4-ZERO-3
4-ZERO-3 copied to clipboard
403/401 Bypass Methods + Bash Automation + Your Support ;)
Please create a new branch to contribute updated code and fixed issues.
Add flag to only show found bypasses like -silent or -q
I am not sure how CF-Connecting_IP is used to bypass 403. CF-Connecting_IP is an invalid [header](https://developers.cloudflare.com/fundamentals/get-started/http-request-headers) property, so it is not useful. If you think differently, please explain. 
Amazing tool, which be great if you can add the URL to show on 302 redirects, to see in the Output where is the Location: header redirects. thank you!
--encode runs fine and --HTTPmethod runs fine too when opted as standalone, but when --exploit is used, it's hanging after reaching 'Head: ' under HTTP Method Bypass and not progressing...
you forwarding the request to this IP : 68.180.194.242 what is this IP Address and why you do that ?
Hey, thanks a lot for this great tool : ) Just wanted to know if your tool also does case switching? https://redacted.com/admin -> 403 Forbidden https://redacted.com/Admin -> 200 OK
Getting errors in the output like: `line 1476: printf: 'B': invalid format character`.