Oralyzer : Tool To Identify Open Redirection

Oralyzer, a simple python script, capable of identifying the open redirection vulnerability in a website. It does that by fuzzing the url i.e. provided as the input.

Features

Oralyzer can identify different types of Open Redirect Vulnerabilities:

  • Header Based
  • Javascript Based
  • Meta Tag Based

Oralyzer uses waybackurls to fetch URLs from archive.org, it then separates the URLs that have specific parameters in them, parameters that are more likely to be vulnerable.

Installation

Oralyzer is built with python3.6 and hence aforesaid version would be ideal for it’s smooth functioning.

$ git clone https://github.com/0xNanda/Oralyzer.git
$ pip3 install -r requirements.txt
$ go get github.com/tomnomnom/waybackurls

Usage

R K

Recent Posts

How Web Application Firewalls (WAFs) Work

General Working of a Web Application Firewall (WAF) A Web Application Firewall (WAF) acts as…

1 day ago

How to Send POST Requests Using curl in Linux

How to Send POST Requests Using curl in Linux If you work with APIs, servers,…

1 day ago

What Does chmod 777 Mean in Linux

If you are a Linux user, you have probably seen commands like chmod 777 while…

1 day ago

How to Undo and Redo in Vim or Vi

Vim and Vi are among the most powerful text editors in the Linux world. They…

1 day ago

How to Unzip and Extract Files in Linux

Working with compressed files is a common task for any Linux user. Whether you are…

1 day ago

Free Email Lookup Tools and Reverse Email Search Resources

In the digital era, an email address can reveal much more than just a contact…

1 day ago