A program used to flood phishing links with bogus data in order to try to protect the real information from actual victims.
Copy config.example.json
to src/app.config.json
and update the configuration accordingly. The application is setup to read from that file, and Git will ignore it.
Please refer to config.ts for the type definitions of the configuration file, and config.example.json to see a list of all possible options.
Key | Type | Description |
---|---|---|
count |
number |
Number of requests to send. Set to 0 to run forever |
interval |
number |
The time to wait between requests |
log |
number |
Numbers outlined in the next section |
You can use the provided docker-compose.yml file. The provided config.example.json file is configured to run using that server.
cd docker/test
docker-compose up -d
npm install
npm start
Test coverage is still not 100%, but will be be working on adding more as time permits.
npm run test