Credential Stuffing Bot
Rotating lab-only usernames and fake passwords against /api/auth/login shows credential-stuffing detection and mitigation behavior.
Use this lab portal to demonstrate how controls classify and handle login abuse, fake account creation, and scraping against public content.
Start with a normal browser visit, then run one command-line scenario. Watch the terminal status codes, this app's monitoring dashboard, and Bot Defense telemetry side by side.
The generators use obvious automation headers, no proxy rotation, no evasion logic, and low-rate defaults. They only target this lab hostname.
Rotating lab-only usernames and fake passwords against /api/auth/login shows credential-stuffing detection and mitigation behavior.
Creates low-rate synthetic users through /api/auth/register so you can show account abuse classification.
Walks products, documents, and search results in a predictable sequence for scraping visibility demos.