Projects STRLCPY Cipherops Files
🤬
ae71d61f
ROOT /
insecure-direct-object-references-open-redirect-request-smuggling.md
29 lines | ISO-8859-1 | 1 KB

Insecure Direct Object References, Open Redirect, Request Smuggling

Here are the Insecure Direct Object References,Open Redirect and Request Smuggling tools:

## Insecure Direct Object References
- [Autorize](https://github.com/Quitten/Autorize) - Automatic authorization enforcement detection extension for Burp Suite written in Jython developed by Barak Tawily

## Open Redirect
- [Oralyzer](https://github.com/r0075h3ll/Oralyzer) - Open Redirection Analyzer
- [Injectus](https://github.com/BountyStrike/Injectus) - CRLF and open redirect fuzzer
- [dom-red](https://github.com/Naategh/dom-red) - Small script to check a list of domains against open redirect vulnerability
- [OpenRedireX](https://github.com/devanshbatham/OpenRedireX) - A Fuzzer for OpenRedirect issues


## Request Smuggling
- [http-request-smuggling](https://github.com/anshumanpattnaik/http-request-smuggling) - HTTP Request Smuggling Detection Tool
- [smuggler](https://github.com/defparam/smuggler) - Smuggler - An HTTP Request Smuggling/Desync testing tool written in Python 3
- [h2csmuggler](https://github.com/BishopFox/h2csmuggler) - HTTP Request Smuggling over HTTP/2 Cleartext (h2c)
- [tiscripts](https://github.com/defparam/tiscripts) - Scripts used to create Request Smuggling Desync payloads for CLTE and TECL style attacks.2

Please wait...
Page is in error, reload to recover