We take the security of this project seriously. If you discover a security vulnerability, please follow the responsible disclosure guidelines outlined below.
| Version | Supported |
|---|---|
| 1.0.x | ✅ |
If you find a security issue in our scripts, tools, or documentation:
- DO NOT open a public GitHub issue
- Email the maintainers directly at: [Your contact email]
- Include detailed information about the vulnerability
- Allow reasonable time for a fix before public disclosure
Please provide the following information in your report:
- Description: Clear description of the vulnerability
- Impact: Potential impact and severity
- Steps to Reproduce: Detailed steps to reproduce the issue
- Proof of Concept: Code or commands demonstrating the vulnerability
- Suggested Fix: If you have recommendations for fixing the issue
- Your Contact Information: For follow-up questions
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Fix Timeline: Varies based on severity
- Critical: Within 7 days
- High: Within 14 days
- Medium: Within 30 days
- Low: Next scheduled release
-
Authorization First
- Only test applications you have explicit permission to test
- Obtain written authorization before security testing
- Respect bug bounty program rules and scope
-
Responsible Testing
- Use appropriate rate limiting
- Don't overwhelm target servers
- Test during off-peak hours when possible
- Use your own test domains (don't use evil.com in production)
-
Data Protection
- Don't include sensitive data in payloads
- Secure your test results
- Don't share unauthorized vulnerability findings publicly
-
Legal Compliance
- Comply with local laws and regulations
- Understand CFAA (Computer Fraud and Abuse Act) or equivalent
- Follow responsible disclosure practices
Our testing scripts are designed with safety in mind:
- No Exploitation: Scripts only test for vulnerabilities, they don't exploit them
- SSL Verification: Warnings are disabled only for testing flexibility
- Timeout Protection: Default timeouts prevent hanging requests
- Rate Limiting: Configurable thread counts for respectful testing
When using the Python script:
# Good practice - reasonable settings
python test_open_redirect.py \
-u "https://authorized-target.com" \
-t 5 \
--timeout 10When using the Bash script:
# Good practice - with output logging
./quick_test.sh \
-u "https://authorized-target.com" \
-t 5 \
-o results.txtThe following are known limitations and NOT security vulnerabilities:
- False Positives: Some payloads may trigger false positives
- SSL Warnings Disabled: This is intentional for testing flexibility
- No Authentication: Scripts don't handle authenticated testing
- Rate Limiting: Scripts may be blocked by WAF/rate limiting
- Scripts test for vulnerabilities but don't exploit them
- Payloads are educational and for authorized testing only
- No sensitive data collection or transmission
- No persistence or system modification
- Authorized penetration testing
- Bug bounty hunting within scope
- Security research with permission
- Educational purposes in controlled environments
- Testing your own applications
- Unauthorized testing of any system
- Malicious exploitation
- Harassment or harm
- Illegal activities
- Violating terms of service
This tool is provided for educational and authorized security testing purposes only.
- Users are solely responsible for their actions
- Unauthorized access to systems is illegal
- The authors are not liable for misuse
- Always obtain proper authorization
- USA: Computer Fraud and Abuse Act (CFAA)
- UK: Computer Misuse Act 1990
- EU: GDPR and national cybercrime laws
- International: Local cybercrime legislation
Our Python script uses:
requests- For HTTP operationsurllib3- For URL handlingcolorama- For terminal colors
# Update dependencies regularly
pip install --upgrade requests urllib3 colorama
# Check for vulnerabilities
pip install safety
safety checkAll payloads in this repository are:
- Non-malicious: No actual exploitation code
- Safe to use: Won't harm systems when used properly
- Educational: Designed for learning and testing
- Authorized use only: Require explicit permission
Some payloads include JavaScript or Data URIs:
- These are for testing purposes only
- Replace with safe test cases for production testing
- Always sanitize when creating test cases
Example safe testing:
// Replace alert(1) with safe test
javascript:console.log('test')If you discover someone misusing this tool:
- Report to GitHub if it violates their terms
- Contact local authorities for illegal activities
- Notify the affected party if possible
- Document the incident
- Assessment: Evaluate severity and impact
- Development: Create and test fixes
- Release: Deploy patches promptly
- Notification: Inform users of critical updates
- Documentation: Update security advisories
- Watch the repository for security updates
- Check CHANGELOG.md regularly
- Follow security best practices
For security concerns:
- GitHub Issues: For non-sensitive questions (use
securitylabel) - Email: For sensitive vulnerability reports
- Discussions: For general security questions
We appreciate responsible security researchers who:
- Report vulnerabilities privately
- Allow time for fixes
- Follow coordinated disclosure
- Help improve security
- OWASP Testing Guide
- Bug Bounty Best Practices
- Responsible Disclosure Guidelines
- CWE-601: Open Redirect
Last Updated: 2024-01-15
Remember: With great power comes great responsibility. Use this tool ethically and legally.