██╗ ██╗ ██████╗ ██████╗ ██████╗ ██╗ ██╗
██║ ██║██╔═████╗██╔═████╗██╔═══██╗██║ ██╔╝
███████║██║██╔██║██║██╔██║██║ ██║█████╔╝
╚════██║████╔╝██║████╔╝██║██║ ██║██╔═██╗
██║╚██████╔╝╚██████╔╝╚██████╔╝██║ ██╗
╚═╝ ╚═════╝ ╚═════╝ ╚═════╝ ╚═╝ ╚═╝
ULTIMATE EDITION
Ultra Comprehensive 403/401 Bypass Tool
22 Techniques | 4,400+ Payloads
Quick Start | Features | Techniques | Usage | Why 400OK?
Ever hit a 403 Forbidden and thought "there's gotta be a way around this"? Yeah, we've all been there.
400OK Ultimate Edition is your Swiss Army knife for access control bypass testing. Born from the fusion of the best bypass tools (nomore403 + byp4xx + the legendary Monster script), this beast packs 22 unique bypass techniques and over 4,400 payloads into a single, lightning-fast Go binary.
Whether you're hunting bugs, doing a pentest, or just curious about that forbidden admin panel - 400OK has your back.
One tool to rule them all, one tool to find them,
One tool to bypass all and in the 200 bind them.
# Download the latest release
wget https://github.com/0xbugatti/400OK/releases/latest/download/400OK-linux-amd64.tar.gz
# Extract and run
tar -xzf 400OK-linux-amd64.tar.gz
cd 400OK
./400OK -u https://target.com/admin# Clone the repo
git clone https://github.com/0xbugatti/400OK.git
cd 400OK
# Build it
go build -o 400OK
# Run it
./400OK -u https://target.com/admingo install github.com/0xbugatti/400OK@latestThat's it. You're ready to bypass some access controls.
| Feature | Description |
|---|---|
| 22 Bypass Techniques | From verb tampering to Unicode encoding - we've got it all |
| 4,400+ Payloads | The most comprehensive payload collection assembled |
| Auto-Calibration | Smart filtering eliminates false positives automatically |
| Blazing Fast | Native Go HTTP client with 50+ concurrent goroutines |
| JSON Export | Export findings to JSON for your reports |
| Burp Integration | Import requests directly from Burp Suite |
| Graceful Exit | Ctrl+C shows summary before exit |
| Proxy Support | Route through Burp, ZAP, or any proxy |
| Rate Limit Aware | Auto-stops on 429 responses |
| Technique Selection | Include or exclude specific techniques |
400OK comes loaded with 22 bypass techniques organized into three tiers:
| Technique | Flag | What It Does | Requests |
|---|---|---|---|
| Verb Tampering | verbs |
Tests 86 HTTP methods (GET, POST, PATCH, POUET...) | 86 |
| Verb Case | verbs-case |
Method capitalization tricks (get, GeT, gET) | ~20 |
| Headers | headers |
53 bypass headers with 24 IP variations | ~1,200 |
| End Paths | endpaths |
Path suffixes (/, /., /?, /..;/) | 72 |
| Mid Paths | midpaths |
Path traversal patterns inserted mid-URL | 245 |
| HTTP Versions | http-versions |
HTTP/1.0 vs HTTP/1.1 vs HTTP/2 | 6 |
| Path Case | path-case |
Case manipulation (/Admin, /ADMIN, /aDmIn) | Variable |
| Double Encoding | double-encoding |
%252e instead of %2e | Variable |
| Bug Bounty Tips | bugbounty-tips |
13 proven techniques from real bounties | 13 |
| Technique | Flag | What It Does | Requests |
|---|---|---|---|
| IPv6 Bypass | ipv6 |
IPv6 localhost representations | 10 |
| Host Header | host-header |
Virtual host routing manipulation | 19 |
| Unicode/IIS | unicode |
Overlong UTF-8 encoding for IIS | 23 |
| WAF Bypass | waf-bypass |
WAF rule evasion patterns | 6 |
| Via Header | via-header |
Via header manipulation | 5 |
| Forwarded | forwarded |
RFC 7239 Forwarded header | 8 |
| Cache Control | cache-control |
