2022-02-26 03:48:47 +00:00
# Security Note for WelsonJS
## Caution
2022-02-26 12:52:49 +00:00
This repository includes recent cases on how to access Windows APIs and functions at the JavaScript level.
2022-02-26 03:48:47 +00:00
2022-02-26 12:52:49 +00:00
This way can provide a flexible development environment for anyone, but it also applies to those with malicious purposes.
2022-02-26 03:48:47 +00:00
2022-09-27 09:03:12 +00:00
Using this project to create an abuse tools (e.g. DoS attack) may be subject to punishment in your country.
2022-02-26 03:48:47 +00:00
2022-09-27 09:03:12 +00:00
Please use it only to create a web technology based application similar to Electron or legally testing tool.
2022-02-26 03:48:47 +00:00
2022-05-09 07:26:00 +00:00
## Known use cases
In general, WelsonJS is used in the following situations.
2022-10-27 17:32:59 +00:00
* Test web accessibility and compliance: e.g. W3C standards(WEB-ARIA, WCAG), The national laws(ADA/DDA, GDPR)
2022-05-09 07:26:00 +00:00
* Explore vulnerabilities of equipment within the local network
2022-09-27 09:03:12 +00:00
* Improve availablity of a clients of VPN or Proxy
2022-11-06 08:38:05 +00:00
* Build automation, CD/CI(Continuous Integration/Continuous Delivery), DevOps, SecOps
2022-05-09 07:26:00 +00:00
2022-05-09 07:42:19 +00:00
Note 1: If you deviate from the previous case mentioned above, please contact us before using it.
2022-05-09 08:00:05 +00:00
Note 2: A similar approach that WelsonJS uses has been called `LOLBins` in the cyber security community since 2018. This is not intended to be but you will get useful hints you need for extensions.
2022-05-09 07:28:32 +00:00
2022-02-26 03:48:47 +00:00
## Report abuse
If you find any abuse cases of this project, please report it.
* catswords@protonmail.com