r3dir encoder/decoder package with CLI tool
Project description
r3dir
CLI tool for r3dir
target-dynamic redirection service which helps bypass weak SSRF filters without redirection location validation.
Read details how r3dir
works at Github README page.
CLI tool
Installation
pipx install r3dir
Encode mode
$ r3dir encode -h
usage: r3dir encode [-h] [-c STATUS_CODE] [-i IGNORE_PART | -s] [--slient_mode] target_url
positional arguments:
target_url Target URL which r3dir tool should redirect to
options:
-h, --help show this help message and exit
-c STATUS_CODE, --status_code STATUS_CODE
HTTP status code of a redirect response (default: 302)
-i IGNORE_PART, --ignore_part IGNORE_PART
String, which will be ignored during decoding. Used to bypass weak REGEXs
-s, --https HTTPS enforced encoding(TLS certificate length limitation)
--slient_mode Slient mode for automations (e.g Hackvertor tags)
Decode mode
$ r3dir decode -h
usage: r3dir decode [-h] encoded_domain
positional arguments:
encoded_domain r3dir encoded domain to decode
options:
-h, --help show this help message and exit
Hackvertor mode
$ r3dir hackvertor -h
usage: r3dir hackvertor [-h] [--print]
options:
-h, --help show this help message and exit
--print Output Hackvertor tags into terminal
To use CLI tool with own server, set your domain with -d
option:
$ r3dir -h
usage: r3dir [-h] [-d MAIN_DOMAIN] {encode,decode,hackvertor} ...
Encoded/decoder CLI tool for r3dir service
options:
-h, --help show this help message and exit
-d MAIN_DOMAIN, --main_domain MAIN_DOMAIN
Domain where r3dir tool is hosted on (default: r3dir.me)
# Example of --main_domain option
$ r3dir -d your.host encode http://localhost
Python package
You also can use r3dir.encoder
module to build your own scripts or tools. It contains encode()
and decode()
functions which parameters corresponds to CLI options.
Custom errors which encoder or decoder may raise, you can find in r3dir.exceptions
.
from r3dir.exceptions import BaseCoderError, Base32DecodingError, StatusCodeNotInRangeError, WrongEncodedURLFormat, TooLongTarget
Examples
- Encoding and decoding with
ignore_part
:
from r3dir import encoder
main_domain = "r3dir.me"
ignore_part = "testingtest "
target, status_code = "http://169.254.169.254", 301
encoded_domain = encoder.encode(target, status_code=status_code, main_domain=main_domain, ignore_part=ignore_part)
# encoded_domain = "testingtest.--.62epax5fhvj3zzmzig7q.301.r3dir.me"
decoded_target, decoded_code = encoder.decode(encoded_domain, main_domain=main_domain)
# decoded_target, decoded_code = "http://169.254.169.254", 301
- HTTPS enforced encoding:
from r3dir import encoder
main_domain = "r3dir.me"
target, status_code = "http://169.254.169.254", 301
encoded_domain = encoder.encode(target, status_code=status_code, main_domain=main_domain, http_enforced=true)
# encoded_domain = "62epax5fhvj3zzmzigyoeypkbn7fysllvges3fy.301.r3dir.me"
- Slient mode prevents
TooLongTarget
error and produce an "error domain" for decoder with a hash of the long target. Decoding of the error domain will raise anTooLongTarget
exception with target's hash:
from r3dir import encoder
main_domain = "r3dir.me"
target, status_code = "http://169.254.169.254/latest/meta-data/iam/security-credentials/some_role", 301
encoded_domain = encoder.encode(target, status_code=status_code, main_domain=main_domain, http_enforced=true, slient_mode=True)
# encoded_domain = "too-long-target-2b57569cfddb7d6f61331e123da605c7573521c9.301.r3dir.me"
decoded_target, decoded_code = encoder.decode(encoded_domain, main_domain=main_domain)
# r3dir.exceptions.TooLongTarget: The target length has been too long for encoder. Target's SHA-1: 2b57569cfddb7d6f61331e123da605c7573521c9
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
r3dir-0.2.1.tar.gz
(29.0 kB
view hashes)
Built Distribution
r3dir-0.2.1-py3-none-any.whl
(25.3 kB
view hashes)