Skip to content

Commit 406d679

Browse files
authored
Add files via upload
1 parent 3f974d4 commit 406d679

File tree

4 files changed

+156
-0
lines changed

4 files changed

+156
-0
lines changed
Lines changed: 91 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,91 @@
1+
import requests
2+
import argparse
3+
import sys
4+
import os
5+
from colorama import Fore
6+
import validators
7+
import time
8+
9+
# Validations
10+
11+
def check(url_list):
12+
for url in url_list:
13+
if not validators.url(url):
14+
print("You must specify a valid URL: {}".format(url))
15+
print("Exiting...")
16+
sys.exit(1)
17+
18+
def exploit(url_list, timeout, outfile):
19+
20+
try:
21+
22+
with open(outfile, "w") as f:
23+
f.write("Vulnerable domains\n\t")
24+
25+
for url in url_list:
26+
27+
print(Fore.WHITE + "Target Url {}".format(url))
28+
print(Fore.RED+"------------------------------------------------------------------------")
29+
30+
try:
31+
response = requests.get(url, timeout=timeout)
32+
33+
if 'X-Frame-Options' not in response.headers or 'frame-ancestors' not in response.headers:
34+
print(Fore.GREEN + "\nYour target is vulnerable")
35+
print(Fore.GREEN + "Saving Vulnerable Url into Output File")
36+
time.sleep(3)
37+
f.write(url + "\n")
38+
else:
39+
print("Not vulnerable: {}".format(url))
40+
41+
except requests.exceptions.RequestException:
42+
print(f"An error occurred while connecting to the application: {url}")
43+
44+
except Exception:
45+
46+
print(Fore.RED+"An error occurred while opening or writing to the output file: {}".format(outfile))
47+
print("Thank You For Using")
48+
time.sleep(2)
49+
sys.exit()
50+
51+
52+
53+
if __name__ == '__main__':
54+
55+
print(Fore.LIGHTWHITE_EX +"-------------------------------------------------------------------------------------------------")
56+
print(Fore.RED + '''
57+
░█████╗░██╗░░░░░██╗░█████╗░██╗░░██╗░░░░░██╗░█████╗░░█████╗░██╗░░██╗░██████╗░█████╗░░█████╗░███╗░░██╗"
58+
"██╔══██╗██║░░░░░██║██╔══██╗██║░██╔╝░░░░░██║██╔══██╗██╔══██╗██║░██╔╝██╔════╝██╔══██╗██╔══██╗████╗░██║"
59+
"██║░░╚═╝██║░░░░░██║██║░░╚═╝█████═╝░░░░░░██║███████║██║░░╚═╝█████═╝░╚█████╗░██║░░╚═╝███████║██╔██╗██║"
60+
"██║░░██╗██║░░░░░██║██║░░██╗██╔═██╗░██╗░░██║██╔══██║██║░░██╗██╔═██╗░░╚═══██╗██║░░██╗██╔══██║██║╚████║"
61+
"╚█████╔╝███████╗██║╚█████╔╝██║░╚██╗╚█████╔╝██║░░██║╚█████╔╝██║░╚██╗██████╔╝╚█████╔╝██║░░██║██║░╚███║"
62+
"░╚════╝░╚══════╝╚═╝░╚════╝░╚═╝░░╚═╝░╚════╝░╚═╝░░╚═╝░╚════╝░╚═╝░░╚═╝╚═════╝░░╚════╝░╚═╝░░╚═╝╚═╝░░╚══╝\n''')
63+
print(Fore.LIGHTGREEN_EX + "\t\t\t\t\tWelcome to Albus Security")
64+
print(Fore.LIGHTWHITE_EX + '\t\t\t\t\tAuthor: Aniket Tyagi\n\n')
65+
66+
# Argument Controller
67+
parser = argparse.ArgumentParser()
68+
group = parser.add_mutually_exclusive_group(required=True)
69+
group.add_argument('-U', '--url', help='Specify a single URL')
70+
group.add_argument('-L', '--list', help='Specify a file containing a list of URLs')
71+
parser.add_argument('-T', '--timeout', help='Maximum number of seconds to wait while requesting a web page (Default: 10)', default=10, type=int)
72+
parser.add_argument('-O', '--output', help='Specify the output file name')
73+
74+
args = parser.parse_args()
75+
76+
if args.url:
77+
url_list = [args.url]
78+
elif args.list:
79+
if not os.path.exists(args.list):
80+
print("The specified path to the URL list does not exist!")
81+
print("Exiting...")
82+
sys.exit(1)
83+
84+
with open(args.list, 'r') as f:
85+
url_list = [line.strip() for line in f]
86+
87+
check(url_list)
88+
exploit(url_list, args.timeout, args.output)
