sardanioss

sardanioss / unobpx

Public

Decode and inspect PerimeterX (HUMAN Security) protocol traffic — OB responses, sensor payloads, OBS telemetry

13
0
80% credibility
Found Feb 25, 2026 at 13 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
Go
AI Summary

A decoder that reveals plaintext session commands, browser fingerprints, and telemetry hidden inside PerimeterX (HUMAN Security) traffic for research and analysis.

How It Works

1
🔍 Spot hidden security messages

You visit a website blocked by PerimeterX protection and get curious about the scrambled data flying between your browser and the site.

2
📥 Grab the decoder helper

Pick up the free unobpx decoder tool that unscrambles PerimeterX's secret messages for easy reading.

3
🌐 Capture mystery data

Open your browser's inspection window, visit the site, and copy the encoded blobs from the network traffic.

4
Pick what to reveal
🔑
Session responses

Unlock commands like IDs, cookies, and challenges sent back from the site.

👁️
Browser details

Uncover the full picture of your device's fingerprint data.

📊
Behavior insights

Decrypt extra tracking info bundled from another security layer.

5
Reveal the secrets

Paste your copied data into the decoder and watch it transform garbled text into clear, readable info instantly.

See inside the protection

Enjoy full view of session details, device fingerprints, and security challenges, helping you understand how the site fights bots.

Sign up to see the full architecture

4 more

Sign Up Free

Star Growth

See how this repo grew from 13 to 13 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is unobpx?

unobpx is a Go CLI and library that decodes PerimeterX (now HUMAN Security) protocol traffic, stripping XOR, base64, and shuffle obfuscation from OB responses, sensor payloads, and OBS telemetry. Paste captured devtools data into commands like `unobpx ob`, `unobpx sensor`, or `unobpx obs`, and it outputs plaintext session IDs, browser fingerprints, PoW challenges, and Snare-encrypted behavioral data. Perfect for inspecting human verification protocols without manual reverse-engineering.

Why is it gaining traction?

It auto-identifies rotating command formats across PX tag versions using value patterns, so no updates needed for new obfuscation. Handles bundled Snare traffic too, decrypting AES payloads with the hardcoded key. Devs love the dead-simple CLI for quick base64 decode and protocol inspection, plus library functions for custom tools.

Who should use this?

Security researchers dissecting PerimeterX/HUMAN bot detection. Pentesters inspecting sensor payloads and OB responses during site audits. Devs at agencies debugging client apps blocked by perimeterx protections or analyzing OBS telemetry from sii paths.

Verdict

Grab it for PerimeterX reverse-engineering—thorough docs, full test coverage, and MIT license make it production-ready despite 10 stars and 0.800000011920929% credibility score from its niche focus. Early but reliable for protocol decode work.

(178 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.