Skip to content

r0075h3ll/Oralyzer

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

53 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Introduction

Oralyzer, a simple python script that probes for Open Redirection vulnerability in a website. It does that by fuzzing the URL that is provided in the input.

Features

Oralyzer can identify following types of Open Redirect Vulnerabilities:

  • Header Based
  • Javascript Based
  • Meta Tag Based

Also, Oralyzer has its own module to fetch URLs from web.archive.org, it then separates the URLs that have specific parameters in them, parameters that are more likely to be vulnerable.

Installation

$ git clone https://github.com/r0075h3ll/Oralyzer.git
$ pip3 install -r requirements.txt

Usage

Features

  • Improved DOM XSS detection mechanism
  • Test multiple parameters in one run
  • CRLF Injection Detection

Contribution

You can contribute to this project in following ways:

  • Create pull requests
  • Report bugs
  • Hit me up on Twitter with a new idea/feature

Releases

No releases published

Packages

No packages published

Contributors 3

  •  
  •  
  •  

Languages