List of HTTP status codes error with hacking tools


Hey guys, welcome back. In this post, I am going to post all the HTTP (Hypertext Transfer Protocol) errors response status code. Status codes are issued by a server in response to a client's request made to the server. The first digit of the status code specifies one of five standard classes of responses. The message phrases shown are typical, but any human-readable alternative may be provided. Unless otherwise stated, the status code is part of the HTTP/1.1 standard (RFC 7231).

The Internet Assigned Numbers Authority (IANA) maintains the official registry of HTTP status codes. The first digit of the status-code defines the class of response, while the last two digits do not have any classifying or categorization role.


Here are some list of HTTP status codes error:




- 400 (Bad request)


- 401 (Authorization required)


- 402 (Payment required)


- 403 (Forbidden)


- 404 (Not found)


- 405 (Method not allowed)


- 406 (Not acceptable)


- 407 (Proxy authentication required)


- 408 (Request Timeout)


- 409 (Conflict)


- 410 (Gone)


- 411 (Length required)


- 412 (Precondition failed)


- 413 (Request entity too large)


- 414 (Request URI too large)


- 415 (Unsupported media type)


- 416 (Request range not satisfiable)


- 417 (Expectation failed)


- 422 (Unprocessable entity)


- 423 (Locked)


- 424 (Failed dependency)


- 500 (Internal server error)


- 501 (Not Implemented)


- 502 (Bad gateway)


- 503 (Service unavailable)


- 504 (Gateway timeout)


- 505 (HTTP version not supported)


- 506 (Variant also negotiates)


- 507 (Insufficient storage)


- 510 (Not extended)

Hacking Tools:

What are Hacking Tools?



Hacking Tools are computer programs and scripts that help you find and exploit weaknesses in computer systems, web applications, servers and networks. There are a variety of such tools available in the market. Users can easily download hack tools for ethical hacking. Some of them are open source while others are commercial solutions.

Following is a handpicked list of hacking tools that are very popular:.


*cpf* - Perl script that scans web servers for administrative login and control panel sections


*AdminLoginFnder* - is a perl script that scans webservers for administrative login / control panel sections.


*Aircrack-ng* - 802.11 WEP and WPA-PSK keys cracking program


*cintruder* - an automatic pen-testing tool to bypass captchas


*cmsexplore* - is designed to reveal the specific modules, plugins, components and themes that various CMS driven web sites are running


*darkd0rk3r* - dork searching and searches for local file inclusion and SQL injection


*dsniff* - is a collection of tools for network auditing and penetration testing


*hashcatplus* - a GPGPU-based multi-hash cracker


*hashid* - identifies the different types of hashes used to encrypt data


*Image-exiftool* - provides an extensible set of Perl modules to read and write meta information in a wide variety of image, audio and video files


*johntheripper* - a fast password cracker


*maltego* - an open-source intelligence and forensics application


*networkmine* - a Network Forensic Analysis Tool (NFAT) for Windows


*nikto* - an Open Source web server scanner


*nipper* - used to make observations about the security configurations of many different device types such as routers, firewalls, and switches


*nmap* - a free and open-source utility for network discovery and security auditing


*sqlmap* - an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws


*shodan* - "unsafe routers and more" list


*uniscan* - a simple Remote File Include, Local File Include and Remote Command Execution vulnerability scanner

*unix-privesc-checker* - tries to find misconfigurations that could allow local unprivileged users to escalate privileges to other users


*wireshark* - a network protocol analyzer for Unix and Windows


*wpscan* - a black box WordPress vulnerability scanner


*xsser* - an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications

Previous Post Next Post