Skip to content

Oralyzer

Open redirection analyzer

PythonGitHub

Description

Oralyzer detects open redirect vulnerabilities by testing URL parameters with multiple payloads and bypass techniques. Open redirects can be used for phishing, OAuth token theft, and SSRF chaining.

Installation

BASH
git clone https://github.com/r0075h3ll/Oralyzer.git
cd Oralyzer
pip3 install -r requirements.txt

Basic Usage

BASH
# Test single URL
python3 oralyzer.py -u "https://target.com/redirect?url=FUZZ"

# From URL list
python3 oralyzer.py -l urls.txt

Advanced Usage

BASH
# Custom payload file
python3 oralyzer.py -u "https://target.com/redirect?url=FUZZ" -p payloads.txt

# With cookies
python3 oralyzer.py -u "https://target.com/redirect?url=FUZZ" -c "session=abc"

# Custom headers
python3 oralyzer.py -u "https://target.com/redirect?url=FUZZ" -H "Authorization: Bearer TOKEN"

Common Payloads

TEXT
# Classic
https://evil.com
//evil.com
/\evil.com
https://target.com@evil.com
https://evil.com%23.target.com
https://target.com.evil.com
//evil%00.com
//%0d%0aHost:evil.com

Common Workflows

BASH
# Collect redirect parameters from wayback
gau target.com | grep -iE "redirect|return|url|next|dest|rurl|window" | sort -u > redirect_urls.txt
python3 oralyzer.py -l redirect_urls.txt

# OAuth redirect exploitation
# Find OAuth authorize URL → inject redirect_uri with open redirect