Skip to content

Latest commit

 

History

History
91 lines (62 loc) · 3.13 KB

File metadata and controls

91 lines (62 loc) · 3.13 KB

Glance

Minecraft Security Interceptor — Advanced HTTPS MITM tool that protects you from malicious mods and catches attackers.

Why?

Malicious mods and clients contain:

  • Stealers — steal your Minecraft account, browser passwords, session tokens
  • RATs — full remote control over your computer
  • Keyloggers — log everything you type
  • Doxing tools — collect your personal information

Attackers use Discord webhooks and Telegram bots to receive your stolen data.

What it does

Glance intercepts HTTPS traffic from Minecraft, detects malicious requests, blocks your data from reaching attackers, and captures their infrastructure for reporting.

Detection Capabilities

  • Known Threats: Discord webhooks, Telegram bots (100% blocked)
  • Unknown C2 Servers: Heuristic detection with 8-layer analysis
  • Custom Malware: Behavioral pattern recognition
  • Data Exfiltration: Automatic blocking of large uploads
  • Zero-Day Threats: Multi-factor scoring system

Installation

From Source

  1. Install Python 3.8+
  2. Install dependencies:
    pip install -r requirements.txt

From Releases

  1. Download the appropriate build for your platform from Releases
  2. ⚠️ Important: Download and install mitmproxy — it is required but not included in the release builds
  3. Run the executable directly

Usage

python glance.py

That's it. Glance will find Java, install certificates, and launch Minecraft with protection.

Intercepted requests are saved to ./exports/.

Export Files

  • *_BLOCKED.txt/json - Confirmed malicious requests (blocked)
  • *_potential.txt - Suspicious activity for review
  • all_connections.log - Complete connection audit trail
  • bypassed_connections.log - Trusted host activity

Configuration

Edit core/config.py to customize:

  • STRICT_MODEFalse allows known Minecraft hosts, True blocks everything untrusted
  • LOG_ALL_CONNECTIONS — Track every connection for behavioral analysis
  • BEHAVIORAL_ANALYSIS — Enable pattern recognition for unknown threats
  • MAX_POST_BODY_SIZE — Data upload limit (default: 500KB)
  • SUSPICIOUS_URLS — list of URL patterns to detect
  • PATTERNS — regex patterns for tokens (Discord, Telegram, etc.)
  • IGNORE_HOSTS — hosts that bypass interception

Advanced Settings

MAX_REQUEST_FREQUENCY = 50  # Max requests per minute
SUSPICIOUS_PORT_RANGES = [2404, 4444, 5555, 6666, 7080, 7443, 7777, 8080, 8090, 8443, 8848, 8888, 9999, 60000]
BLOCK_SUSPICIOUS_BEHAVIOR = True  # Auto-block heuristic matches

Notes

  • Run as Administrator (Windows) or with sudo (Linux/macOS) for certificate installation
  • Works on Windows, Linux, macOS

Report Attackers

When Glance catches an attacker's infrastructure in ./exports/:

Get their infrastructure banned. Your data never reached them — Glance blocked it.