Cache manipulation bypass | 6 |
| Accept Header | accept-header |
Content negotiation tricks | 6 |
| Protocol | protocol |
HTTP/HTTPS protocol switching | 2 |
| Port | port |
Non-standard port testing | 8 |
| Wayback | wayback |
Check Wayback Machine for archived pages | API |
| Technique | Flag | What It Does | Requests |
|---|---|---|---|
| Extensions | extensions |
926 file extensions (.php, .aspx, .bak...) | 926 |
| Default Creds | default-creds |
1,909 credential pairs via HTTP Basic Auth | 1,909 |
./400OK -u https://target.com/admin# Only test bug bounty tips and header manipulation
./400OK -u https://target.com/admin -k bugbounty-tips,headers,verbs# Run everything EXCEPT default credentials and extensions
./400OK -u https://target.com/admin -e default-creds,extensions./400OK -u https://target.com/admin -x http://127.0.0.1:8080./400OK -u https://target.com/admin -H "Authorization: Bearer eyJ..." -H "X-Custom: value"./400OK -u https://target.com/admin -j results.json# Slow and quiet - 500ms delay, only 10 concurrent requests, random user-agent
./400OK -u https://target.com/admin -d 500 -m 10 --random-agent -k bugbounty-tips,headers./400OK --request-file burp_request.txtcat urls.txt | ./400OKFast, low noise, high-value techniques
./400OK -u https://target.com/admin -k verbs,headers,bugbounty-tips -d 100Balanced - excludes the noisiest techniques
./400OK -u https://target.com/admin -e default-creds -x http://127.0.0.1:8080Everything, including the kitchen sink
./400OK -u https://target.com/admin -vMinimal footprint, maximum patience
./400OK -u https://target.com/admin -k bugbounty-tips,headers -d 1000 -m 5 --random-agentREQUIRED:
-u, --uri Target URL (e.g., https://target.com/admin)
TECHNIQUE SELECTION:
-k, --technique Include only these techniques (comma-separated)
-e, --exclude Exclude these techniques (comma-separated)
Note: -k and -e are mutually exclusive
REQUEST OPTIONS:
-H, --header Custom headers (repeatable)
-t, --http-method Force specific HTTP method
-a, --user-agent Custom User-Agent string
--random-agent Use random User-Agent per request
-i, --bypass-ip IP to inject in bypass headers
PERFORMANCE:
-m, --max-goroutines Max concurrent requests (default: 50)
-d, --delay Delay between requests in ms (default: 0)
--timeout Request timeout in ms (default: 6000)
-l, --rate-limit Stop on 429 responses
PROXY & NETWORK:
-x, --proxy Proxy URL (e.g., http://127.0.0.1:8080)
-r, --redirect Follow redirects
--http Use HTTP instead of HTTPS
OUTPUT:
-v, --verbose Show all responses (not just bypasses)
--unique Show only unique status/length combinations
-j, --json Export results to JSON file
-s, --summary Show scan summary (default: true)
--no-banner Hide the startup banner
INPUT:
-f, --folder Custom payloads folder location
--request-file Load request from Burp-style file
--status Filter by status codes (e.g., 200,301,403)
400OK first makes a baseline request to understand the "normal" response. Any bypass attempt that returns the same content length is filtered out - no more wading through thousands of false positives.
Using Go's goroutines, 400OK fires off 50+ requests simultaneously (configurable). This means scanning completes in seconds, not hours.
Results are deduplicated and only genuinely different responses are shown. The tool tracks:
- Status codes
- Content lengths
- Response patterns
Press Ctrl+C at any time - 400OK will show you what it found so far before exiting cleanly.
