
Security News
Follow-up and Clarification on Recent Malicious Ruby Gems Campaign
A clarification on our recent research investigating 60 malicious Ruby gems.
a customizable javascript framework for filling out forms with fake data
See the Wiki on GitHub for documentation.
Also specific pages for frameworks:
Peteshow.init()
Adds the seen above menu to the top left of your page. Press backtick `
to toggle the menu.
Peteshow.fillOutForms()
Using the default rules, fills out inputs, checkboxes, selects, and radio buttons. While the menu is open, press f
to call this method.
Peteshow.fillOutFormsAndSubmit()
Does the same as above, but also submits the form. Press q
to call this method.
It also has several other methods exposed:
Methods | Description |
---|---|
submitForm() | Submits the form on the page, can be customized |
destroy() | Removes the Peteshow menu from the dom |
hide() | Hides the Peteshow menu |
show() | Shows the Peteshow menu |
formatDate(format, Date) | Returns a string with the specified format |
randomChars(length, chars) | Returns a string made up of specific characters |
randomDate(format) | Returns a random date string |
randomEmail() | Returns a random email, customized using init options |
randomLetters(length) | Returns random letters |
randomNumber(length) | Returns a random number, you can pass an optional prefix |
randomNumberRange(min,max) | Returns a number between min and max |
To access the stored values used in the reuse option, use Peteshow.storage
:
Methods | Description |
---|---|
storage.clear() | Clears saved fields from cookies and localstorage |
storage.get() | Prints out the saved fields used in the reuse option |
storage.set(hash) | Sets either cookie or localstorage, takes a hash |
Peteshow can be customized by creating a custom plugin. Here are the default options:
options = {
emailPrefix : 'test-',
emailDomain : 'example.com',
form : '',
blur : false,
cookies : false,
rules : {},
ignore : [],
filter : [],
force : {},
reuse : {},
commands : '',
special : function(){},
events : function(){},
}
$(function() {
Peteshow.init(options)
})
Name | Description |
---|---|
emailPrefix | Prefix for your generated email addresses. Random numbers are added to the end |
emailDomain | The domain for your generated email addresses |
form | The selector of the form/forms you want to be filled out, defaults to last form on page |
blur | Triggers blur() event after filling out an input |
cookies | Store saved fields (from reuse) in cookies rather than localStorage |
rules | A hash of selectors to values that you want to be used when filling out forms. It ignores hidden inputs |
special | Called after the rules are applied and can include custom javascript |
ignore | An array of input IDs you wish to have fill out forms ignore |
force | Similar to rules, but can be used for hidden inputs |
filters | Filters out options from select boxes |
reuse | Define input selectors to be saved and reused on certain URLs |
events | Used in the off chance you need to add extra javascript on Peteshow's init |
Developed by Pete Brousalis in his spare time for use at Enova in Chicago, IL.
Special thanks to Matthew Bergman & Marak Squires for Faker.js, Adam Gschwender for jquery.formatDateTime, Klaus Hartl for jquery.cookie, all used by Peteshow.
And especially Donnie Hall for creating the original Peepshow
FAQs
Unknown package
We found that peteshow demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
A clarification on our recent research investigating 60 malicious Ruby gems.
Security News
ESLint now supports parallel linting with a new --concurrency flag, delivering major speed gains and closing a 10-year-old feature request.
Research
/Security News
A malicious Go module posing as an SSH brute forcer exfiltrates stolen credentials to a Telegram bot controlled by a Russian-speaking threat actor.