{"id":997283,"date":"2025-07-11T11:22:00","date_gmt":"2025-07-11T03:22:00","guid":{"rendered":"https:\/\/geetests.com\/article\/what-is-openbullet"},"modified":"2025-11-14T14:03:54","modified_gmt":"2025-11-14T06:03:54","slug":"what-is-openbullet","status":"publish","type":"post","link":"\/en\/article\/what-is-openbullet","title":{"rendered":"What is OpenBullet?"},"content":{"rendered":"<div class=\"vgblk-rw-wrapper limit-wrapper\"><span class=\"ql-size-16px\">Why do login systems across industries face waves of automated attacks attempting millions of credential combinations? One of the key tools enabling such large-scale activity is OpenBullet.<\/span><\/p>\n<p><span class=\"ql-size-16px\">OpenBullet is an open-source web testing suite originally designed for legitimate use cases such as penetration testing, scraping, and QA automation. However, its modular design, scripting flexibility, and support for proxies and multithreading have led to its widespread abuse in the cybercrime ecosystem. Today, OpenBullet is a core component in <\/span><a class=\"ql-size-16px\" style=\"color: #0066cc;\" href=\"https:\/\/blog.geetest.com\/en\/article\/protect-against-credential-stuffing\" target=\"_blank\" rel=\"noopener noreferrer\">credential stuffing<\/a><span class=\"ql-size-16px\" style=\"color: #0066cc;\">, <\/span><a class=\"ql-size-16px\" style=\"color: #0066cc;\" href=\"https:\/\/blog.geetest.com\/en\/article\/prevent-account-takeover-from-damagin-your-business\" target=\"_blank\" rel=\"noopener noreferrer\">account takeover (ATO)<\/a><span class=\"ql-size-16px\">, and other forms of automated web exploitation.<\/span><\/p>\n<p><span class=\"ql-size-16px\">Unlike traditional brute-force tools, OpenBullet enables attackers to replicate real user behavior through customizable configs, evade basic security defenses, and launch distributed attacks using large volumes of compromised credentials. Its efficiency and accessibility have made it a staple in underground forums and dark web marketplaces.<\/span><\/p>\n<p><span class=\"ql-size-16px\">This article provides a deep dive into how OpenBullet works, how it&#8217;s weaponized in real-world attacks, and what businesses can do to detect and mitigate the risks it presents.<\/span><\/p>\n<h2><strong class=\"ql-size-28px\">Key Takeaways<\/strong><\/h2>\n<ul>\n<li><span class=\"ql-size-16px\">OpenBullet is a powerful open-source tool used for web testing and automation by both security experts and cybercriminals.<\/span><\/li>\n<li><span class=\"ql-size-16px\">Its features like proxy management, CAPTCHA solving, and custom scripting help automate complex tasks and evade detection.<\/span><\/li>\n<li><span class=\"ql-size-16px\">Cybercriminals use OpenBullet mainly for credential stuffing attacks, testing stolen login details to take over accounts.<\/span><\/li>\n<li><span class=\"ql-size-16px\">These attacks cause serious harm, including identity theft, financial loss, and damage to organizations&#8217; reputations.<\/span><\/li>\n<li><span class=\"ql-size-16px\">Organizations can protect themselves by using strong passwords, multi-factor authentication, monitoring for unusual activity, and deploying advanced bot defenses.<\/span><\/li>\n<\/ul>\n<h2><strong class=\"ql-size-28px\">What is OpenBullet?<\/strong><\/h2>\n<p><span class=\"ql-size-16px\">OpenBullet is a powerful open-source automation framework primarily used for web testing and data parsing. With over 1.8K GitHub stars as of January 2025, it&#8217;s a leading tool in cybersecurity workflows. While it was initially intended for developers and penetration testers to conduct lawful QA and security assessments, OpenBullet has become widely associated with malicious automation, especially in credential stuffing and account takeover (ATO) attacks.<\/span><\/p>\n<p><span class=\"ql-size-16px\">At its core, OpenBullet enables users to create and run custom scripts known as configs, which define how the tool should interact with a specific web application or API. These configs can replicate complex sequences of browser-like behavior, such as sending HTTP requests, handling cookies and tokens, parsing server responses, and identifying login success conditions, all without a browser.<\/span><\/p>\n<p><strong class=\"ql-size-22px\">Key components that define OpenBullet&#8217;s functionality include:<\/strong><\/p>\n<ul>\n<li><strong class=\"ql-size-16px\">Config System:<\/strong><span class=\"ql-size-16px\"> Configs are modular scripts built with logic blocks that dictate the exact steps for interacting with a target site. These may include GET\/POST requests, parsing HTML\/JSON responses, injecting dynamic variables, handling redirects, and managing sessions.<\/span><\/li>\n<li><strong class=\"ql-size-16px\">Wordlists (Combo Lists): <\/strong><span class=\"ql-size-16px\">Attackers often use databases of leaked usernames and passwords to perform credential stuffing at scale. OpenBullet allows bulk testing of these combinations against a target service to identify valid credentials.<\/span><\/li>\n<li><strong class=\"ql-size-16px\">Proxies and Multithreading:<\/strong><span class=\"ql-size-16px\"> To avoid detection and rate limiting, OpenBullet supports rotating proxy lists (e.g., residential or datacenter proxies) and concurrent execution through multithreading. This allows attackers to bypass IP-based protections and massively scale their attacks.<\/span><\/li>\n<li><strong class=\"ql-size-16px\">Custom Outputs (Hits): <\/strong><span class=\"ql-size-16px\">Based on response parsing logic, the tool can identify whether a login attempt was successful, failed, or resulted in a custom outcome (e.g., MFA challenge, locked account). Valid hits are saved and can be exported for further abuse.<\/span><\/li>\n<li><strong class=\"ql-size-16px\">Plugins and Extensions: <\/strong><span class=\"ql-size-16px\">The framework is extensible, allowing attackers to implement custom encryption\/decryption algorithms (e.g., for JS WebTokens, HMACs, or anti-CSRF tokens), decode captchas, or bypass anti-bot protections.<\/span><\/li>\n<\/ul>\n<h2><strong class=\"ql-size-28px\">Evolution and Impact of OpenBullet<\/strong><\/h2>\n<p><span class=\"ql-size-16px\">OpenBullet, launched in May 2019 by Ruri under the MIT License on GitHub, debuted as a user-friendly automation tool for penetration testers, using LoliScript and a visual editor. By December 2019, cybercriminals exploited it for credential stuffing and <\/span><a class=\"ql-size-16px\" style=\"color: #0066cc;\" href=\"https:\/\/blog.geetest.com\/en\/article\/webscraping-geetest\" target=\"_blank\" rel=\"noopener noreferrer\">data scraping<\/a><span class=\"ql-size-16px\">. The COVID-19 pandemic in 2020 saw a surge in its misuse, targeting video conferencing platforms. OpenBullet 2, released in 2020 on .NET Core 2.2+, added cross-platform support, multithreading, and Selenium integration, earning over 1.8K GitHub stars by July 2025. Despite law enforcement efforts, its active community fuels ongoing misuse, though Ruri emphasizes ethical use.<\/span><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/geetests.com\/wp-content\/uploads\/2025\/09\/1280X1280-1.png\" alt=\"\"><\/p>\n<h2><strong class=\"ql-size-28px\">How OpenBullet Works?<\/strong><\/h2>\n<p><span class=\"ql-size-16px\">At its core, OpenBullet relies on <\/span><strong class=\"ql-size-16px\">config files<\/strong><span class=\"ql-size-16px\">, user-defined scripts that tell the tool how to interact with a specific target. These configs determine how to send HTTP requests, handle cookies, parse responses, and identify success or failure states.<\/span><\/p>\n<p><span class=\"ql-size-16px\">Here&#8217;s how the typical process works:<\/span><\/p>\n<ul>\n<li><strong class=\"ql-size-16px\">Wordlists<\/strong><span class=\"ql-size-16px\">: Users load massive lists of usernames and passwords (often from previous data breaches).<\/span><\/li>\n<li><strong class=\"ql-size-16px\">Configs<\/strong><span class=\"ql-size-16px\">: These act as &#8220;blueprints&#8221; for attacking a specific site. They define login URLs, parameter names, response parsing logic, and success conditions.<\/span><\/li>\n<li><strong class=\"ql-size-16px\">Bots<\/strong><span class=\"ql-size-16px\">: Multiple bots (or threads) simultaneously run through the wordlist, testing each combination against the target.<\/span><\/li>\n<li><strong class=\"ql-size-16px\">Proxies<\/strong><span class=\"ql-size-16px\">: To avoid IP bans, OpenBullet supports rotating proxies (residential or datacenter).<\/span><\/li>\n<li><strong class=\"ql-size-16px\">Hits<\/strong><span class=\"ql-size-16px\">: When a valid credential is found, it&#8217;s logged as a hit, sometimes with additional extracted data.<\/span><\/li>\n<\/ul>\n<h2><strong class=\"ql-size-28px\">OpenBullet in the Cybercrime Ecosystem<\/strong><\/h2>\n<p><span class=\"ql-size-16px\">OpenBullet&#8217;s powerful automation capabilities, while designed for ethical web testing, have made it a favored tool among cybercriminals for malicious activities. Below is an outline of how it is misused, based on its features and documented trends:<\/span><\/p>\n<h3><strong class=\"ql-size-22px\">1. Credential Stuffing Attacks<\/strong><\/h3>\n<p><span class=\"ql-size-16px\">Credential stuffing remains one of the most common attack vectors facilitated by OpenBullet. Cybercriminals acquire massive databases of leaked usernames and passwords from previous data breaches and use OpenBullet to systematically test these combinations against login portals of targeted websites.<\/span><\/p>\n<p><span class=\"ql-size-16px\">By leveraging configurable &#8220;configs,&#8221; proxy rotation, and multithreading, OpenBullet enables attackers to automate tens of thousands of login attempts per minute. These attacks are typically silent and distributed, making them difficult to detect using traditional monitoring tools. When valid credentials are identified, the attacker gains unauthorized access to user accounts, which can then be monetized through resale, fraud, or further exploitation.<\/span><\/p>\n<h3><strong class=\"ql-size-22px\">2. Account Takeover and Fraud<\/strong><\/h3>\n<p><span class=\"ql-size-16px\">Once an account is successfully accessed, OpenBullet can be used to perform scripted actions within the session, such as retrieving stored payment credentials, viewing order history, redeeming loyalty points, or accessing restricted content.<\/span><\/p>\n<p><span class=\"ql-size-16px\">In high-value sectors like e-commerce, streaming, gaming, and finance, these compromised accounts may contain sensitive data or digital assets that can be sold or abused. Attackers often automate post-login behavior through OpenBullet to extract maximum value from each compromised account, including conducting unauthorized transactions or registering malicious devices.<\/span><\/p>\n<h3><strong class=\"ql-size-22px\">3. Targeted Config Creation<\/strong><\/h3>\n<p><span class=\"ql-size-16px\">Configs are the foundation of OpenBullet&#8217;s automation capabilities. A config defines how to structure HTTP requests, handle authentication flows, parse server responses, and determine success conditions. Cybercriminals often develop custom configs tailored to specific websites, particularly those with valuable user accounts or weak defenses.<\/span><\/p>\n<p><span class=\"ql-size-16px\">These configs are actively traded on underground markets, often bundled with combo lists and proxy services as part of ready-to-deploy attack kits. Skilled config creators reverse-engineer websites by analyzing JavaScript, encryption schemes, anti-CSRF mechanisms, and token lifecycles to accurately mimic legitimate user behavior and bypass defensive controls.<\/span><\/p>\n<h3><strong class=\"ql-size-22px\">4. Scraping and Data Harvesting<\/strong><\/h3>\n<p><span class=\"ql-size-16px\">In addition to account-based attacks, OpenBullet is frequently used for automated data extraction. When paired with valid credentials or public endpoints, the tool can systematically scrape product catalogs, pricing structures, user profiles, or even business intelligence data.<\/span><\/p>\n<p><span class=\"ql-size-16px\">This activity is particularly damaging for platforms with proprietary data, dynamic pricing models, or intellectual property exposure. The harvested data is often resold on black markets, used for competitor monitoring, or fed into training sets for developing new bot attacks.<\/span><\/p>\n<h3><strong class=\"ql-size-22px\">5. Bypassing Basic Security Controls<\/strong><\/h3>\n<p><span class=\"ql-size-16px\">OpenBullet is specifically engineered to overcome standard application-layer defenses. Through customizable request headers, dynamic variables, cookie and session handling, and support for JavaScript execution, attackers can craft traffic that closely resembles legitimate user behavior.<\/span><\/p>\n<p><span class=\"ql-size-16px\">Combined with large-scale proxy rotation, OpenBullet traffic can evade:<\/span><\/p>\n<ul>\n<li><span class=\"ql-size-16px\">IP reputation blacklists<\/span><\/li>\n<li><span class=\"ql-size-16px\">Basic CAPTCHA and rate-limiting mechanisms<\/span><\/li>\n<li><span class=\"ql-size-16px\">Browser fingerprinting<\/span><\/li>\n<li><span class=\"ql-size-16px\">Geofencing or regional blocks<\/span><\/li>\n<\/ul>\n<p><span class=\"ql-size-16px\">Many default security configurations fail to detect this type of behavior, especially if they rely solely on superficial indicators like request frequency or IP origin.<\/span><\/p>\n<h3><strong class=\"ql-size-22px\">6. Scaling Attacks through Automation<\/strong><\/h3>\n<p><span class=\"ql-size-16px\">OpenBullet&#8217;s design makes it ideal for horizontal scaling across multiple targets. Threat actors deploy the tool on cloud-based infrastructure or virtual private servers (VPS), allowing them to run persistent, high-throughput attack campaigns.<\/span><\/p>\n<p><span class=\"ql-size-16px\">Attackers often integrate OpenBullet into automated pipelines that include:<\/span><\/p>\n<ul>\n<li><span class=\"ql-size-16px\">Botnet-managed proxy distribution<\/span><\/li>\n<li><span class=\"ql-size-16px\">Config marketplaces or subscription-based update systems<\/span><\/li>\n<li><span class=\"ql-size-16px\">Centralized dashboards for monitoring hit rates and exporting successful logins<\/span><\/li>\n<\/ul>\n<p><span class=\"ql-size-16px\">These automated ecosystems enable threat actors to launch large-scale attacks continuously, often in parallel across dozens or even hundreds of services, with minimal manual oversight.<\/span><\/p>\n<h2><strong class=\"ql-size-28px\">How Credential Stuffing Works?<\/strong><\/h2>\n<p><span class=\"ql-size-16px\">Credential stuffing attacks represent a major threat to online security. Attackers use automated tools to test large numbers of stolen username and password pairs across multiple websites. Unlike <\/span><a class=\"ql-size-16px\" style=\"color: #0066cc;\" href=\"https:\/\/blog.geetest.com\/en\/article\/what-is-brute-force-attack\" target=\"_blank\" rel=\"noopener noreferrer\">brute force attacks<\/a><span class=\"ql-size-16px\">, which guess passwords, credential stuffing relies on credentials obtained from previous data breaches. Attackers exploit the fact that many people reuse passwords for different accounts.<\/span><\/p>\n<p><span class=\"ql-size-16px\">OpenBullet plays a central role in enabling credential stuffing. The tool provides a visual interface for launching credential stuffing campaigns. Attackers load configuration files that define request logic, success conditions, and parsing rules. Built-in proxy rotation and retry logic help attackers avoid detection. Plugins for CAPTCHA solving and fingerprint spoofing make these attacks even more effective. Attackers often download shared configs from forums or Telegram channels, allowing them to target specific sites with minimal effort.<\/span><\/p>\n<p><span class=\"ql-size-16px\">The &#8216;Anatomy of Account Takeovers&#8217; report highlights how credential stuffing attacks are predominantly automated using bad bots and tools like OpenBullet. Attackers use configuration files to generate sequenced API calls and browser automation, often leveraging proxies and synthetic identities. This ecosystem allows attackers to evade detection and cash out stolen credentials, fueling a surge in account takeover attacks.<\/span><\/p>\n<h2><strong class=\"ql-size-28px\">The Impact of OpenBullet on Business<\/strong><\/h2>\n<p><span class=\"ql-size-16px\">OpenBullet&#8217;s misuse by cybercriminals poses significant threats across various industries, exploiting vulnerabilities to achieve financial gain, data theft, or unauthorized access. Below is an overview of its impact on key sectors.<\/span><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/geetests.com\/wp-content\/uploads\/2025\/09\/Task-Tracker-1.png\" alt=\"\"><\/p>\n<h2><strong class=\"ql-size-28px\">How OpenBullet Compares to Other Tools?<\/strong><\/h2>\n<p><img decoding=\"async\" src=\"https:\/\/geetests.com\/wp-content\/uploads\/2025\/09\/Task-Tracker.png\" alt=\"\"><\/p>\n<h3><\/h3>\n<h3><strong class=\"ql-size-22px\">Why Attackers Prefer Using OpenBullet?<\/strong><\/h3>\n<p><span class=\"ql-size-16px\">OpenBullet has become a preferred tool among cybercriminals not by chance, but due to a combination of technical advantages and ecosystem support that align perfectly with the needs of automated attacks. Key reasons include:<\/span><\/p>\n<ul>\n<li><strong class=\"ql-size-16px\">Low Skill Requirements: <\/strong><span class=\"ql-size-16px\">OpenBullet simplifies the execution of attacks, allowing individuals with minimal technical background to get started quickly. Pre-built configs and ready-made scripts reduce the need for coding or in-depth protocol knowledge.<\/span><\/li>\n<li><strong class=\"ql-size-16px\">Rapid Execution and Feedback:<\/strong><span class=\"ql-size-16px\"> The tool is optimized for speed, enabling high-throughput testing of credentials or scraping tasks. Attackers receive near-instant feedback on valid hits, making it ideal for time-sensitive or high-volume campaigns.<\/span><\/li>\n<li><strong class=\"ql-size-16px\">Open-Source and Free:<\/strong><span class=\"ql-size-16px\"> Being free and open-source, OpenBullet is readily accessible to attackers regardless of budget. Unlike commercial attack platforms, it doesn&#8217;t require subscriptions, making it appealing to individuals and groups operating at different scales.<\/span><\/li>\n<li><strong class=\"ql-size-16px\">Dark Web Backup:<\/strong><span class=\"ql-size-16px\"> The popularity of OpenBullet is amplified by an active community that shares attack configs, combo lists, tutorials, and tool enhancements. This collective knowledge lowers the barrier to effective use and enables rapid adaptation to changes in target defenses.<\/span><\/li>\n<\/ul>\n<h2><strong class=\"ql-size-28px\">How to Defend Against OpenBullet Attacks?<\/strong><\/h2>\n<p><strong class=\"ql-size-16px\">Spot Suspicious Traffic Patterns:<\/strong><span class=\"ql-size-16px\"> OpenBullet&#8217;s automated attacks, like credential stuffing, produce distinct request patterns unlike human behavior. Monitor for rapid login attempts, repeated credential tries from one IP, or unusual request sequences. Tools like SIEM systems (e.g., Splunk) can flag these anomalies in real-time, enabling quick action to block OpenBullet&#8217;s high-volume requests.<\/span><\/p>\n<p><strong class=\"ql-size-16px\">Signature- and Fingerprint-Based Detection:<\/strong><span class=\"ql-size-16px\"> OpenBullet leverages automation frameworks like Requests, Selenium, and Puppeteer to execute attacks such as credential stuffing. Requests enable simple HTTP requests with forged headers, often paired with CAPTCHA-solving services, but struggle against robust defenses. Selenium mimics user actions like form filling, masking bots as human users, while Puppeteer, a lightweight Node.js library, supports faster parallel requests on Chromium browsers. By detecting these frameworks&#8217; signatures (e.g., specific headers, request patterns, or JavaScript execution), to stop attacks at their source.