[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f4bVcwJ4EzKf8t7bR6FOrKTR_pnmsDj5r_z_RzsreYpw":3},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":13,"last_updated":14,"tested_up_to":15,"requires_at_least":16,"requires_php":17,"tags":18,"homepage":24,"download_link":25,"security_score":26,"vuln_count":13,"unpatched_count":13,"last_vuln_date":27,"fetched_at":28,"vulnerabilities":29,"developer":30,"crawl_stats":27,"alternatives":36,"analysis":141,"fingerprints":166},"scare-hackers-off","Anti Hacker Redirect","1.1","riotweb","https:\u002F\u002Fprofiles.wordpress.org\u002Friotweb\u002F","\u003Cp>\u003Cstrong>About\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cp>Scare hackers off your website with this plugin. When the hacker tries to access important WordPress files he gets redirected to the fbi website.\u003Cbr \u002F>\nAmateur hackers will be easily scared off but the professional hackers are tougher. You can also prank family or friends with this plugin.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Featured files\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>wp-config.php \u003C\u002Fli>\n\u003Cli>wp-config-sample.php\u003C\u002Fli>\n\u003Cli>xmlrpc.php\u003C\u002Fli>\n\u003Cli>license.txt\u003C\u002Fli>\n\u003Cli>readme.html\u003C\u002Fli>\n\u003C\u002Ful>\n","Scare off hackers by redirecting them to the FBI.",10,2076,0,"2017-02-03T08:46:00.000Z","4.7.32","4.0","",[19,20,21,22,23],"anti-hack","hack","hackers","scare","scare-off","https:\u002F\u002Friotweb.nl","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fscare-hackers-off.zip",85,null,"2026-03-15T15:16:48.613Z",[],{"slug":7,"display_name":7,"profile_url":8,"plugin_count":31,"total_installs":32,"avg_security_score":33,"avg_patch_time_days":34,"trust_score":33,"computed_at":35},4,2320,80,30,"2026-04-05T03:06:10.869Z",[37,63,88,107,123],{"slug":38,"name":39,"version":40,"author":41,"author_profile":42,"description":43,"short_description":44,"active_installs":45,"downloaded":46,"rating":47,"num_ratings":31,"last_updated":48,"tested_up_to":49,"requires_at_least":50,"requires_php":51,"tags":52,"homepage":58,"download_link":59,"security_score":60,"vuln_count":61,"unpatched_count":13,"last_vuln_date":62,"fetched_at":28},"injection-guard","Injection Guard","1.3.0","Fahad Mahmood","https:\u002F\u002Fprofiles.wordpress.org\u002Ffahadmahmood\u002F","\u003Cp>\u003Cstrong>Author:\u003C\u002Fstrong> \u003Ca href=\"https:\u002F\u002Fwww.androidbubbles.com\u002Fcontact\" rel=\"nofollow ugc\">Fahad Mahmood\u003C\u002Fa>\u003Cbr \u002F>\n\u003Cstrong>Project URI:\u003C\u002Fstrong> \u003Ca href=\"https:\u002F\u002Fwww.androidbubbles.com\u002Fextends\u002Fwordpress\u002Fplugins\u002Finjection-guard\" rel=\"nofollow ugc\">https:\u002F\u002Fwww.androidbubbles.com\u002Fextends\u002Fwordpress\u002Fplugins\u002Finjection-guard\u003C\u002Fa>\u003Cbr \u002F>\n\u003Cstrong>License:\u003C\u002Fstrong> GPL v3\u003C\u002Fp>\n\u003Cp>Injection Guard is a WordPress plugin designed to block malicious query string attacks and suspicious URL parameters. It logs all incoming attempts, blocks harmful parameters, and adds extra security intelligence to your WordPress admin—like user session tracking and capability audit.\u003C\u002Fp>\n\u003Cp>The plugin uses the \u003Ccode>ig_\u003C\u002Fcode> prefix for database keys and functions, follows WordPress coding standards, and supports multiple languages. It’s compatible with pretty permalinks and helps in securing your site from automated bots and manual attacks.\u003C\u002Fp>\n\u003Ch3>Method A (Admin Panel)\u003C\u002Fh3>\n\u003Col>\n\u003Cli>Login to WordPress Admin > Plugins > Add New > Upload Plugin\u003C\u002Fli>\n\u003Cli>Upload the ZIP file and activate the plugin\u003C\u002Fli>\n\u003Cli>Go to Settings > IG Settings and click “Save Settings”\u003C\u002Fli>\n\u003C\u002Fol>\n\u003Ch3>Method B (Manual Upload)\u003C\u002Fh3>\n\u003Col>\n\u003Cli>Download and unzip the plugin package\u003C\u002Fli>\n\u003Cli>Upload the folder to \u003Ccode>\u002Fwp-content\u002Fplugins\u002Finjection-guard\u002F\u003C\u002Fcode>\u003C\u002Fli>\n\u003Cli>Activate the plugin from the WordPress Dashboard\u003C\u002Fli>\n\u003Cli>Visit Settings > IG Settings to configure\u003C\u002Fli>\n\u003C\u002Fol>\n\u003Ch3>Features\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>Logs all unique query strings attempting to penetrate your website\u003C\u002Fli>\n\u003Cli>Blocks malicious or unknown query parameters\u003C\u002Fli>\n\u003Cli>Tracks login, logout, session start and duration per user\u003C\u002Fli>\n\u003Cli>Capability audit report for all WordPress users\u003C\u002Fli>\n\u003Cli>Multi-language support (FR, DE, ES)\u003C\u002Fli>\n\u003Cli>Bootstrap-based admin UI and dashboard\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>License\u003C\u002Fh3>\n\u003Cp>This plugin is free software licensed under the GNU GPL v2 or later.\u003C\u002Fp>\n\u003Cp>You should have received a copy of the GNU General Public License along with this plugin. If not, see \u003Ca href=\"http:\u002F\u002Fwww.gnu.org\u002Flicenses\u002Fgpl-2.0.html\" rel=\"nofollow ugc\">http:\u002F\u002Fwww.gnu.org\u002Flicenses\u002Fgpl-2.0.html\u003C\u002Fa>.\u003C\u002Fp>\n","This plugin blocks all unauthorized and irrelevant requests through query strings and provides extended session tracking and capability audit.",1000,32926,100,"2026-03-14T21:13:00.000Z","6.9.4","3.0","7.0",[53,54,55,56,57],"anti-hacking","firewall","security","sql-injection","wordpress-security","https:\u002F\u002Fwww.androidbubbles.com\u002Fextends\u002Fwordpress\u002Fplugins\u002Finjection-guard","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Finjection-guard.1.3.0.zip",92,6,"2026-03-20 10:55:45",{"slug":64,"name":65,"version":66,"author":67,"author_profile":68,"description":69,"short_description":70,"active_installs":71,"downloaded":72,"rating":73,"num_ratings":74,"last_updated":75,"tested_up_to":49,"requires_at_least":76,"requires_php":77,"tags":78,"homepage":83,"download_link":84,"security_score":85,"vuln_count":86,"unpatched_count":13,"last_vuln_date":87,"fetched_at":28},"block-wp-login","Block wp-login","1.5.5","Oliver Campion","https:\u002F\u002Fprofiles.wordpress.org\u002Fdomainsupport\u002F","\u003Ch4>Block Access to wp-login.php\u003C\u002Fh4>\n\u003Cp>This plugin does the following:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Locates wp-login.php in your WordPress installation and duplicates it\u003C\u002Fli>\n\u003Cli>Locates .htaccess and inserts lines to block the default wp-login.php and creates a new secret address to use for legitimate login\u003C\u002Fli>\n\u003Cli>Will email the site admin if an administrator signs in with an un-recognised IP address\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>When installed your server will return “403 Forbidden“ when attempts are made to access the default wp-login.php file. This has two benefits; it prevents hackers from using brute force methods to hack your website and it reduces the load on the server when such brute force attacks are launched on your site as WordPress isn’t run at all.\u003C\u002Fp>\n\u003Cp>Please note, this plugin uses .htaccess so is only compatible with Apache web servers, it is not compatible with Nginx web servers.\u003C\u002Fp>\n","This plugin completely blocks access to wp-login.php and creates a new secret login URL",600,19911,94,9,"2025-12-04T12:47:00.000Z","3.5.0","5.6",[79,80,81,55,82],"block-hackers","login-security","secure","security-plugin","https:\u002F\u002Fwebd.uk\u002Fsupport\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fblock-wp-login.1.5.5.zip",99,1,"2019-06-27 00:00:00",{"slug":89,"name":90,"version":6,"author":91,"author_profile":92,"description":93,"short_description":94,"active_installs":47,"downloaded":95,"rating":96,"num_ratings":97,"last_updated":98,"tested_up_to":99,"requires_at_least":100,"requires_php":17,"tags":101,"homepage":105,"download_link":106,"security_score":26,"vuln_count":13,"unpatched_count":13,"last_vuln_date":27,"fetched_at":28},"admin-username-changer","Admin username changer","yoshitech","https:\u002F\u002Fprofiles.wordpress.org\u002Femcode\u002F","\u003Cp>Change your admin username to whatever you like. Improve your site security and and make life difficult for the hackers.\u003Cbr \u002F>\nWordpress default administrator username is admin, which makes the job easier for hackers -they only need to find out the password.\u003Cbr \u002F>\nNow, you can change the default admin username to your liking. No one will know it and that improves your site security greatly.