Forbidden

Latest version: v13.2

Safety actively analyzes 723217 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

13.2

13.0

**Breaking changes!**

- major code refactoring,
- numerous improvements and bug fixes,
- removed redundant test cases and added many new ones.

Please read the [Usage](https://github.com/ivan-sincek/forbidden?tab=readme-ov-file#usage) as there have been many changes.

Python tool for bypassing 4xx HTTP response status codes and more. The tool is based on Python Requests, PycURL, and HTTP Client.

12.6

12.5

12.4

12.3

**Breaking changes!**

- new test named `values` - where you can test HTTP request headers using only your own values,
- `-v / --values` option now also accepts a single value for quick testing - not only a single file,
- `paths-sniper` test is renamed to `paths-ram` - **breaking change**,
- new option `-dmp / --dump` - where you can just dump all the test cases in the output file without actually running them,
- new option `-sc / --status-codes` - where you can specify which HTTP response status codes to include in the results,
- by default, `stresser` is now "locked" to `Python Requests` instead of PycURL, while `forbbiden` stays the same, "locked" to `PycURL`,
- in `streser`, `-ic / --ignore-curl` option is renamed to `-ir / --ignore-requests` - **breaking change**,
- added error handling for HTTP response decoding, and also added `OSError` in the existing exception handlers - mostly because of PycURL complaining,
- added a new fancy progress bar,
- refactored some code.

Python tool for brute forcing 4xx response status codes. Based on PycURL and Python Requests.

Links

Releases

© 2025 Safety CLI Cybersecurity Inc. All Rights Reserved.