Skip to content

ORHound is a tool written in Python whose main function is to find possible Open Redirects on a target using Google Dorks

Notifications You must be signed in to change notification settings

robotshell/ORHound

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 
 
 

Repository files navigation

ORHound v1.0

ORHound is a tool written in Python whose main function is to find possible Open Redirects on a target using Google Dorks

Disclaimer ⚠️

The author of this document take no responsibility for correctness. This project is merely here to help guide security researchers towards determining whether something is vulnerable to Open Redirect or not, but does not guarantee accuracy.

Usage

orhound.py facebook.com

Output:

 ___  ____  _   _                       _ 
 / _ \|  _ \| | | | ___  _   _ _ __   __| |
| | | | |_) | |_| |/ _ \| | | | '_ \ / _` |
| |_| |  _ <|  _  | (_) | |_| | | | | (_| |
 \___/|_| \_\_| |_|\___/ \__,_|_| |_|\__,_|

ORHound v.1.0 - Open Source Project
Author: Robotshell
Github: https://github.com/robotshell

Start Google dork scraping to find Open Redirects to facebook.com

About me

Twitter

Donation

  • If you've earned a bug bounty using this tool, please consider donating to support it's development. You can help me to develop more useful scripts and tools. Thanks 😍

About

ORHound is a tool written in Python whose main function is to find possible Open Redirects on a target using Google Dorks

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages