple [200 Ok]/bypasses as output, you must check the Content-Length. If the content-length is same for multiple [200 Ok]/bypasses means false positive. Reason can be "301/302" or "../" [Payload] DON'T PANIC.
- Script will print
cURL
PAYLOAD if possible bypass found.
root@Jagat_Singh:$ bash 403-Bypass-Jagat.sh -h
- Scan with specific payloads:
- [
--header
] Support HEADER based bypasses/payloadsroot@Jagat_Singh:$ bash 403-Bypass-Jagat.sh -u https://target.com/secret --header
- [
--protocol
] Support PROTOCOL based bypasses/payloadsroot@Jagat_Singh:$ bash 403-Bypass-Jagat.sh -u https://target.com/secret --protocol
- [
--port
] Support PORT based bypasses/payloadsroot@Jagat_Singh:$ bash 403-Bypass-Jagat.sh -u https://target.com/secret --port
- [
--HTTPmethod
] Support HTTP Method based bypasses/payloadsroot@Jagat_Singh:$ bash 403-Bypass-Jagat.sh -u https://target.com/secret --HTTPmethod
- [
--encode
] Support URL Encoded bypasses/payloadsroot@Jagat_Singh:$ bash 403-Bypass-Jagat.sh -u https://target.com/secret --encode
- [
--SQLi
] Support MySQL mod_Security & libinjection bypasses/payloads [** New **]root@Jagat_Singh:$ bash 403-Bypass-Jagat.sh -u https://target.com/secret --SQLi
- [
- Complete Scan {includes all exploits/payloads} for an endpoint [ --exploit ]
root@Jagat_Singh:$ bash 403-Bypass-Jagat.sh -u https://target.com/secret --exploit
- apt install curl [Debian]
If you like 403-Bypass-Jagat
and it help you in work, money/bounty, pentesting, recon or just brings you happy feelings, please show your support !