Skip to content

Open Redirect Finder is an automation tool used to detect open redirect vulnerabilities on a URL.

Notifications You must be signed in to change notification settings

Jenderal92/Open-Redirect-Finder

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 

Repository files navigation

Open-Redirect-Finder

Open Redirect Finder is an automation tool used to detect open redirect vulnerabilities on a URL.

Open-Redirect-Finder Jenderal92

Features

  • Batch Processing: Supports testing multiple URLs at once from an input file.
  • Automatic Validation: Checks whether the entered URLs are vulnerable to open redirects.
  • Payload Options:

  • Default Payload (Option 1): Uses only the payload provided in the code.
  • Custom Payload (Option 2): Uses a custom payload entered by the user through the custom.txt file.
  • Combine Default and Custom Payload (Option 3): Uses a combination of both default and custom payloads.

How to Use

  1. Download and Install Python

    Ensure Python 2.7 is installed on your system. You can download it from the official Python website: https://www.python.org.

  2. Install Required Module

    Run the following command to install the requests library:

    pip install requests
  3. Prepare the Target URL File

    Prepare a text file containing a list of target URLs (e.g., urls.txt). Each URL should be on a separate line.

  4. Select Payload Option

    Choose the payload option you would like to use:

    • Option 1: Use the default payload that is already provided by the tool.

    • Option 2: Use a custom payload that you create, such as from the custom.txt file.

    • Option 3: Combine the default and custom payloads for a more comprehensive test.

  5. Follow the Results

    After selecting the payload and starting the test, follow the results displayed in the terminal. If an open redirect vulnerability is found, the vulnerable URL will be shown along with the payload used to discover it.

  6. Save the Test Results

    The test results will be saved in the results.txt file. This file contains a list of vulnerable URLs along with the payload used to exploit the open redirect vulnerability.

Disclaimer !!!

I have written the disclaimer on the cover of Jenderal92. You can check it HERE !!!

About

Open Redirect Finder is an automation tool used to detect open redirect vulnerabilities on a URL.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages