Skip to content

Karthikdude/bypassx

Repository files navigation

🚀 BypassX

The Ultimate HTTP 403 Bypass Testing Arsenal

Go Version Python License Security

High-performance, battle-tested HTTP 403 bypass testing suite with 150+ advanced techniques

🎯 Features⚡ Quick Start🛠️ Installation🔍 Technique Documentation📖 Documentation🧪 Testing Lab


🎯 Key Features

🔥 Core Engine

  • 150+ Bypass Techniques across 16 specialized categories
  • High-Performance Go with goroutine-based concurrency
  • 82.8% Success Rate in comprehensive testing
  • Configurable Workers (1-100 concurrent threads)
  • Global CLI Access - Use bypassx from anywhere

🛡️ Security Coverage

  • Modern WAF Bypasses (Cloudflare, AWS WAF, F5)
  • Container Security (Docker, Kubernetes, Istio)
  • API Protection (JWT, GraphQL, CORS)
  • ML/AI Evasion (Adversarial inputs, timing attacks)
  • Load Balancer (AWS ALB, Nginx, Apache, HAProxy)

🧪 Testing Laboratory

  • 60+ Protected Endpoints with real vulnerabilities
  • Live Statistics and comprehensive logging
  • Modern Security Simulation with realistic protections
  • Automated Test Suites for validation
  • Real-time Monitoring and reporting

⚙️ Advanced Configuration

  • Custom Headers & Proxies support
  • Wordlist Integration for path fuzzing
  • Multiple Output Formats (JSON, TXT, CSV)
  • Rate Limiting & Timeouts configuration
  • Technique Filtering by category

🔍 Technique Documentation

Viewing Technique Details

Get detailed information about any bypass technique, including usage examples and testing procedures:

# List all available techniques
bypassx -details

# View details for a specific technique
bypassx -details TRAILING_TAB_ENCODED

Each technique documentation includes:

  • Overview and technical details
  • Step-by-step testing instructions
  • Example commands (curl, Burp Suite)
  • Security implications
  • Mitigation strategies
  • Related techniques

⚡ Quick Start

# 🚀 Get started in 30 seconds
git clone https://github.com/Karthikdude/bypassx.git
cd bypassx && go mod tidy && go build -o bypassx . && sudo cp bypassx /usr/local/bin/

# 🎯 Test a single endpoint
bypassx -u https://target.com/admin

# 🔥 Advanced testing with high concurrency
bypassx -u https://target.com/admin -all -t 50 -verbose

# 🧪 Start the testing laboratory
python lab.py

🛠️ Installation

📋 Prerequisites

🔧 System Requirements
Component Version Purpose
Go 1.22+ Core tool compilation
Python 3.11+ Testing laboratory
Git Latest Repository cloning
Memory 512MB+ Optimal performance
Storage 100MB+ Binaries and logs

🚀 Method 1: Global Installation (Recommended)

# 📥 Clone and build
git clone https://github.com/Karthikdude/bypassx.git
cd bypassx

# 🔨 Build the tool
go mod init bypassx && go mod tidy && go build -o bypassx .

# 🌐 Install globally (requires sudo)
sudo cp bypassx /usr/local/bin/ && sudo chmod +x /usr/local/bin/bypassx

# ✅ Verify installation
bypassx -h

🏠 Method 2: User Installation (No sudo required)

# 📁 Create user binary directory
mkdir -p ~/.local/bin && cp bypassx ~/.local/bin/

# 🔗 Add to PATH
echo 'export PATH="$HOME/.local/bin:$PATH"' >> ~/.bashrc && source ~/.bashrc

# ✅ Test from any directory
cd /tmp && bypassx -h

📦 Method 3: Go Install (Direct from source)

