Skip to content

itsimonsec/RedRip

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 

Repository files navigation

RedRip - Open Redirect Tester

RedRip is a fast and reliable tool designed to detect Open Redirect vulnerabilities in web applications. By sending crafted payloads to a target URL parameter, it helps security researchers identify if a site improperly redirects users to attacker-controlled domains.


Features

  • Generates a wide variety of common and edge-case open redirect payloads
  • Supports custom payload wordlists for tailored testing
  • Detects redirects specifically to your specified target domain
  • Color-coded console output for quick identification of findings
  • Option to display full tested URLs for detailed review
  • Ability to save scan results to a file for documentation

Requirements

  • Python 3.6 or higher
  • Install dependencies with pip:
pip install requests colorama

Usage

Run the tool from the command line as follows:

python3 redrip.py TARGET_URL [OPTIONS]

Arguments

The base URL of the vulnerable redirect parameter (e.g. https://site.com/?url=)


Options

-w/--wordlist : Path to a custom payload wordlist file -s/--save : Save results to a specified file -f/--full : Show full URLs being tested -d/--domain : Target domain to detect redirects to (e.g. evil.com) -t/--threads : Number of concurrent threads (default: 10) -mc/--match-code : Only show results with specific status code (e.g., 200) -fc/--filter-code : Filter out responses with these status codes (e.g., 403 404) -h/--help : help:)


Examples

Test a URL with default payloads and show full URLs:

python3 redrip.py "https://example.com/?url=" -f

Use a custom payload list and save results:

python3 redrip.py "https://example.com/?redirect=" -w payloads.txt -s results.txt

Change the target domain for redirection detection:

python3 redrip.py "https://example.com/?next=" -d malicious.com

How it works

The tool generates or loads payloads designed to trigger open redirect vulnerabilities. It appends each payload to the target URL and sends an HTTP GET request without following redirects. If the server responds with a redirect (Location header) pointing to the specified target domain, it marks the payload as successful. Output is color-coded: Green: Redirect to target domain detected Yellow: Redirect to other domains (potentially suspicious) Red: No redirect or error Optionally, results can be saved to a file for later analysis.


Disclaimer

This tool is intended solely for authorized penetration testing and educational purposes. Unauthorized use on websites without permission is illegal and unethical.


Author

Simon:)


Requirements

To run REDRIP, make sure you have the required Python packages installed. You can install them using the provided requirements.txt file:

pip install -r requirements.txt

This will install the following dependencies:

requests – for making HTTP requests

colorama – for colored terminal output

About

RedRip is a fast and reliable tool designed to detect Open Redirect vulnerabilities in web applications.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages