An automated tool to generate HTML Proof of Concept files for clickjacking vulnerabilities. This tool helps security researchers and penetration testers create professional PoCs to demonstrate clickjacking attacks.
- Single URL Processing: Generate PoC for individual URLs
- Batch Processing: Process multiple URLs from a file
- Professional HTML Output: Beautiful, interactive PoC templates
- Rich CLI Interface: Modern command-line interface with progress bars
- Debugging Support: Verbose logging and debug modes
- URL Validation: Automatic validation of input URLs
- Modular Design: Clean, maintainable code structure
- Python 3.8 or higher (recommended: Python 3.11+)
- Rich library for enhanced CLI experience
Note: Python 3.7 is no longer supported as it has reached end-of-life. Python 3.8+ is required for optimal compatibility with modern systems and security updates.
# Install pipx if you don't have it
python -m pip install --user pipx
python -m pipx ensurepath
# Install directly from GitHub
pipx install git+https://github.com/ADScanPro/clickjacking-poc-generator.git
# Or install from local directory
pipx install .
Benefits of pipx:
- β Isolated virtual environment
- β No dependency conflicts
- β Easy updates and uninstalls
- β Global command availability
# One-liner installation and usage
pipx install git+https://github.com/ADScanPro/clickjacking-poc-generator.git
clickjacking-poc -u https://example.com --verbose
# Update to latest version
pipx upgrade clickjacking-poc-generator
# Uninstall
pipx uninstall clickjacking-poc-generator
# List installed packages
pipx list
# Reinstall
pipx reinstall clickjacking-poc-generator
# Clone the repository
git clone https://github.com/ADScanPro/clickjacking-poc-generator.git
cd clickjacking-poc-generator
# Install dependencies
pip install -r requirements.txt
# Make the script executable
chmod +x clickjacking_poc_generator.py
pip install clickjacking-poc-generator
# Generate PoC for a single URL
clickjacking-poc -u https://example.com
# or
clickjacking-poc-generator -u https://example.com
# Generate PoC with custom output filename
clickjacking-poc -u https://example.com -o my_poc.html
# Process multiple URLs from a file
clickjacking-poc -f urls.txt
# Process URLs with custom output directory
clickjacking-poc -f urls.txt -d output_pocs
Note: If installed with pipx, you can use the command directly. If installed manually, use:
python clickjacking_poc_generator.py -u https://example.com
# Enable verbose output
clickjacking-poc -u https://example.com --verbose
# Enable debug mode
clickjacking-poc -u https://example.com --debug
# Combine verbose and debug
clickjacking-poc -f urls.txt --verbose --debug
Option | Description |
---|---|
-u, --url |
Single URL to generate PoC for |
-f, --file |
File containing list of URLs (one per line) |
-o, --output |
Output filename for single URL |
-d, --output-dir |
Output directory for multiple URLs (default: pocs) |
-v, --verbose |
Enable verbose output |
--debug |
Enable debug mode with detailed logging |
-h, --help |
Show help message |
Create a text file with one URL per line:
https://example.com
https://vulnerable-site.com/login
https://target-website.com/dashboard
The tool generates professional HTML files with:
- Interactive PoC: Clickable demonstration of the vulnerability
- Security Warnings: Clear warnings about responsible disclosure
- Visual Indicators: Overlay demonstrations and click capture
- Documentation: Detailed information about the attack
- Responsive Design: Works on desktop and mobile devices
- π― Clickjacking Demonstration: Interactive iframe with overlay
β οΈ Security Warnings: Clear warnings about responsible use- π Attack Information: Detailed vulnerability information
- π¨ Professional Design: Clean, modern interface
- π± Responsive Layout: Works on all device sizes
- π§ Debug Tools: Built-in testing and demonstration features
clickjacking-poc-generator/
βββ clickjacking_poc_generator.py # Main script
βββ requirements.txt # Python dependencies
βββ pyproject.toml # Modern package configuration (PEP 621)
βββ .gitignore # Git ignore rules
βββ README.md # This file
The project follows Python best practices:
- Type Hints: Full type annotation support
- Error Handling: Comprehensive exception handling
- Logging: Structured logging with Rich
- Documentation: Detailed docstrings and comments
- Modular Design: Clean separation of concerns
- Fork the repository
- Create a feature branch
- Implement your changes
- Add tests if applicable
- Submit a pull request
- Only use on systems you own or have explicit permission to test
- Follow responsible disclosure practices
- Respect website terms of service
- Do not use for malicious purposes
# With pipx installation
clickjacking-poc -u https://vulnerable-site.com/login
# With manual installation
python clickjacking_poc_generator.py -u https://vulnerable-site.com/login
Output: clickjacking_poc_vulnerable-site_com.html
# Create urls.txt with target URLs
echo "https://site1.com" > urls.txt
echo "https://site2.com" >> urls.txt
# Generate PoCs (with pipx)
clickjacking-poc -f urls.txt -d my_pocs
# Or with manual installation
python clickjacking_poc_generator.py -f urls.txt -d my_pocs
Output: Multiple HTML files in my_pocs/
directory
# With pipx
clickjacking-poc -u https://example.com --debug --verbose
# With manual installation
python clickjacking_poc_generator.py -u https://example.com --debug --verbose
-
Invalid URL Error
- Ensure URLs include protocol (http:// or https://)
- Check URL format and accessibility
-
File Not Found
- Verify file path exists
- Check file permissions
-
Import Errors
- Install requirements:
pip install -r requirements.txt
- Check Python version (3.7+ required)
- Install requirements:
Enable debug mode for detailed error information:
python clickjacking_poc_generator.py --debug --verbose
Contributions are welcome! Please follow these guidelines:
- Fork the repository
- Create a feature branch (
git checkout -b feature/amazing-feature
) - Commit your changes (
git commit -m 'Add amazing feature'
) - Push to the branch (
git push origin feature/amazing-feature
) - Open a Pull Request
# Clone and setup
git clone https://github.com/yourusername/clickjacking-poc-generator.git
cd clickjacking-poc-generator
# Create virtual environment
python -m venv venv
source venv/bin/activate # On Windows: venv\Scripts\activate
# Install dependencies
pip install -r requirements.txt
# Run tests (if available)
python -m pytest
This project is licensed under the MIT License - see the LICENSE file for details.
- Security research community
- Open source contributors
- Rich library developers for the beautiful CLI experience
- Issues: GitHub Issues
- Discussions: GitHub Discussions
- Security: For security issues, please email yeray.martin@adscanpro.com
- Initial release
- Single URL processing
- Batch processing from file
- Rich CLI interface
- Professional HTML output
- Debug and verbose modes