Resistance Test is an automated, high-performance security hardening analysis tool and vulnerability scanner. It is designed to evaluate web application security against the OWASP Top 10, featuring Honey-Token (Canary) generation, Brute Force detection, and Database Hardening audits.
Built on the Global Prevention Strategy, this suite provides a "one-click" forensic dashboard for developers, security researchers, and penetration testers to verify system resistance.
FOR AUTHORIZED TESTING ONLY. This tool is designed to help developers and security researchers verify the "resistance" of their own systems.
- NEVER use this tool against targets you do not own or have explicit written permission to test.
- The authors are not responsible for any misuse or damage caused by this tool.
- Using this tool against public infrastructure (like Google, etc.) without permission is illegal and may result in IP banning or legal action.
- Download/Clone this repository.
- Double-click
start.bat.- This script will check for Python. If missing, it will help you install it.
- It will automatically install all required libraries (
flask,requests, etc.). - It will launch the server and open the Dashboard in your browser automatically.
- Install dependencies:
pip install -r requirements.txt
- Run the launcher:
python run.py
- Open the UI:
Navigate to
http://127.0.0.1:5000in your web browser.
core/: The "Brain" - Contains the testing engine (tester.py) and canary generators.ui/: The "Face" - Contains the HTML/CSS/JS for the dashboard.server.py: The unified backend and web server.run.py: The Python-based automation launcher.start.bat: The Windows-friendly bootstrap script.
- A02 Cryptographic Failure: Verify HTTPS and TLS enforcement.
- A03 Injection Probes: Test for SQL Injection and XSS reflection.
- A05 Security Misconfiguration: Scans for exposed
.env,config.php, and.gitfiles. - A07 Brute Force Resistance: Test rate-limiting with intelligent kill-switches to prevent IP banning.
- A10 SSRF Probe: Analyze server-side request forgery risks.
- DB Hardening Check: Verifies database folder visibility (User Rule #5) and remote SQL port security (Rule #8).
- Forensic Traps (Honey-Tokens): Generate decoy credentials to detect unauthorized snooping.
The Forensic Trap module doesn't just scan for bugs—it sets an active "Digital Tripwire" for hackers.
A Decoy file is a piece of "Bait" that looks like a sensitive credential but is actually fake. Normal users will never look for these files, but a hacker using automated tools or manual snooping will find them immediately.
- Generate: Use the buttons on the dashboard to generate
.env,SQL Config, orRoot Keys. - Setup: Create a file with the corresponding name (e.g.,
.env) in your server's root directory. - Bait: Paste the generated fake content into that file.
If anyone accesses these files, you know 100% that your server is being snooped on. You can use server-level tools (like Auditd on Linux) to notify you the instant these files are opened, giving you an early warning before they find your real data.
- Deny by Default: Total access control logic.
- Data vs Logic: Treating user input as "Dumb Strings."
- Fail-Safe Defaults: Systems fail in a "Closed" state.
- No Glassmorphism: Clean, professional, and accessible UI design.