READ THIS ENTIRE SECTION BEFORE USING, STUDYING, OR DISTRIBUTING THIS CODE
This software is provided STRICTLY FOR EDUCATIONAL AND RESEARCH PURPOSES ONLY. By accessing, downloading, or using this code, you acknowledge and agree to the following terms:
This project is designed exclusively for:
- Educational purposes: Learning about web automation, browser fingerprinting, and anti-detection techniques
- Security research: Understanding website security mechanisms and fingerprinting technologies
- Academic study: Analyzing web scraping methodologies and client-side detection systems
You MUST NOT use this code to:
- Violate any website's Terms of Service (ToS) or Acceptable Use Policy
- Bypass security measures with malicious intent
- Engage in spam, harassment, or abusive behavior
- Create automated posting systems that violate platform rules
- Circumvent rate limits or access restrictions
- Distribute or facilitate any illegal activities
- Interfere with normal website operations
- Create or distribute bot networks
Users must:
- Comply with all applicable local, state, national, and international laws
- Respect the Computer Fraud and Abuse Act (CFAA) and equivalent legislation in your jurisdiction
- Obtain explicit permission from website owners before automated interaction
- Follow ethical web scraping guidelines and responsible disclosure practices
- Understand that unauthorized access to computer systems may be a criminal offense
Be aware that:
- Automated posting typically violates most platforms' Terms of Service
- Circumventing anti-bot measures may constitute unauthorized access
- The target website (soyjak.party or similar) likely prohibits automated posting
- Violation of ToS may result in: IP bans, legal action, civil penalties, or criminal charges
- This software is provided "AS IS" without warranty of any kind
- The author(s) assume NO responsibility for misuse of this code
- Users assume ALL legal and ethical responsibility for their actions
- The author(s) are NOT liable for any damages, legal consequences, or penalties resulting from use of this code
- This includes but is not limited to: legal fees, fines, bans, or criminal prosecution
- Respect website operators and their communities
- Consider the impact of automated systems on server resources
- Avoid actions that could harm users or degrade service quality
- Practice responsible disclosure if security vulnerabilities are discovered
- Modern websites implement sophisticated fingerprinting and bot detection
- Detection may result in: Impossible CAPTCHAs, IP bans, account termination, or legal action
- "Fake captchas" mentioned in documentation indicate active anti-bot countermeasures
- Users are responsible for understanding laws in their jurisdiction
- Some jurisdictions treat ToS violations as criminal offenses
- Cross-border automation may trigger additional legal complexities
- Last Verified: October 30, 2025
- Status: Educational research completed - Project archived, author has moved on
- Browser Requirement: Brave user agent (or equivalent fingerprint spoofing)
- Current State: Functional as of date above, but CAPTCHAs make it impractical
"This project was pretty fun, but the captchas they added are just annoying" - Original Author
The author has stated they no longer actively maintain this project and have moved on to CAPTCHA solver research instead.
This is a research project exploring:
- Browser fingerprinting techniques
- Anti-detection mechanisms in web automation
- CAPTCHA systems and their implementation
- User behavior detection (typing patterns, mouse movement)
Important Note: This is a fully working script to create threads/post on soyjak (as of the verified date), but only when faking a Brave user agent. However, due to detection mechanisms, users may encounter impossible-to-solve fake CAPTCHAs if detected.
The target site implements:
-
Heavy browser fingerprinting
- Canvas fingerprinting
- WebGL fingerprinting
- Audio context fingerprinting
- Font enumeration
- Hardware concurrency detection
-
Behavioral analysis
- User typing patterns
- Mouse movement tracking
- Interaction timing analysis
-
Anti-automation measures
- CAPTCHA systems (including impossible fake CAPTCHAs upon detection)
- User agent validation
- TLS fingerprinting
Example of impossible CAPTCHA shown upon detection
Interface example - Note: Use with soyjak-wiki open to identify which soyjak they reference (if you're not an active soyteen poster)
Browser configuration and fingerprinting setup example
- Standard Puppeteer browser instances are detected
- User interaction patterns (typing/mouse) trigger detection
- Browser queue systems can help manage detection
- Fingerprint browsers show better evasion (but still not recommended for actual use)
Key Discovery: "Something in the users' action is detected - no idea what they are doing - but let's say you just do the Puppeteer booting you can just - you know - go and post (when you open the Node.js browser this part is not detected)"
Two primary detection vectors identified:
- User typing patterns
- Mouse movement behavior
Note from researcher: "Look I don't care about this project anymore - I want to create a captcha solver - right now I can't. The best on the market is (but is paid)..."
The following tools were referenced during research:
Anti-detection browsers (for study only):
- YSbrowser - Browser queue system implementation
- fingerprint-browser - Fingerprint spoofing tool
- openFpchromium - Older implementation, possibly stronger
- VirtualBrowser - Updated version (untested)
Commercial solution (reference only):
- BotBrowser - Paid service, noted as "best on the market"
- Modern browser fingerprinting techniques
- Client-side detection mechanisms
- Headless browser detection methods
- User behavior analysis systems
- CAPTCHA implementation strategies
- Ethical web scraping principles
- Anti-detect browser architecture
- Browser queue management systems
- Understand the legal and ethical framework
- Study browser fingerprinting in controlled environments
- Learn about detection mechanisms through code review
- Practice responsible security research methodologies
- Consider defensive applications (protecting your own sites)
- Research CAPTCHA systems and solver technologies
Notice there is very heavy fingerprinting done on this site - take it into account when conducting research.
- Completed with a browser queue system
- Requires Brave user agent spoofing for functionality
- Standard Node.js Puppeteer browsers can be opened without initial detection
- Detection triggers on specific user actions
While the script works technically, practical limitations include:
- CAPTCHA systems that become impossible when bot behavior is detected
- Behavioral analysis that monitors typing and mouse patterns
- Fingerprinting that identifies automated browsers over time
This code is provided for educational purposes only. The author(s) do not condone, encourage, or support the misuse of this technology. You are solely responsible for your actions and their consequences.
If you cannot use this responsibly and legally, DO NOT USE IT.
Please do not misuse, just study antidetect and webscraping techniques.
Be careful: if you get detected you get fake captchas they are impossible to solve.
If you discover security vulnerabilities during research:
- Contact the affected website privately
- Allow reasonable time for remediation
- Do not exploit vulnerabilities
- Follow coordinated disclosure principles
- Document your findings ethically
- Keep the soyjak-wiki open when testing to understand references
- Document detection patterns you observe
- Share findings responsibly with the security research community
- Consider contributing to anti-bot detection research
The original researcher has moved on from this project to focus on CAPTCHA solver development, indicating the increasing sophistication of anti-bot measures and the natural evolution of this arms race.
[Add appropriate license here - consider MIT, GPL, or similar with strong disclaimer]
By using this code, you agree that you have read, understood, and will comply with all terms outlined in this document.
Last Updated: October 30, 2025
Version: 1.0
Status: Archived/Educational Reference
By downloading, viewing, or using any part of this code, you explicitly acknowledge that:
- You have read and understood all warnings and disclaimers
- You accept full legal responsibility for your actions
- You will use this code only for legitimate educational or research purposes
- You understand the potential legal consequences of misuse
- You will not hold the author(s) liable for any consequences of your use of this code