Warning: Declaration of FeedWordPie_Item::get_id($hash = false) should be compatible with SimplePie_Item::get_id($hash = false, $fn = 'md5') in /customers/e/3/5/cybeseclabs.com/httpd.www/wp-content/plugins/feedwordpress/feedwordpie_item.class.php on line 4 Warning: Declaration of FeedWordPress_Parser::parse(&$data, $encoding) should be compatible with SimplePie_Parser::parse(&$data, $encoding, $url = '') in /customers/e/3/5/cybeseclabs.com/httpd.www/wp-content/plugins/feedwordpress/feedwordpress_parser.class.php on line 28 Oralyzer – Tool To Identify Open Redirection – Cyber Sec Labs
PRINT
PRINT
SEND MAIL
SEND MAIL
NEW TOOLSOpen RedirectOpen Redirection DetectionOpen Redirection FuzzerOralyzer

Oralyzer – Tool To Identify Open Redirection


Oralyzer, a simple python script, capable of identifying the open redirection vulnerability in a website. It does that by fuzzing the url i.e. provided as the input.

Features
Oralyzer can identify different types of Open Redirect Vulnerabilities :
  • Header Based
  • Javascript Based
  • Meta Tag Based

Installation
Oralyzer is built with python3.6 and hence aforesaid version would be ideal for it's smooth functioning.
$ git clone https://github.com/0xNanda/Oralyzer.git
$ pip3 install -r requirements.txt

Usage



Tags: