Oralyzer Save

Open Redirection Analyzer

Project README

Introduction

Oralyzer, a simple python script that probes for Open Redirection vulnerability in a website. It does that by fuzzing the URL that is provided in the input.

Features

Oralyzer can identify following types of Open Redirect Vulnerabilities:

  • Header Based
  • Javascript Based
  • Meta Tag Based

Also, Oralyzer has its own module to fetch URLs from web.archive.org, it then separates the URLs that have specific parameters in them, parameters that are more likely to be vulnerable.

Installation

$ git clone https://github.com/r0075h3ll/Oralyzer.git
$ pip3 install -r requirements.txt

Usage

Features

  • Improved DOM XSS detection mechanism
  • Test multiple parameters in one run
  • CRLF Injection Detection

Contribution

You can contribute to this project in following ways:

  • Create pull requests
  • Report bugs
  • Hit me up on Twitter with a new idea/feature
Open Source Agenda is not affiliated with "Oralyzer" Project. README Source: r0075h3ll/Oralyzer

Open Source Agenda Badge

Open Source Agenda Rating