is a powerful tool for automating the discovery of access control bypasses by exploiting RFC 3986 edge cases and implementation flaws. It targets endpoints that return 401, 403, 404, or authentication redirects, and attempts to bypass these restrictions using a comprehensive suite of URL manipulation techniques.
MassBypass Scanner is a powerful tool for automating the discovery of access control bypasses by exploiting RFC 3986 edge cases and implementation flaws. It targets endpoints that return 401, 403, 404, or authentication redirects, and attempts to bypass these restrictions using a comprehensive suite of URL manipulation techniques.
Many web applications enforce access controls but have flaws in their URL parsing implementation. These flaws can be exploited to bypass restrictions and access protected resources. MassBypass automates the discovery and exploitation of these vulnerabilities by:
massbypass/
├── fuzzer.py # Main entry point
├── massbypass.py # Scanner implementation
├── acbypass_fuzzer.py # RFC 3986 fuzzing engine
├── requirements.txt # Dependencies
├── docs/ # Documentation
└── README.md # This file
git clone https://github.com/nullenc0de/massbypass.git
cd massbypass
pip install -r requirements.txt
go install github.com/projectdiscovery/katana/cmd/katana@latest
# Scan a single URL
python fuzzer.py -u https://example.com/admin
# Scan URLs from a file
python fuzzer.py -f targets.txt -o results.json
# Pipe URLs from another tool
cat urls.txt | python fuzzer.py - -o results.json
# Crawl and scan a domain
python fuzzer.py -d example.com --depth 3 --max-urls 2000
# Aggressive scanning with more threads
python fuzzer.py -f urls.txt -a -t 20
# Authenticated scanning
python fuzzer.py -f urls.txt --cookies "session=abc123" --headers "Authorization:Bearer token"
# Take screenshots of successful bypasses
python fuzzer.py -u https://example.com/admin --screenshots
# Use with a proxy
python fuzzer.py -f targets.txt --proxy http://127.0.0.1:8080
usage: fuzzer.py [-h] (-d DOMAIN | -u URL | -f URL_FILE | -) [-o OUTPUT]
[--output-dir OUTPUT_DIR] [-t THREADS] [--timeout TIMEOUT]
[--retry RETRY] [--delay DELAY] [--max-attempts MAX_ATTEMPTS]
[--depth DEPTH] [--max-urls MAX_URLS] [--cookies COOKIES]
[--headers HEADERS] [--user-agent USER_AGENT] [--proxy PROXY]
[-a] [--ssl-verify] [--screenshots] [--chrome-path CHROME_PATH]
[--save-responses] [-v] [-q]
MassBypass Scanner uses a multi-stage process to find access control bypasses:
The scanner implements a comprehensive suite of techniques targeting common parser implementation flaws:
MassBypass generates three report formats:
results.json
): Complete details of all findingsresults.csv
): Tabular format for easy reviewresults_summary.md
): Overview with statisticsExample of successful bypass in the JSON report:
{
"original_url": "https://example.com/admin",
"bypassed_url": "https://example.com/%2e%2e/admin",
"original_status": 403,
"bypassed_status": 200,
"mutation_type": "cve_rfc3986_traversal",
"confidence": 0.95,
"content_diff_percent": 78.5,
"evidence": "Response contains admin dashboard content",
"screenshot_path": "results/screenshots/bypass_403_to_200_traversal_1620742895.png"
}
waybackurls example.com > urls.txt
python fuzzer.py -f urls.txt -o scan1.json
grep "HIGH-CONFIDENCE" scan1.log
python fuzzer.py -u https://example.com/admin -a --screenshots
Contributions are welcome! Please feel free to submit a Pull Request.
git checkout -b feature/amazing-feature
)git commit -m 'Add some amazing feature'
)git push origin feature/amazing-feature
)This tool is intended for legal security testing with proper authorization. Do not use against systems you don’t have permission to test. The authors are not responsible for misuse or illegal use of this software.