strix
strix copied to clipboard
Add open redirect, subdomain takeover, and info disclosure prompt modules
Adds three comprehensive vulnerability detection guides following the existing template structure.
Closes #131
Changes
- ✅ Added
open_redirect.jinja- Parser differentials, OAuth exploitation, SSRF chaining - ✅ Added
subdomain_takeover.jinja- DNS enumeration, service fingerprinting, exploitation - ✅ Added
information_disclosure.jinja- Error analysis, source exposure, config leaks
Testing
All guides follow the established 180-line format and include:
- Critical context and scope
- Methodology (5 steps)
- Injection points
- Advanced techniques with examples
- Framework-specific exploitation
- Validation criteria
- Pro tips
Examples
Open Redirect
- Parser differentials:
https://[email protected] - Protocol bypasses:
//evil.com,javascript:alert(1) - OAuth token theft flows with redirect_uri manipulation
Subdomain Takeover
- Service fingerprinting: S3 NoSuchBucket, GitHub Pages, Heroku
- DNS CNAME enumeration via crt.sh and passive recon
- Impact: session hijacking via cookie scope, OAuth callbacks
Information Disclosure
- Stack trace extraction: framework paths, versions, credentials
- Git exposure:
/.git/HEAD, full repo dumping - Config leaks:
.env,web.config, API keys in JS bundles