|\---/|
    | o,o |
     \_`_/-..----.
  ___/ `   ' ,""+ \
 (__...'   **\    |`.**_.'
   (_,...'(_,.`__)/'.....
        
Server Offline

Misu Secure Browser Tool

Built by Jared, named after the delightfully unhinged Misu 🐱

****SECURITY RESEARCH TOOL****

Test Purpose: The tests below with RED buttons should FAIL in a secure browser environment, but if they succeed despite your security controls, they prove the fundamental vulnerability this test demonstrates.

Enable all relevant DLP controls before testing, including: Expected Result: Red buttons should still work, proving local applications can bypass browser-based DLP controls.

MISU SERVER STATUS Required

First, verify that Misu's clever server is running and ready to serve data:

What this demonstrates: Just like Box Edit, Misu's server runs on localhost. Misu's web tricks can communicate with it even if downloads are blocked by the browser or DLP policies.

SENSITIVE DATA DISPLAY Confidential

The following sensitive information is displayed on this secure webpage. Click in the box below to edit the data:

Test data extraction methods:

Security Risk: This sensitive employee data is displayed and editable on the webpage. Try editing the data above, then test both extraction methods. The bypass method uses localhost communication to extract data to local files, while the direct download should be blocked by DLP controls.

PRINT BYPASS High Risk

Send content directly to the printer using bypass method:

Security Impact: Local applications can print documents even if the browser has printing disabled. Box Edit style method opens documents in Notepad for review/printing.

Test: The "Browser Print" button uses browser print API - this should be blocked by secure browsers, while the Box Edit style bypass succeeds.

CUSTOM FILE SAVE High Risk

Save custom content to the server directory:

Security Impact: Files are saved directly to the server's running directory, making them easily accessible alongside the server files. Any content displayed in the browser can be extracted and saved locally through the helper application, regardless of browser security settings.

Test: This demonstrates how local applications can save arbitrary content to the filesystem, bypassing any browser-based file save restrictions through localhost communication.
🐱 GitHub | For authorized security testing only