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Misc\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Ca href=\"http:\u002F\u002Fwww.kupimito.com\" rel=\"nofollow ugc\">Plugin website\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.paypal.com\u002Fcgi-bin\u002Fwebscr?cmd=_s-xclick&hosted_button_id=SPY83T4ZJM26Y\" rel=\"nofollow ugc\">Donate\u003C\u002Fa>\u003C\u002Fli>\n\u003C\u002Ful>\n","Change your admin username to whatever you like. Improve your site security and make life difficult for the hackers.",14061,74,7,"2012-10-03T18:55:00.000Z","3.4.2","2.5",[102,21,103,55,104],"admin","improve","username","http:\u002F\u002Fwww.kupimito.com","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fadmin-username-changer.zip",{"slug":108,"name":109,"version":77,"author":110,"author_profile":111,"description":112,"short_description":113,"active_installs":114,"downloaded":115,"rating":33,"num_ratings":116,"last_updated":117,"tested_up_to":17,"requires_at_least":118,"requires_php":17,"tags":119,"homepage":17,"download_link":122,"security_score":26,"vuln_count":13,"unpatched_count":13,"last_vuln_date":27,"fetched_at":28},"n0wpscan","N0WPScan","GeekParadize","https:\u002F\u002Fprofiles.wordpress.org\u002Fwartraxx93\u002F","\u003Cp>We love security testing, we do it! We love WPSCAN, we use it! However we don’t love people abusing WPSCAN and other automated methods to try and gain access to WordPress sites through known and often easy vulnerabilities. N0WPScan is not a silver bullet, but it will stop unskilled attackers, bots and automated attacks which account for over 90% of all WordPress breaches. The other 10% can be offset with a good firewall, IDS and NSM services. Server load will also be lower and sites faster as this tool will prevent a lot of WordPress related automated testing.\u003C\u002Fp>\n\u003Cp>[!] You can prevent most of the common attacks simply by keeping plugins, themes and the core WordPress framework updated\u003C\u002Fp>\n\u003Cp>Benefits\u003Cbr \u002F>\n*   Disables access to admin for everyone except admins and editors\u003Cbr \u002F>\n*   Disables the use of WPScan, a tool commonly used by hackers to attack WordPress, also blocks other automated WP scanners\u003Cbr \u002F>\n*   Blocks hackers from scanning your website for admin users, vulnerable themes, vulnerable plugins and exposed files\u003Cbr \u002F>\n*   Reduces the load on your server\u003Cbr \u002F>\n*   Prevents access to sensitive files\u003C\u002Fp>\n","Secure your Wordpress of WPScan Prevent hackers using WPScan to find vulnerabilities in your site, disable this plugin when you are security testing o &hellip;",40,3536,2,"2020-01-15T19:40:00.000Z","5.2",[54,21,120,55,121],"scanning","wpscan","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fn0wpscan.zip",{"slug":124,"name":125,"version":126,"author":127,"author_profile":128,"description":129,"short_description":130,"active_installs":131,"downloaded":132,"rating":47,"num_ratings":86,"last_updated":133,"tested_up_to":134,"requires_at_least":135,"requires_php":136,"tags":137,"homepage":139,"download_link":140,"security_score":47,"vuln_count":13,"unpatched_count":13,"last_vuln_date":27,"fetched_at":28},"guardiankey","GuardianKey","5.7","gbernardes","https:\u002F\u002Fprofiles.wordpress.org\u002Fgbernardes\u002F","\u003Cp>GuardianKey is a service to protect systems in real-time against authentication attacks. It implements GK Auth Security for login protection and GKTinc dissuasion challenges, helping detect and block malicious accesses, and notify the legitimate user and the system administrator.\u003C\u002Fp>\n\u003Cp>Beyond the security, the GuardianKey solution provides a good user experience, because the user is not required to provide extra information or to execute tasks during the login. When GKTinc is enabled, the challenge runs automatically during login, with server-side validation in the plugin.\u003C\u002Fp>\n\u003Cp>GuardianKey’s approach provides a risk assessment in real-time. The events and risks can be explored in the GuardianKey’s administration panel.\u003C\u002Fp>\n\u003Ch3>How GuardianKey works\u003C\u002Fh3>\n\u003Cp>The GuardianKey detection engine analyzes the events sent by your online system to the GuardianKey servers.\u003C\u002Fp>\n\u003Cp>The detection engine uses Machine Learning and our secret mathematical risk formula to combine the following three analysis approaches: Threat Intelligence, Behavioral Profiling, and Psychometric Profiling. Using these three pillars, our engine computes a risk for each event sent by the protected systems. In real time, the online attempt can be blocked, an extra requirement can be requested to the user, or notifications can be triggered.