Skip to content

Fast, concurrent open redirect vulnerability scanner written in Go with 100+ categorized payloads and filter bypass techniques.

License

Notifications You must be signed in to change notification settings

halilkirazkaya/gecit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Gecit

Gecit (Turkish: geçit) means "passage" or "gateway" — a narrow path that allows crossing from one side to another. In the context of web security, it represents the very thing an open redirect vulnerability creates: an unintended passage that lets attackers redirect users from a trusted domain to a malicious one.

What is Gecit?

Gecit is a fast, concurrent open redirect scanner written in Go. It tests target URLs against a comprehensive set of categorized payloads to detect redirect vulnerabilities.

Features

  • Concurrent scanning with configurable worker threads
  • 100+ payloads across 5 categories (General, Local, Bypass, Protocol, Subdomain)
  • Cloud metadata endpoint detection (AWS, GCP, Azure, DigitalOcean)
  • Filter bypass techniques (URL encoding, Unicode, backslash, whitespace, CRLF)
  • Randomized User-Agent headers to reduce fingerprinting
  • Pipe-friendly — works seamlessly with other tools via stdin

Installation

go install -v github.com/halilkirazkaya/gecit@latest

Or build from source:

git clone https://github.com/halilkirazkaya/gecit.git
cd gecit
go build -o gecit .

Usage

Flag Short Default Description
--url -u Single target URL
--list -l File containing target URLs
--threads -t 25 Number of concurrent workers
--timeout 5 Request timeout in seconds

Examples

Scan a single URL:

gecit -u "https://example.com/redirect?url="

Scan from a file:

gecit -l targets.txt

Pipe from other tools:

cat targets.txt | gecit

Combine with tools like waybackurls or gau:

echo "example.com" | waybackurls | grep -i "redirect\|url=" | gecit -t 50

Payload Categories

Category Description
General Standard redirect tests with common external domains
Local Localhost, internal IPs, and cloud metadata endpoints
Bypass URL encoding, Unicode, backslash, whitespace, and CRLF evasion
Protocol JavaScript, data, file, FTP, and WebSocket scheme tests
Subdomain Subdomain-based trust boundary bypasses

About

Fast, concurrent open redirect vulnerability scanner written in Go with 100+ categorized payloads and filter bypass techniques.

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published