We compared 400OK against every major bypass tool. Here's how it stacks up:
| Feature | bypass-403.sh | byp4xx | nomore403 | 400OK Ultimate |
|---|---|---|---|---|
| Techniques | ~20 | 9 | 8 | 22 |
| Total Payloads | ~20 | 3,480 | 1,420 | 4,400+ |
| HTTP Methods | 3 | 84 | 17 | 86 |
| Auto-Calibration | No | No | Yes | Yes |
| IPv6 Bypass | No | No | No | Yes |
| Unicode/IIS | No | No | No | Yes |
| Wayback Check | No | No | No | Yes |
| WAF Bypass | No | No | No | Yes |
| JSON Export | No | No | No | Yes |
| Concurrency | 1 | Limited | 50 | 50+ |
| Performance | Slow | Fast | Fast | Fastest |
400OK Ultimate = Best of All Worlds
400OK ships with a comprehensive payload collection:
| File | Count | Purpose |
|---|---|---|
httpmethods |
86 | HTTP verb tampering |
headers |
53 | Bypass header names |
endpaths |
72 | Path suffix patterns |
midpaths |
245 | Path traversal patterns |
useragents |
999 | User-Agent rotation |
extensions |
926 | File extension enumeration |
defaultcreds |
1,909 | Default username:password pairs |
ipv6 |
10 | IPv6 localhost representations |
unicode |
23 | Overlong UTF-8 encodings |
waf |
6 | WAF bypass patterns |
hostvalues |
19 | Host header values |
via |
5 | Via header values |
forwarded |
8 | Forwarded header values |
cache |
6 | Cache-Control values |
accept |
6 | Accept header values |
ports |
8 | Port variations |
| Total | 4,400+ | Comprehensive coverage |
These 13 battle-tested techniques come hardcoded in 400OK:
| # | Pattern | Description |
|---|---|---|
| 1 | /%2e/{{path}} |
URL encoded dot |
| 2 | /%ef%bc%8f{{path}} |
Unicode fullwidth slash |
| 3 | {{path}}? |
Query string terminator |
| 4 | {{path}}?? |
Double query string |
| 5 | {{path}}// |
Double trailing slash |
| 6 | {{path}}/ |
Trailing slash |
| 7 | /./{{path}}/./ |
Dot slash wrappers |
| 8 | {{path}}/.randomstring |
Hidden file pattern |
| 9 | {{path}}..;/ |
Semicolon path with slash |
| 10 | {{path}}..; |
Semicolon path terminator |
| 11 | /.;/{{path}} |
Semicolon prefix |
| 12 | /.;/{{path}}/.;/ |
Semicolon wrapper |
| 13 | /;foo=bar/{{path}} |
Parameter injection |
The auto-calibration should filter false positives. If you're still seeing noise:
# Use unique mode
./400OK -u <target> --unique
# Or increase delay to avoid rate-based inconsistencies
./400OK -u <target> -d 200# Increase concurrent requests (be careful with this)
./400OK -u <target> -m 100# Enable rate limit detection and add delay
./400OK -u <target> -l -d 500# Verbose mode shows all responses
./400OK -u <target> -vYou found /admin returning 403. Quick check with low-noise techniques:
./400OK -u https://target.com/admin -k bugbounty-tips,verbs,headers -d 100You have authorization and want thorough testing through Burp:
./400OK -u https://target.com/admin -x http://127.0.0.1:8080 -H "Authorization: Bearer token123" -e default-credsTarget is running IIS and you suspect unicode normalization issues:
./400OK -u https://target.com/admin -k unicode,path-case,extensionsEndpoint returns 401 - test for weak/default credentials:
./400OK -u https://target.com/admin -k default-creds -vTesting if WAF can be evaded:
./400OK -u https://target.com/admin -k waf-bypass,bugbounty-tips,double-encoding,headers400OK is designed for authorized security testing only.
Before using this tool:
- Get explicit written permission from the target system owner
- Understand your scope - know what you're allowed to test
- Know your local laws - unauthorized access is illegal
- Use responsibly - don't cause denial of service
- Respect rate limits - be a good internet citizen
Unauthorized use may violate:
- Computer Fraud and Abuse Act (CFAA) - USA
- Computer Misuse Act - UK
- Similar legislation in other jurisdictions
The authors are not responsible for misuse of this tool. Use responsibly.
400OK Ultimate Edition stands on the shoulders of giants:
- devploit - Original
nomore403creator - lobuhi -
byp4xxcreator - @me_dheeraj - Monster script techniques
- The Bug Bounty Community - For discovering and sharing these techniques
- You - For using this tool responsibly
Found a new bypass technique? Have an idea for improvement?
- Fork the repo
- Create your feature branch (
git checkout -b feature/amazing-bypass) - Commit your changes (
git commit -m 'Add amazing bypass technique') - Push to the branch (
git push origin feature/amazing-bypass) - Open a Pull Request
- GitHub: @0xbugatti
- Issues: Report bugs or request features
MIT License - Use it, modify it, share it. Just don't be evil with it.
Built with determination by 0xBUGATTI
"Because 403 is just a suggestion"