Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/r0075h3ll/Oralyzer
Open Redirection Analyzer
https://github.com/r0075h3ll/Oralyzer
crlf-injection dom-xss open-redirections scanner
Last synced: about 1 month ago
JSON representation
Open Redirection Analyzer
- Host: GitHub
- URL: https://github.com/r0075h3ll/Oralyzer
- Owner: r0075h3ll
- License: gpl-3.0
- Created: 2020-07-19T08:13:05.000Z (over 4 years ago)
- Default Branch: master
- Last Pushed: 2023-03-05T20:31:35.000Z (almost 2 years ago)
- Last Synced: 2024-10-18T04:33:43.200Z (about 2 months ago)
- Topics: crlf-injection, dom-xss, open-redirections, scanner
- Language: Python
- Homepage:
- Size: 68.4 KB
- Stars: 749
- Watchers: 17
- Forks: 97
- Open Issues: 5
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-bugbounty-tools - Oralyzer - Open Redirection Analyzer (Exploitation / Open Redirect)
- WebHackersWeapons - Oralyzer
- awesome-hacking-lists - r0075h3ll/Oralyzer - Open Redirection Analyzer (Python)
README
### Introduction
Oralyzer, a simple python script that probes for Open Redirection vulnerability in a website. It does that by fuzzing the URL that is provided in the input.
### Features
Oralyzer can identify following types of Open Redirect Vulnerabilities:
- Header Based
- Javascript Based
- Meta Tag BasedAlso, Oralyzer has its own module to fetch URLs from web.archive.org, it then separates the URLs that have specific parameters in them, parameters that are more likely to be vulnerable.
### Installation
```
$ git clone https://github.com/r0075h3ll/Oralyzer.git
$ pip3 install -r requirements.txt
```### Usage
### Features
- [x] Improved DOM XSS detection mechanism
- [x] Test multiple parameters in one run
- [x] CRLF Injection Detection### Contribution
You can contribute to this project in following ways:
- Create pull requests
- Report bugs
- Hit me up on Twitter with a new idea/feature