89+
90+
print(Fore.GREEN + "The list of vulnerable domains has been stored in the specified file.\n")
91+
print(Fore.GREEN + "Thank you! Happy hacking!")
Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,21 @@
1+
MIT License
2+
3+
Copyright (c) 2022 Albus Sec
4+
5+
Permission is hereby granted, free of charge, to any person obtaining a copy
6+
of this software and associated documentation files (the "Software"), to deal
7+
in the Software without restriction, including without limitation the rights
8+
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9+
copies of the Software, and to permit persons to whom the Software is
10+
furnished to do so, subject to the following conditions:
11+
12+
The above copyright notice and this permission notice shall be included in all
13+
copies or substantial portions of the Software.
14+
15+
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16+
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17+
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18+
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19+
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20+
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
21+
SOFTWARE.
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
# Clickjacking-Vulnerability-Scanner
2+
3+
**Discover Clickjacking vulnerabilities effortlessly with our automated Clickjacking Vulnerability Scanner**
4+
5+
![Albus Security](https://github.com/AlbusSec/Clickjacking-Vulnerability-Scanner/assets/64241933/756a9ad2-c824-4db4-bd9c-81df887ec1e1)
6+
7+
# Description:-
8+
9+
Clickjacking, also known as UI redress attack, is a type of security vulnerability that tricks users into interacting with malicious elements on a web page without their knowledge. In a clickjacking attack, an attacker overlays or hides certain elements on a legitimate website, misleading users into clicking on unintended content. This can lead to unintended actions, such as unknowingly making purchases, granting permissions, or revealing sensitive information.
10+
11+
12+
ClickJacking Scan is a specialized tool designed to detect and assess clickjacking vulnerabilities in web applications. It automates the process of scanning web pages and identifying potential clickjacking risks, allowing security professionals to proactively identify and mitigate this type of vulnerability. The ClickJacking Scan tool works by analyzing the response headers of web pages and inspecting the structure and content of the HTML to identify any indicators of clickjacking susceptibility. It checks for the presence of security-related headers, such as the "X-Frame-Options" header, which are commonly used to protect against clickjacking attacks.
13+
14+
15+
# Video Tutorial
16+
17+
https://user-images.githubusercontent.com/64241933/162154304-a292bd5a-5a0f-4cc1-a0bf-cd3bd1c9cd6b.mp4
18+
19+
# Install
20+
21+
## Git
22+
```
23+
git clone https://github.com/AlbusSec/Clickjacking-Vulnerability-Scanner
24+
cd Clickjacking-Vulnerability-Scanner
25+
chmod +x Clickjacking-Vulnerability-Scanner
26+
pip3 install -r requirments.txt
27+
python3 Clickjacking-Vulnerability-Scanner -h
28+
```
29+
30+
## License & copyright
31+
32+
@ Albus Security
33+
Licensed under the [MIT License](LICENSE).
34+
35+
**Thank You**
36+
Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
argparse==1.4.0
2+
certifi==2021.5.30
3+
charset-normalizer==2.0.4
4+
colorama==0.4.4
5+
idna==3.2
6+
requests==2.26.0
7+
urllib3==1.26.6
8+
validators==0.18.2

0 commit comments

Comments
 (0)