/ex-redirect

ex-redirect — An automated open redirect scanner using Wayback Machine archives. Supports subdomain grouping, live URL filtering, and WordPress path ignoring. Built for bug bounty hunters and security researchers

Primary LanguagePython

ex-redirect

Banner
ex-redirect is an automated tool that finds potential open redirect vulnerabilities by analyzing historical URLs from the Wayback Machine. It supports subdomain grouping, live URL checking, and WordPress path filtering.

🚀 Features

  • 🔍 Fetches archived URLs from the Wayback Machine
  • 🌐 Scans both main domain and subdomains (wildcard support)
  • 🧪 Filters potential open redirect parameters automatically
  • ✅ Option to check if URLs are live
  • 🚫 Option to ignore WordPress-related paths
  • 📂 Saves results grouped by subdomain

🛠️ Usage

python ex-redirect.py -t example.com

Options

Option Description
-t, --target Target domain (e.g., example.com) [required]
-s, --subdomains Scan all subdomains (via Wayback wildcard)
-l, --live Only save live open redirect URLs
-wp, --wordpress Ignore WordPress-related paths

Example

python ex-redirect.py -t example.com -s -l -wp

📦 Installation

pip install -r requirements.txt

📁 Output

  • Results are saved in a folder named after the target domain.
  • Each file is named after the subdomain and contains the list of potential open redirect URLs.

✍️ Author

⚠️ Disclaimer

This tool is for educational purposes only. Usage of this tool for attacking targets without prior mutual consent is illegal.