Skip to content

Commit 4f73ddc

Browse files
tn3wtn3w
authored andcommitted
2 parents fc84562 + 3e6f367 commit 4f73ddc

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ if __name__ == "__main__":
2828
```
2929

3030
> [!NOTE]
31-
> 1. When testing DDoSify you should note that calling it from localhost gives the script a wrong IP in this case "127.0.0.1", which the script considers legitimate. When testing, use a service like cloudflared tunnel to connect to your script.
31+
> 1. When testing Captchaify you should note that calling it from localhost gives the script a wrong IP in this case "127.0.0.1", which the script considers legitimate. When testing, use a service like cloudflared tunnel to connect to your script.
3232
3333

3434
## Application purposes
@@ -38,7 +38,7 @@ A few application purposes:
3838
- A login website
3939
- A dark web page that simply needs to be secured a bit
4040

41-
### Why should you use DDoSify if you host a Flask server?
41+
### Why should you use Captchaify if you host a Flask server?
4242
A quick and easy implementation allows even small websites or a small team of developers to quickly get robot protection. It also doesn't use third-party providers, which limits data collection from Google, Facebook and the creepy data brokers.[^4] Everything is open source, meaning you can rewrite the code yourself and perhaps make it more private.
4343

4444
# Instructions

0 commit comments

Comments
 (0)