Greasy Fork is available in English.
Unlocks all Plus features (Speed, Loop, Solo) and Native Download (.gp5). (Tested on Zen Browser)
当前为
An advanced Tampermonkey script that unlocks all Songsterr "Plus" features, including native download (.gp5), by exploiting a server-side logic flaw, dynamic IDs, and on-the-fly GZIP manipulation.
This project is the result of a deep analysis (Reverse Engineering) of Songsterr's React application and API. Unlike classic scripts that only modify the interface (CSS/DOM), this script intercepts and manipulates network requests in real-time to:
401 Unauthorized and 429 Too Many Requests errors).Install the Tampermonkey extension for your browser:
Create a New Script and paste the full code from the provided .js file.
Save (Ctrl+S) and enable the script.
Go to songsterr.com (works a lot better in private search!).
This script utilizes a local Man-in-the-Middle (MITM) technique via the browser's fetch API.
401 Unauthorized error.429 Too Many Requests (Daily limit reached) ban.This script implements a robust multi-step strategy to bypass these checks:
Dynamic Profile Injection:
It intercepts the /auth/profile request and responds with a spoofed JSON profile. Instead of a static ID, it generates a random 9-digit ID (e.g., 458129301) for every session. This ensures the server treats every download as coming from a fresh, unthrottled user.
GZIP Decompression & Recompression:
When the "Download" button is clicked, the script intercepts the /api/edits/download request. It checks the content-encoding headers. If the payload is compressed, it uses native DecompressionStream APIs to unpack the binary Blob into readable text, injects the new random User ID into the JSON, and seamlessly recompresses it using CompressionStream before sending it to the server.
Request Anonymization (Credentials Omit):
It surgically removes the cookies (credentials: 'omit') and authorization headers from the download request.
Result: The server receives an authenticated-looking "Guest" request containing a fresh Magic ID in the GZIP body. Since it sees no "Free" cookie to contradict the claim and the ID hasn't reached its quota, it validates the request and serves the file (200 OK).
This project has only been tested on ZEN Browser (Firefox-based), so MIDI and Guitar Pro downloads leveraging native DecompressionStream/CompressionStream APIs might behave differently on older browsers.
This project is for educational and cybersecurity research purposes only :) It aims to demonstrate logic vulnerabilities in server-side rights validation (Insecure Direct Object References / Broken Access Control) and client-side payload tampering. If you enjoy Songsterr and use the application regularly, please support the developers by subscribing to an official plan.