WebExtension.net
WebExtension.net
Toggle dark mode
WebExtension.net
WebExtension.net
Orion Open Redirect Hunter

Orion Open Redirect Hunter

View on Chrome Web Store
View Orion Open Redirect Hunter Chrome Extension on Chrome Web Store
Add to bookmarks
0.0 (0 ratings)
0 views
This extension has been viewed 0 times
0 downloads
This extension has been downloaded 0 times

Data is synced from the Chrome Web Store. View the official store page for the most current information.

Automated, safe scanner for Open Redirect vulnerabilities. Does not follow redirects; records Location/meta/JS evidence.
Type
Extension
Users
3 users
1
Shubham Singh
View author page of Shubham Singh
Published
Published on August 13, 2025
Version 1.0.0
Manifest version
3
Updated
Updated on August 13, 2025
productivity/developer
Extension Category
View on Chrome Web Store
View Orion Open Redirect Hunter Chrome Extension on Chrome Web Store
Share This Extension
Share on Twitter
Share on Facebook
Share on LinkedIn
Share on Reddit
Share on Bluesky
Share on Pinterest
Orion Open Redirect Hunter Chrome Extension Image 1
Orion Open Redirect Hunter Chrome Extension Image 2
Orion Open Redirect Hunter Chrome Extension Image 3

Description

Orion Open Redirect Hunter automates manual tests for Open Redirect (Unvalidated Redirects/Forwards) in web apps. It injects benign, controlled payloads pointing to example.com and never follows redirects. Instead, it observes:

HTTP 3xx Location headers

HTML meta refresh tags

JavaScript redirects (location.href, location.assign, location.replace)

If a redirect to the canary destination is detected, the tool flags the URL as vulnerable and records clear evidence.

Why it’s safe No redirect following: requests are issued with redirect handling disabled

Benign payloads only (https://example.com, //example.com, and encoded variants)

Timeouts & optional rate limiting to avoid stressing targets

No third-party services: everything runs locally in your browser

Key features Test one or many URLs (paste multiple; one per line)

Auto-detect common redirect parameters (next, redirect_uri, returnTo, etc.) or specify your own

Choose GET or HEAD, set timeout and delay between requests

View results inline and Export JSON with full evidence (status, header, mechanism)

Clear legal/ethical banner; intended for authorized testing only

Typical use cases Security reviews of login flows, OAuth/OIDC callbacks, and post-login redirect chains

AppSec CI/spot checks during release hardening

Bug bounty triage and validation

How it works (high level) You paste URLs to scan

The tool sets candidate redirect parameters to benign URLs (and encoded variants)

It sends requests with redirect=manual and inspects response headers and HTML

Findings are displayed and can be exported as JSON

Notes Only test systems you own or have permission to assess

You may need to whitelist targets in your testing scope and follow responsible disclosure practices

open redirect, unvalidated redirect, redirect_uri, OAuth, OIDC, AppSec, bug bounty, security testing, Location header, meta refresh, JavaScript redirect, penetration testing (authorized)

© 2025 WebExtension.net. All rights reserved.
Disclaimer: WebExtension.net is not affiliated with Google or the Chrome Web Store. All product names, logos, and brands are property of their respective owners. All extension data is collected from publicly available sources.
Go to top