Atlas, Labs & Sandboxes

Evidence for every defense. Map. Practice. Tune.

Map bot variants, follow guided lab tracks, and test defensive tradeoffs in safe sandboxes built for defenders.

The Bot Atlas · ATL-01

Know the variants before you tune the defense.

Each family has different economics, infrastructure, evasion habits, and evidence. The atlas gives you the lay of the land before the lab work begins.

01 · Specimen atlas-scrapers
Scrapers

Data extraction at scale

Large-scale crawlers built to harvest catalogues, prices, and competitive intelligence without respecting platform limits.

Crawl maps · Rotating headers High prevalence
02 · Specimen atlas-credential-stuffers
Credential Stuffers

Automated login attacks

Credential testing systems that turn leaked usernames and passwords into account takeover pressure.

Password spray · ATO risk Very high impact
03 · Specimen atlas-scalpers
Scalpers

Inventory hoarding and sniping

Inventory and checkout automation built to reserve stock, win queues, and bypass purchase limits.

Queue timing · Cart holds High pressure
04 · Specimen atlas-spam-bots
Spam Bots

Content flooding and manipulation

Account farms and posting systems that flood reviews, comments, and social surfaces past moderation.

Post cadence · Account farms Manipulation risk
05 · Specimen atlas-ai-content-farms
AI Content Farms

Synthetic content at scale

Synthetic content operations combining agents, templates, and feedback loops to produce material at industrial scale.

LLM traces · Template reuse Emerging
06 · Specimen atlas-browser-imposters
Browser Imposters

Evasion through fingerprint spoofing

Anti-detect browser profiles tuned to look ordinary while still leaking contradictions under pressure.

Canvas profile · TLS coherence High evasion

Lab Tracks · ATL-02

Choose the evidence path you need.

The labs follow the curriculum tracks directly. Each track turns a bot-defense problem into an artifact: a collector, detector, risk module, report, or runbook.

  1. Section III · Browser signals

    Browser Fingerprinting & Device Identity

    Collect browser-side and server-side attributes, then compare clean, automated, mobile, and degraded sessions for coherence.

    Output Fingerprint collector and signal report
    • Canvas/WebGL
    • Navigator APIs
    • Headers
    • Mobile signals
    Track image track-browser-fingerprint
    Open track
  2. Section IV · Automation

    Automation & Headless Browser Detection

    Inspect automation leaks, anti-detect patches, JavaScript challenge behavior, and the evidence needed before enforcement.

    Output Headless detection script and challenge review
    • Playwright
    • Headless leaks
    • JS challenges
    • Evasion review
    Track image track-headless-automation
    Open track
  3. Section V · Network layer

    IP Intelligence & Network Layer

    Combine reputation, proxy signals, ASN/BGP context, residential routing, IPv6, and geolocation mismatch into reviewable risk output.

    Output IP risk scoring module
    • Proxy/VPN/Tor
    • Residential IPs
    • ASN/BGP
    • Honeypots
    Track image track-network-ip
    Open track
  4. Section VI · Behavior

    Behavioral Analytics & ML

    Turn interaction traces into features, models, explanations, and tuning notes that account for real-user variance.

    Output Behavior classifier and analysis report
    • Event capture
    • Features
    • Classifiers
    • Explainability
    Track image track-behavior-ml
    Open track
  5. Sections VII–IX · Production

    API, CAPTCHA & Production Defense

    Map challenge placement, API abuse, replay resistance, WAF/CDN integration, SOC observability, and false-positive tuning.

    Output API abuse review and production runbook
    • CAPTCHA
    • API abuse
    • Session binding
    • WAF tuning
    Track image track-api-production
    Open track

Sandboxes · ATL-03

Experiment before production does.

Controlled environments for testing detections, challenges, thresholds, and evasion hypotheses before they touch production traffic.

READY SBX-01
Sandbox image sandbox-traffic-simulation

Traffic Simulation

Simulate traffic classes and inspect how fingerprints, IP context, request timing, and session behavior combine into a verdict.

Request access
READY SBX-02
Sandbox image sandbox-challenge-testing

Challenge Testing

Place challenges in a controlled journey and measure where useful evidence becomes real-user friction.

Request access
READY SBX-03
Sandbox image sandbox-detection-tuning

Detection Tuning

Tune thresholds against abuse pressure, false-positive cost, review volume, and operational confidence.

Request access
EXPERIMENTAL SBX-04
Sandbox image sandbox-evasion-coherence

Evasion & Coherence Review

Explore spoofed profiles, replay traces, and coherence checks in a safe environment designed for defensive review.

Request access

Artifacts · ATL-04

Evidence that can leave the lab.