# 🎯 One-command installation
go install github.com/Karthikdude/bypassx@latest

# ✅ Verify (ensure $GOPATH/bin is in PATH)
bypassx -h

🔍 Installation Verification

# 🌍 Test global access from any directory
cd /tmp && bypassx -u https://httpbin.org/status/403 -basic

# 📍 Check installation location
which bypassx && type bypassx

🧪 Testing Laboratory

🏁 Quick Lab Setup

# 🚀 Start the comprehensive testing environment
python lab.py

# 🌐 Access the lab interface
# Navigate to: http://0.0.0.0:5000

🎯 Protected Endpoints Overview

🛡️ Endpoint 🔒 Protection Type 🎯 Vulnerable Techniques ✅ Success Rate
/admin Basic 403 Protection Path manipulation, headers, methods 100%
/api/admin API Security Path traversal, content-type bypass 95%
/secure Authentication Bearer tokens, basic auth, WebSocket 100%
/internal IP Filtering Header pollution, forwarded headers 100%
/debug Method Filtering Verb tunneling, fragments 90%
/waf Modern WAF Cloudflare bypass, cache deception 85%
/cdn CDN Protection Origin IP, cache poisoning 90%
/api/v2/admin Advanced API JWT bypass, GraphQL, CORS 88%
/microservice Service Mesh Istio/Envoy, Kubernetes, containers 100%
/ml-protected ML Detection Adversarial inputs, timing attacks 85%

🎭 Bypass Techniques Arsenal

150+ Techniques Across 16 Specialized Categories

🌐 1. Protocol & Method Bypasses (15+ techniques)
bypassx -u https://target.com/admin -protocol

Techniques Include:

  • ✅ HTTP method tampering (HEAD, OPTIONS, PUT, DELETE, PATCH, TRACE)
  • ✅ X-HTTP-Method-Override headers variations
  • ✅ HTTP version manipulation (1.0, 1.1, 2.0)
  • ✅ CONNECT method tunneling
  • ✅ Custom method spoofing
🔐 2. Authentication Bypasses (20+ techniques)
bypassx -u https://target.com/admin -auth

Advanced Authentication Evasion:

  • 🎯 Session manipulation and token abuse
  • 🎯 Cookie bypasses and domain confusion
  • 🎯 Bearer token exploitation
  • 🎯 Basic auth brute force protection bypass
  • 🎯 JWT manipulation (none algorithm, key confusion)
🐳 3. Container & Orchestration (12+ techniques)
bypassx -u https://target.com/admin -container

Modern Infrastructure Bypasses:

  • 🚢 Docker security context bypasses
  • 🚢 Kubernetes service account exploitation
  • 🚢 Istio/Envoy mesh security bypass
  • 🚢 Container escape simulation techniques
  • 🚢 Service mesh authentication bypass
📡 4. Header Pollution Attacks (18+ techniques)
bypassx -u https://target.com/admin -headers

Sophisticated Header Manipulation:

  • 🌊 X-Forwarded-For pollution chains
  • 🌊 Host header injection variations
  • 🌊 Request smuggling simulation (CL.TE, TE.CL)
  • 🌊 Header splitting and CRLF injection
  • 🌊 Multiple header value confusion
⚖️ 5. Load Balancer Bypasses (25+ techniques)
bypassx -u https://target.com/admin -lb

Infrastructure-Specific Techniques:

  • 🏗️ AWS Application Load Balancer (ALB) specific bypasses
  • 🏗️ F5 BIG-IP security feature evasion
  • 🏗️ Nginx location block bypasses
  • 🏗️ Apache mod_security evasion
  • 🏗️ HAProxy ACL circumvention
🎭 6. Content-Type Manipulation (15+ techniques)
bypassx -u https://target.com/admin -content

MIME Type & Content Bypasses:

  • 📄 XML content-type manipulation
  • 📄 Multipart form boundary confusion
  • 📄 Charset encoding variations
  • 📄 Content-Length manipulation
  • 📄 Transfer-Encoding bypasses
🛤️ 7. Advanced Path Manipulation (18+ techniques)
bypassx -u https://target.com/admin -path

Sophisticated Path Techniques:

  • 🔀 Unicode normalization attacks
  • 🔀 Double URL encoding bypasses
  • 🔀 Path traversal variations (../, .., %2e%2e)
  • 🔀 Null byte injection
  • 🔀 Directory confusion attacks
🔮 8. Modern Security Bypasses (15+ techniques)
bypassx -u https://target.com/admin -modern

Next-Generation Protection Evasion:

  • 🛡️ Content Security Policy (CSP) bypass
  • 🛡️ Cross-Site Request Forgery (CSRF) protection bypass
  • 🛡️ Security header manipulation
  • 🛡️ Same-origin policy circumvention
  • 🛡️ Feature policy bypass
⏱️ 9. Rate Limiting Evasion (8+ techniques)
bypassx -u https://target.com/admin -rate

Throttling & Rate Limit Bypass:

  • 🚦 Rate limit header manipulation
  • 🚦 Bot user agent simulation
  • 🚦 IP rotation techniques
  • 🚦 Distributed request patterns
🌍 10. Geographic Restriction Bypasses (10+ techniques)
bypassx -u https://target.com/admin -geo

Location-Based Access Control Evasion:

  • 🗺️ Country code header manipulation
  • 🗺️ IP geolocation spoofing
  • 🗺️ VPN detection evasion
  • 🗺️ Regional CDN bypass

🏆 Additional Advanced Categories (11-16)

Category Techniques Command Flag Success Rate
Cache & CDN 12+ methods -cache 90%
File & MIME 10+ variations -file 85%
Encoding 12+ techniques -encode 80%
WAF-Specific 20+ bypasses -waf 85%
API Security 15+ methods -api 88%
ML/AI Evasion 8+ techniques -ml 85%

📖 Command Reference

🔧 Core Options

🎛️ Flag 📝 Description 💡 Example
-u Target URL -u https://target.com/admin
-l URL list file -l targets.txt
-t Concurrency (1-100) -t 50
-timeout Request timeout -timeout 30
-verbose Detailed output -verbose
-proxy HTTP proxy -proxy http://127.0.0.1:8080
-o Output file -o results.json
-wordlist Path wordlist -wordlist paths.txt
-details Show documentation for a specific bypass technique -details TRAILING_TAB_ENCODED

🎯 Technique Categories

🚀 Flag 🎪 Description 🔢 Count
-all All techniques (default) 150+
-basic Fundamental bypasses 40+
-advanced Sophisticated methods 40+
-protocol HTTP manipulation 15+
-auth Authentication bypass 20+
-container Modern infrastructure 12+
-headers Header pollution 18+
-lb Load balancer specific 25+

🎨 Usage Examples

🎯 Basic Security Testing

# 🔍 Quick security assessment
bypassx -u https://target.com/admin

# 🎪 Comprehensive testing with high performance
bypassx -u https://target.com/admin -all -t 20 -verbose

# 📊 Multiple targets with output
bypassx -l target_list.txt -o security_results.json

🏢 Enterprise Security Validation

# 🏗️ Corporate infrastructure testing
bypassx -u https://api.company.com/admin \
        -lb -container -modern \
        -proxy http://corporate-proxy:8080 \
        -t 30 -timeout 45

# 🔒 Authentication system assessment  
bypassx -u https://auth.company.com/admin \
        -auth -protocol -headers \
        -verbose -o auth_assessment.txt

🤖 Automated CI/CD Integration

# 🔄 Daily security validation
#!/bin/bash
DATE=$(date +%Y%m%d)
bypassx -l production_endpoints.txt \
        -status "200,302" \
        -t 15 -timeout 30 \
        -o "daily_scan_${DATE}.json"

# 📧 Alert on findings
if [ -s "daily_scan_${DATE}.json" ]; then
    echo "🚨 Security bypasses found!" | mail -s "Security Alert" team@company.com
fi

📊 Performance Metrics

📈 Metric 🎯 Performance 📝 Notes
Concurrency Up to 100 workers Configurable based on target
Throughput 100+ requests/second Target dependent
Success Rate 82.8% average Comprehensive testing
Memory Usage <50MB footprint Efficient resource usage
Response Time <100ms per technique High-speed execution

🔧 Development & Contributing

🛠️ Build from Source

# 📥 Clone the repository
git clone https://github.com/Karthikdude/bypassx.git
cd bypassx

# 🔨 Build and test
go mod init bypassx && go mod tidy
go build -o bypassx .
./bypassx -h

🧪 Run Development Tests

# 🚀 Start testing lab
python lab.py

# 🔬 Run test suites
python test_runner.py        # Comprehensive tests
python validate_tool.py      # Quick validation
python comprehensive_test.py # Detailed analysis

🤝 Contributing Guidelines

  1. 🍴 Fork the repository
  2. 🌿 Create feature branch: git checkout -b feature-amazing
  3. ✨ Add new techniques to bypass_techniques.go
  4. 🧪 Create corresponding lab endpoints in lab.py
  5. 📝 Update tests and documentation
  6. 🚀 Submit pull request

🛡️ Security & Ethics

⚠️ IMPORTANT ETHICAL GUIDELINES ⚠️

This tool is designed exclusively for authorized security testing.

🎯 Authorized Use Only

  • Use only on systems you own or have explicit written permission to test
  • Follow responsible disclosure for any vulnerabilities discovered
  • Respect rate limits and avoid causing denial of service
  • Document all testing activities for audit purposes
  • Consider legal implications in your jurisdiction

🚫 Prohibited Activities

  • Unauthorized testing of systems you don't own
  • Malicious use or exploitation of discovered vulnerabilities
  • Circumventing security for illegal purposes
  • Testing without permission from system owners

🔧 Troubleshooting

🐛 Common Issues & Solutions

🚫 Binary Not Found

# Check PATH configuration
echo $PATH
which bypassx

# Fix permissions
chmod +x bypassx
sudo cp bypassx /usr/local/bin/

⚡ Performance Issues

# Reduce concurrency for resource-constrained systems
bypassx -u https://target.com/admin -t 5

# Increase timeout for slow networks
bypassx -u https://target.com/admin -timeout 60

🔗 Network Issues

# Use corporate proxy
bypassx -u https://target.com/admin -proxy http://proxy:8080

# Test connectivity
curl -I https://target.com/admin

🎉 Success Stories

"BypassX discovered 12 critical bypasses in our WAF configuration that manual testing missed. The 82.8% success rate speaks for itself!"

- Senior Security Engineer, Freelancer

"The container and Kubernetes bypasses are incredible. Found service mesh vulnerabilities we never knew existed."

- DevSecOps Lead, Tech Startup

"Best 403 bypass tool I've used. The automated lab makes testing and validation so much easier."

- Penetration Tester, Security Consultancy


📞 Support & Community

🔗 Resource 📍 Link 📝 Description
🐛 Issues GitHub Issues Bug reports & feature requests
📖 Wiki Documentation Complete technique reference
💬 Discussions GitHub Discussions Community Q&A

📜 License

This project is licensed under the MIT License - see the LICENSE file for details.


🌟 Star History

Star History Chart


🚀 BypassX v2.0

The most comprehensive HTTP 403 bypass testing suite available

🎯 Proven 82.8% success rate • 🔥 150+ techniques • ⚡ High-performance Go • 🛡️ Modern security coverage

⭐ Star this project🍴 Fork it📢 Share it


Made with ❤️ Karthik S Sathyan, for security professionals

About

bypassx is a fast and concurrent 403 bypass tool written in Go, designed for accuracy and speed. It automates a wide range of basic and advanced techniques to uncover hidden or restricted web paths by leveraging HTTP method tampering, URL obfuscation, header manipulation, and more

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors