Easily bypass and inspect websites
Using nextDNS
Head to denylist and add:
*.cdn.jsdelivr.net and *.jsdelivr.net
Optionally using AdGuard
Create a custom filter ||cdn.jsdelivr.net/npm/disable-devtool^
AdGuard seems doesn't work
In Chrome, open a new tab > open Dev Tools > navigate to website. This is one of the many ways to bypass the restriction.
In Chrome, open a new tab > open Dev Tools > navigate to website. This is one of the many ways to bypass the restriction.
Correction:
- in Chrome, open a new tab
- open Dev Tools
- open
Networktab in Dev Tools - check the box: ☑️
Preserve Log - navigate to website ... once loaded, the website using this script will kick you to the New Tab page ...
- right click on the
disable-devtoolscript (it might end in.min.js,@latest, ...) - click
Block Request URL
When navigating back to the website, the disable-devtool script is now blocked.
In Chrome, open a new tab > open Dev Tools > navigate to website. This is one of the many ways to bypass the restriction.
Correction:
1. in Chrome, open a new tab 2. open Dev Tools 3. open `Network` tab in Dev Tools 4. check the box: ☑️ `Preserve Log` 5. navigate to website ... once loaded, the website using this script will kick you to the New Tab page ... 6. right click on the `disable-devtool` script (it might end in `.min.js`, `@latest`, ...) 7. click `Block Request URL`When navigating back to the website, the disable-devtool script is now blocked.
Awesome! This works perfectly.
ublock origin, custom filters. add:
||cdn.jsdelivr.net/npm/disable-devtool$script ||cdn.jsdelivr.net/npm/devtools-detector$script,3p
For apps that bundle the library, see https://gist.github.com/aravindanve/3e13d995fac35e4a07c236b11cc432c7#bypass-bundled-script
谢谢