Oralyzer, a simple python script, capable of identifying the open redirection vulnerability in a website. It does that by fuzzing the url i.e. provided as the input.
Features
Oralyzer can identify different types of Open Redirect Vulnerabilities:
Oralyzer uses waybackurls to fetch URLs from archive.org, it then separates the URLs that have specific parameters in them, parameters that are more likely to be vulnerable.
Installation
Oralyzer is built with python3.6 and hence aforesaid version would be ideal for it’s smooth functioning.
$ git clone https://github.com/0xNanda/Oralyzer.git
$ pip3 install -r requirements.txt
$ go get github.com/tomnomnom/waybackurls
Usage
Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything…
Avilla Forensics is located in first place in the award international Forensics 4:Cast, in the…
Comprehensive guide to leveraging Google Chrome's extensions for Open-Source Intelligence (OSINT) tasks. In this article,…
Embark on a journey into the realm of digital forensics with our exploration of 'Analisi-Digital-Forense.…
The intersection of intelligence, investigation, and mobility. In this comprehensive guide, we delve into the…
Tookie-osint has a simple-to-use UI and is really straightforward. The main idea of Tookie-osint is…