Open Redirects
Identifies redirect parameters (`redirect`, `url`, `next`, `return_to`) that attackers exploit to redirect victims to malicious sites.
Free account required
Find open redirects, SSRF indicators, and injection points in any URL.
Parse and analyze URLs for common vulnerability patterns before you even send a request. Detects dangling redirects, cloud metadata endpoints, encoded injection payloads, and suspicious parameter names that signal SSRF or open redirect opportunities.
What it detects
Detection capabilities
Identifies redirect parameters (`redirect`, `url`, `next`, `return_to`) that attackers exploit to redirect victims to malicious sites.
Flags URLs pointing to cloud metadata endpoints (169.254.169.254), internal IP ranges, and localhost aliases.
Highlights parameters that commonly accept payloads for SQLi, XSS, or path traversal.
Decodes URL encoding, double encoding, and Unicode escapes to expose hidden injection attempts.
Step-by-step guide
Enter the full URL including query parameters. Supports encoded, double-encoded, and Unicode URLs.
The tool parses all parameters, fragments, and path components for known vulnerability patterns.
Each flagged element shows the risk type, affected parameter, and recommended test payload.
Keep going
Enumerate subdomains via DNS records, certificate transparency logs, and brute-force.
Use tool →
Discover hidden endpoints, admin paths, and API routes from any web application.
Use tool →
Inspect HTTP security headers and detect missing CSP, HSTS, and clickjacking protections.
Use tool →