diff --git a/testing/manual_testing_plan.md b/testing/manual_testing_plan.md
index e876f2141..8741d8d5c 100644
--- a/testing/manual_testing_plan.md
+++ b/testing/manual_testing_plan.md
@@ -34,24 +34,19 @@ Test these modules using **Firefox** on your local Linux VM. They leverage stand
| [x] | **BlockUI Modal Dialog** | 1. Set `Message` and `Timeout (s)`.
2. Execute module.
3. Verify blocking overlay appears with message.
4. Wait for timeout or use UnBlockUI to remove. | None. | |
| [x] | **Clickjacking** | 1. Set `iFrame Src` to target page for clickjacking.
2. Execute module.
3. Verify page shows overlay for click-based attack.
4. Click as user would to test interaction capture. | None. | |
| [x] | **Confirm Close Tab** | 1. Configure: `Confirm text`, `Create a pop-under window on user\`
2. Click Execute.
_Shows a confirm dialog to the user when they try to close a tab._ | Close tab/window. Check for residual pop-unders. | a window pops up, but the text not as per command |
-| [x ] | **Create Foreground iFrame** | 1. Execute module.
2. Click "Our Meaty Friends" button to reveal links.
3. Click any link (e.g., "The Browser Exploitation Framework Project homepage").
4. Verify page loads in fullscreen iFrame overlay (check DevTools for `