<\/span><\/p>\n<p><strong class=\"ql-size-16px\">Implement Multi-Factor Authentication (MFA): <\/strong><span class=\"ql-size-16px\">Implementing <\/span><a class=\"ql-size-16px\" style=\"color: #0066cc;\" href=\"https:\/\/blog.geetest.com\/en\/article\/captcha-vs-mfa-vs-2fa\" target=\"_blank\" rel=\"noopener noreferrer\">Multi-Factor Authentication (MFA)<\/a> <span class=\"ql-size-16px\">is one of the most effective defenses against OpenBullet attacks, particularly those involving credential stuffing. By requiring users to verify their identity through two or more distinct factors, such as a password (something they know), a device or token (something they have), or a biometric scan (something they are), MFA ensures that stolen or reused credentials alone are not enough to gain access. This additional layer of security effectively blocks automated login attempts, raises the difficulty for attackers, and significantly reduces the risk of account takeovers, even when valid credentials are exposed.<\/span><\/p>\n<p><strong class=\"ql-size-16px\">Behavioral Detection: <\/strong><span class=\"ql-size-16px\">OpenBullet&#8217;s default configurations rarely mimic human behavior, though advanced users can add JavaScript to simulate actions. Behavioral analysis counters this by monitoring client-side signals (e.g., mouse movements, typing speed) via JavaScript or mobile SDKs, and server-side signals like request frequency, URL navigation patterns, or IP\/user-agent changes. Suspicious patterns, such as rapid requests or multiple accounts from one IP, expose OpenBullet&#8217;s automation. Tools like GeeTest analyze these signals to<\/span> <a class=\"ql-size-16px\" style=\"color: #0066cc;\" href=\"https:\/\/blog.geetest.com\/en\/article\/how-to-detect-bot-traffic\" target=\"_blank\" rel=\"noopener noreferrer\">detect and block bots<\/a><span class=\"ql-size-16px\"> effectively.<\/span><\/p>\n<h2><span class=\"ql-size-28px\">Conclusion<\/span><\/h2>\n<p><span class=\"ql-size-16px\">Though OpenBullet itself doesn&#8217;t provide sophisticated evasion features, it serves as a gateway for widespread abuse on underprotected platforms. Its modularity, ease of configuration, and open-source nature have helped it gain traction within criminal forums and botnet operations. Meanwhile, more advanced attackers continue to rely on the raw frameworks beneath OpenBullet to craft fully custom, evasive bots.<\/span><\/p>\n<p><span class=\"ql-size-16px\">As attackers continue to evolve, so must your defenses. Understanding how OpenBullet works is the first step; deploying smarter, behavior-driven protection is the one that truly counts.<\/span><\/p>\n<p><span class=\"ql-size-16px\">For more info about how <\/span><a class=\"ql-size-16px\" style=\"color: #0066cc;\" href=\"https:\/\/www.geetest.com\/en\" target=\"_blank\" rel=\"noopener noreferrer\">GeeTest<\/a><span class=\"ql-size-16px\"> stops advanced bots like OpenBullet before they reach your website, app, or API, start a free trial or <\/span><a class=\"ql-size-16px\" style=\"color: #0066cc;\" href=\"https:\/\/www.geetest.com\/en\/adaptive-captcha-demo\" target=\"_blank\" rel=\"noopener noreferrer\">book a personalized demo<\/a><span class=\"ql-size-16px\"> today.<\/span><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/geetests.com\/wp-content\/uploads\/2025\/09\/ad_03_728_90-1-1.png\" alt=\"\"><\/div>\n<p><!-- .vgblk-rw-wrapper --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn how OpenBullet enables credential stuffing and bot attacks, and how to defend against its misuse in today\u00a1\u00afs cybersecurity landscape<\/p>\n","protected":false},"author":7,"featured_media":993944,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94],"tags":[],"class_list":["post-997283","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-botpedia"],"_links":{"self":[{"href":"\/en\/wp-json\/wp\/v2\/posts\/997283","targetHints":{"allow":["GET"]}}],"collection":[{"href":"\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"\/en\/wp-json\/wp\/v2\/comments?post=997283"}],"version-history":[{"count":3,"href":"\/en\/wp-json\/wp\/v2\/posts\/997283\/revisions"}],"predecessor-version":[{"id":1000408,"href":"\/en\/wp-json\/wp\/v2\/posts\/997283\/revisions\/1000408"}],"wp:featuredmedia":[{"embeddable":true,"href":"\/en\/wp-json\/wp\/v2\/media\/993944"}],"wp:attachment":[{"href":"\/en\/wp-json\/wp\/v2\/media?parent=997283"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"\/en\/wp-json\/wp\/v2\/categories?post=997283"},{"taxonomy":"post_tag","embeddable":true,"href":"\/en\/wp-json\/wp\/v2\/tags?post=997283"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}