Interactive Demo & Testing Platform
Verify the integrity of a JavaScript bundle using SHA-256 hashing.
Generate a signed session token binding user identity to device context.
Detect if native fetch or XHR APIs have been tampered with.
Check for proxy signatures in HTTP headers.
Measure network timing to detect potential MITM attacks.
Generate a privacy-safe device identifier.
Analyze user behavior (mouse entropy, click speed) to identify automated bots.
How to trigger "Bot Detected":
Monitor for unauthorized script tags and suspicious globals.
Listen for Content Security Policy violations.
Detect unauthorized changes to localStorage.
Sign data with HMAC-SHA256 for authenticity.
Encrypt telemetry using AES-GCM.
Generate and rotate nonces to prevent replay attacks.
Run all security checks and generate a comprehensive report.