Skip to content

iFrame Inspector for authorized security testing and controlled target interaction, enabling iframe analysis, logging, interface manipulation, and detection tuning within ethical red-team assessments and research.

License

Notifications You must be signed in to change notification settings

Cursed271/GlassGuard

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

GlassGuard

GlassGuard loads targets in an iframe for authorized inspection, enabling controlled interaction, logging, and testing.

📖 Table of Contents

🚀 Introduction

GlassGuard is a security tool that loads targets in an iframe for authorized inspection and controlled interaction. It enables penetration testing, iframe analysis, and interface auditing. Designed for researchers and red-teamers, it provides streamlined target loading, color-coded activity logging, reporting, detection testing within controlled environments, ensuring ethical use and compliance.

GlassGuard

✨ Features:

  • 🧠 Iframe Inspection: Loads target URLs in an iframe for authorized analysis and visualization.

  • 🔍 Controlled Interaction: Safely interacts with embedded targets without bypassing iframe protections.

  • 📜 Activity Logging: Displays real-time color-coded logs for all target and load operations.

  • 🧩 Red-Team Utility: Built for ethical iframe testing, interface inspection, and behavioral analysis.

  • ⚡ Lightweight & Self-Contained: Fully functional in pure HTML, CSS, and JavaScript — no external dependencies required.

⚙️ Installation and Usage:

  1. Pre-requisites: A modern web browser (Chrome, Firefox, Edge) and network access to the target (no Python or packages required).
  2. Clone the Repo: Use "git clone https://github.com/Cursed271/GlassGuard"
  3. Traverse into the Directory: Use "cd GlassGuard"
  4. Install Dependencies: None — GlassGuard is pure HTML/CSS/JS (no requirements.txt).
  5. Run/Open:
    • For internal targets: Place index.html on a machine in that network and open it in the browser.
    • For external targets: Open the live link in the Website section of this repository (click the URL).
  6. Execute/Use: Enter the Target URL in the UI and click Load Target

💬 Feedback

Have suggestions or feature requests? Feel free to reach out via:

Your feedback helps improve GlassGuard! Contributions and PRs are always welcome. 🚀

🙌 Contributors

  • Steven Pereira (aka Cursed) - Creator & Maintainer

📜 License

GlassGuard is licensed under the MIT License. See the LICENSE file for details.

About

iFrame Inspector for authorized security testing and controlled target interaction, enabling iframe analysis, logging, interface manipulation, and detection tuning within ethical red-team assessments and research.

Topics

Resources

License

Stars

Watchers

Forks

Languages