You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
`nomore403` is an innovative tool designed to help cybersecurity professionals and enthusiasts bypass HTTP 40X errors encountered during web security assessments. Unlike other solutions, `nomore403` automates various techniques to seamlessly navigate past these access restrictions, offering a broad range of strategies from header manipulation to method tampering.
14
31
32
+
## Features
33
+
34
+
-**Auto-calibration**: Automatically detects server base responses to identify successful bypasses
35
+
-**Multiple bypass techniques**: Implements 8 different techniques to bypass restrictions
36
+
-**High concurrency**: Uses goroutines for fast and efficient testing
37
+
-**Customizable**: Easily add new payloads and techniques
38
+
39
+
## Implemented Bypass Techniques
40
+
41
+
-**Verb Tampering**: Tests different HTTP methods to access protected resources
42
+
-**Verb Case Switching**: Manipulates HTTP method capitalization to detect incorrect implementations
43
+
-**Headers**: Injects headers designed for bypassing like X-Forwarded-For, X-Original-URL, etc.
44
+
-**Custom Paths**: Tests alternative paths that can bypass access restrictions
45
+
-**Path Traversal (midpaths)**: Inserts patterns in the middle of paths to confuse parsers
46
+
-**Double-Encoding**: Uses double URL encoding to evade filters
47
+
-**HTTP Versions**: Tests different HTTP versions (1.0, 1.1) to identify inconsistent behaviors
48
+
-**Path Case Switching**: Manipulates uppercase/lowercase in paths to detect case-sensitive configurations
49
+
15
50
## Prerequisites
16
51
17
52
Before you install and run `nomore403`, make sure you have the following:
@@ -34,10 +69,27 @@ go get
34
69
go build
35
70
```
36
71
72
+
## How It Works
73
+
74
+
1.**Auto-calibration**: The tool makes a request to a non-existent path to determine the base response
75
+
2.**Default request**: Makes a standard request to the target for comparison
76
+
3.**Technique application**: Executes selected techniques in parallel
77
+
4.**Result filtering**: Shows only responses that differ from the initial calibration (unless verbose mode is used)
78
+
37
79
## Customization
38
80
39
81
To edit or add new bypasses, modify the payloads directly in the [payloads](https://github.com/devploit/nomore403/tree/main/payloads) folder. nomore403 will automatically incorporate these changes.
40
82
83
+
### Payloads Folder Structure
84
+
85
+
-**headers**: Headers used for bypassing
86
+
-**ips**: IP addresses to inject in specific headers
87
+
-**httpmethods**: Alternative HTTP methods
88
+
-**endpaths**: Custom paths to add at the end of the target URL
89
+
-**midpaths**: Patterns to insert in the middle of paths
90
+
-**simpleheaders**: Common simple headers
91
+
-**useragents**: List of User-Agents for rotation
92
+
41
93
## Usage
42
94
43
95
### Output example
@@ -107,14 +159,19 @@ Verbose: false
107
159
### Use custom header + specific IP address for bypasses
0 commit comments