Insecure Direct Object References, Open Redirect, Request Smuggling
Here are the Insecure Direct Object References,Open Redirect and Request Smuggling tools:
## Insecure Direct Object References
- [Autorize](https://github.com/Quitten/Autorize) - Automatic authorization enforcement detection extension for Burp Suite written in Jython developed by Barak Tawily
## Open Redirect
- [Oralyzer](https://github.com/r0075h3ll/Oralyzer) - Open Redirection Analyzer
- [Injectus](https://github.com/BountyStrike/Injectus) - CRLF and open redirect fuzzer
- [dom-red](https://github.com/Naategh/dom-red) - Small script to check a list of domains against open redirect vulnerability
- [OpenRedireX](https://github.com/devanshbatham/OpenRedireX) - A Fuzzer for OpenRedirect issues
## Request Smuggling
- [http-request-smuggling](https://github.com/anshumanpattnaik/http-request-smuggling) - HTTP Request Smuggling Detection Tool
- [smuggler](https://github.com/defparam/smuggler) - Smuggler - An HTTP Request Smuggling/Desync testing tool written in Python 3
- [h2csmuggler](https://github.com/BishopFox/h2csmuggler) - HTTP Request Smuggling over HTTP/2 Cleartext (h2c)
- [tiscripts](https://github.com/defparam/tiscripts) - Scripts used to create Request Smuggling Desync payloads for CLTE and TECL style attacks.2