A python script designed to check if the website if vulnerable of clickjacking and create a poc
-
Updated
Sep 5, 2020 - Python
A python script designed to check if the website if vulnerable of clickjacking and create a poc
The God's EYE in Python
Live for Go hackers (bug bounty)
🕵️♂️ɪɴғᴏʀᴍᴀᴛɪᴏɴ ɢᴀᴛʜᴇʀɪɴɢ ᴛᴏᴏʟ🕵️♂️
All in one subdomain and vulnerability scanner
Exploit Code, notes, and resources to accompany PortSwiggers' WebAcademy Labs.
A simple Python Script which can check multiple Domains in File for Vulnerability of ClickJacking
A simple Python Flask app to test whether a website is vulnerable to clickjacking by attempting to load it in an <iframe> and checking for security headers like X-Frame-Options and Content-Security-Policy.
To find clickjacking bug on website
Clickjoker is a python-based software that scans specific domain(s) for ClickJacking vulnerability and automatically creates a POC file for the vulnerable domain(s).
Python script to test ClickJacking
Detects if the given URL is vulnerable to clickjacking vulnerability or not
Clickjacking Scanner and POC creator for one or more sites, with frame-busting detection and additional checks, generating HTML POCs for vulnerable targets.It can also capture automatic screenshots of the generated POC, highlighting the URL bar with a red box and partially censoring it.
The Clickjacking Exploit Detector uses webpage scanning techniques to identify potential vulnerabilities and provide analysis of those elements.
A Python package for creating a clickjacking proof of concept (POC).
ReconX — Lightweight Python CLI for OSINT & network reconnaissance (subdomains, nmap, whois, clickjacking PoC, headers, geolocation)
An automated tool to generate HTML Proof of Concept files for clickjacking vulnerabilities. This tool helps security researchers and penetration testers create professional PoCs to demonstrate clickjacking attacks.
T4Dragon is a modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF .
A web crawler and vulnerability scanner tool developed by Rohit Ajariwal
Web-Exploit-Toolkit AKA WET: A Python-based tool for automated testing of common web vulnerabilities like XSS, CSRF, SQL Injection, HTML Injection, Open Redirect, and Directory Traversal. Supports GET/POST injection, custom payloads, cookie/session authentication, and OS-aware payload optimization. Designed for authorized security testing only.
Add a description, image, and links to the clickjacking topic page so that developers can more easily learn about it.
To associate your repository with the clickjacking topic, visit your repo's landing page and select "manage topics."