\u003C\u002Fp>\n\u003Cp>All data sent to GuardianKey servers are doubly encrypted, and NOT send passwords or sensitive data.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>More information at https:\u002F\u002Fguardiankey.io\u002F\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Ch3>Plugin Installation\u003C\u002Fh3>\n\u003Col>\n\u003Cli>Install GuardianKey from WordPress plugin directory, and activate plugin\u003C\u002Fli>\n\u003Cli>Go to https:\u002F\u002Fpanel.guardiankey.io\u002Fauth\u002Fregister, and create account in GuardianKey\u003C\u002Fli>\n\u003Cli>Access GuardianKey panel (https:\u002F\u002Fpanel.guardiankey.io\u002F) and go to Settings->Authgroups->edit\u002Fview\u002FDeploy information and get keys\u003C\u002Fli>\n\u003Cli>Access Administration->Tools->GuardianKey in your WP and put keys of GuardianKey\u003C\u002Fli>\n\u003Cli>Configure GKTinc by filling API Key, Protection Group Hash ID, and Default Challenge Level\u003C\u002Fli>\n\u003Cli>If you want notify users, change “Notify Users” option to “yes”\u003C\u002Fli>\n\u003C\u002Fol>\n\u003Ch3>Using GuardianKey\u003C\u002Fh3>\n\u003Cp>Access https:\u002F\u002Fpanel.guardiankey.io and login using the credentials sent to your e-mail address during the registration. You can recover the pass if you forgot it.\u003C\u002Fp>\n\u003Cp>GKTinc is optional and can be enabled in the plugin settings. When enabled, the plugin loads the GKTinc JS setup, injects the config generated by the SDK, and validates each login server-side.\u003C\u002Fp>\n\u003Cp>There is a documentation for the panel available at https:\u002F\u002Fguardiankey.io\u002Fdocs\u003C\u002Fp>\n","GuardianKey is a service to protect systems in real-time against authentication attacks. It implements GK Auth Security for login protection and GKTin &hellip;",20,5103,"2026-02-06T17:14:00.000Z","6.9.0","4.4","5.5",[138,79,80,55],"authentication","http:\u002F\u002Fwordpress.org\u002Fplugins\u002Fguardiankey\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fguardiankey.5.7.zip",{"attackSurface":142,"codeSignals":154,"taintFlows":161,"riskAssessment":162,"analyzedAt":165},{"hooks":143,"ajaxHandlers":150,"restRoutes":151,"shortcodes":152,"cronEvents":153,"entryPointCount":13,"unprotectedCount":13},[144],{"type":145,"name":146,"callback":147,"file":148,"line":149},"filter","mod_rewrite_rules","sco_redirect_htaccess","scarehackers.php",29,[],[],[],[],{"dangerousFunctions":155,"sqlUsage":156,"outputEscaping":158,"fileOperations":13,"externalRequests":13,"nonceChecks":13,"capabilityChecks":13,"bundledLibraries":160},[],{"prepared":13,"raw":13,"locations":157},[],{"escaped":13,"rawEcho":13,"locations":159},[],[],[],{"summary":163,"deductions":164},"The \"scare-hackers-off\" v1.1 plugin exhibits an exceptionally secure static analysis profile.  There are no identified entry points such as AJAX handlers, REST API routes, or shortcodes, which significantly limits the attack surface.  Furthermore, the code demonstrates strong security practices with zero dangerous functions, 100% prepared SQL statements, and 100% properly escaped output.  The absence of file operations, external HTTP requests, nonce checks, and capability checks on its minimal code base further contributes to its secure design.  The taint analysis also reveals no concerning flows.  The plugin's vulnerability history is clean, with no recorded CVEs, indicating a consistent track record of security.  Overall, this plugin appears to be very well-secured based on the provided static analysis and historical data.  The complete lack of identified vulnerabilities or attack vectors is a significant strength.  However, it's important to note that the absence of certain security checks like nonce or capability checks might be a consequence of its extremely limited functionality and lack of user-facing interaction points, rather than an intentional security choice. This doesn't represent a present risk but a characteristic of its design.",[],"2026-03-17T00:02:08.847Z",{"wat":167,"direct":172},{"assetPaths":168,"generatorPatterns":169,"scriptPaths":170,"versionParams":171},[],[],[],[],{"cssClasses":173,"htmlComments":174,"htmlAttributes":175,"restEndpoints":176,"jsGlobals":177,"shortcodeOutput":178},[],[],[],[],[],[]]