Zero Trust Routing • Signed URLs • Anti-Replay • Bot Defense • Stealth Security
v.php is a high-security, single-file PHP router designed for hostile environments.
It transforms unsafe direct access:
/dashboard.php
into a fully verified, signed, behavior-protected request pipeline:
User → Signed URL → Security Engine → Safe Resource Access
Every request is treated as untrusted — and must prove legitimacy.
The built-in control panel provides:
- Route analytics and usage tracking
- Bot activity and IP monitoring
- Route management system
- Access and security logs
- IP ban / unban controls
Access panel:
/?__cp__
Typical flow:
User → Direct File Request
→ Router Intercepts
→ Signed URL Generated
→ Redirect
→ Secure Access
Unlike traditional routers, v.php is built with a security-first architecture, not as an afterthought.
- 🔐 Cryptographically signed URLs (HMAC SHA-256)
- 🔁 Replay attack prevention (session + IP binding)
- 🤖 Adaptive bot detection (behavior scoring engine)
- 👻 Stealth banning (fake 404 responses)
- 🌐 Network intelligence (ISP, VPN, hosting detection)
- ⚡ Zero database dependency (pure JSON storage)
- 📊 Built-in control panel (no external tools)
Request
↓
Signature Validation
↓
Token Replay Protection
↓
Rate Limiting
↓
Bot Scoring Engine
↓
Stealth Ban System
↓
Secure File Resolution
↓
Response
Each layer independently enforces security — failure at any step stops execution.
- Every request must contain a valid HMAC signature
- Any tampering → immediate rejection
- Supports short (
/?r=TOKEN) and classic URLs
Each token is bound to:
- IP address
- Session ID
- User-Agent
Prevents:
- Link sharing abuse
- Token reuse
- Session hijacking
| Event | Score |
|---|---|
| Invalid signature | +10 |
| Replay attempt | +15 |
| Device mismatch | +3 |
| Token leak | +20 |
Blocked users receive:
HTTP 404 Not Found
No indication of restriction.
Detects:
- Country & City
- ISP
- VPN / Proxy
- Hosting network
- Mobile network
/?__cp__
Provides monitoring, logs, and route management.
Never trust the request. Always verify.
- No direct file execution
- Single entry point
- Behavior-driven validation
- Minimal attack surface
project-root/
v.php
.htaccess
error.html
cp.jpeg (Demo)
cp.gif (Demo)
.runtime/
m.json
u.json
b.json
r.json
k.json
x.json
a.log
s.log
define('SIGN_SECRET', 'CHANGE_THIS');
define('SIGNED_TTL', 7200);
define('URL_MODE', 'short');
define('CP_PASSWORD', 'admin1234');- Must be strong and random
- Used for signing
- Changing it invalidates all links
| Mode | Example |
|---|---|
| short | /?r=TOKEN |
| classic | /v.php?id=1&sig=... |
User → direct file
→ router intercepts
→ signed URL generated
→ redirect → secure access
40 requests / 60 seconds per IP
Tracks usage and behavior
Tracks attacks and blocks
v.php
.htaccess
error.html
mkdir .runtime
chmod 777 .runtime
- Set
SIGN_SECRET - Change
CP_PASSWORD
- Route all traffic through router
- Block
.runtimeaccess - Enforce HTTPS
- No database
- JSON-based storage
- Automatic cleanup
- Lightweight execution
- Secure dashboards
- Private file delivery
- Anti-leak systems
- API protection
Email: psvineet@zohomail.in
MIT License
Give a star ⭐ if you find this useful.

