Oralyzer, a simple python script that is capable of finding the open redirection vulnerability in a website. It does that by fuzzing the url i.e. provided as the input.
Oralyzer can identify following types of Open Redirect Vulnerabilities:
- Header Based
- Javascript Based
- Meta Tag Based
Also, Oralyzer uses its own wayback machine module to fetch URLs from web.archive.org, it then separates the URLs that have specific parameters in them, parameters that are more likely to be vulnerable.
Use python v3.7
$ git clone https://github.com/r0075h3ll/Oralyzer.git
$ pip3 install -r requirements.txt
- Improved DOM XSS detection mechanism
- Test multiple parameters in one run
- Improved speed
- CRLF Injection Detection
You can contribute to this program in following ways:
- Create pull requests
- Report bugs
- Hit me up on Twitter with a new idea/feature