ClickJacker is a simple tool designed to check for clickjacking vulnerabilities in websites. It analyzes the HTTP headers of a specified URL to determine if protective measures against clickjacking, such as X-Frame-Options and Content-Security-Policy, are implemented. The tool provides clear output indicating whether a website is vulnerable or not.
- Checks for the presence of the
X-Frame-Optionsheader. - Analyzes
Content-Security-Policyfor the presence offrame-ancestors. - Placeholder functions for JavaScript frame busting and SameSite cookies checks.
- User-friendly command-line interface with colored output.
Make sure you have Python 3 installed on your machine. You will also need to install the required libraries listed in requirements.txt.
- Clone the repository:
git clone https://github.com/Cyber-30/ClickJacker.git cd ClickJacker - Install the dependencies
pip install -r requirements.txt
1.Run the tool
python ClickJacker.py2.When prompted, enter the URL you want to check for clickjacking vulnerabilities, including the http or https protocol.
3.The tool will display the HTTP headers and the results of the vulnerability check.
4.You can check another URL by typing yes when prompted, or type no to exit the tool.
Enter a website URL (including http/https): https://example.comThe accompanying HTML file test.html can be used to visually test for clickjacking. It embeds a specified URL within an iframe.
- Open
test.htmlin a web browser. - Modify the
urlToTestvariable in the<script>section of the HTML file to change the target URL for testing:const urlToTest = "https://example.com"; // Change this to the desired URL
- Save the changes and refresh the page to see if the target URL can be embedded.
