PHP Security System

Free and open source PHP Security Systems Scripts. Kepp your site server security in every respect such as XSS, SQL injuection, spam and so on.
  1. No Screenshot
    2208 total visits
    With the script Forms Protected of XSS attacks, Passed values can be validated as alphanumerical strings, hexadecimal values, dates, e-mail addresses and passwords of limited length. Requirements: PHP 4.0 or higher
  2. No Screenshot
    2327 total visits
    CrawlProtect give you three levels of protection for your website.- First with the help of htaccess rules, Crawlpotect will block code injection attempts, SQL injection attempts, visits coming from crawler known as "Badbots" (crawlers used by hackers), website copier and shell command execution attempts.- The second level, is an easy way to change chmod of your site folders and files; ...
  3. No Screenshot
    2084 total visits
    Security System traverses a given directory recursively and scan all files that contain certain text that is considered insecure or has executable permissions.An e-mail message is sent to the administrator if any risky files are located.Requirements: PHP 5.0 or higher
  4. No Screenshot
    1976 total visits
    The number of failed login attempts for a user with a particular IP address, is stored into a MySQL database with Log Limiter.When the number of failed login attempts exceeded a given limit, the class sets a cookie that is used to determine that the user is blocked while the cookie does not expire.Requirements: PHP 5.0 or higher
  5. No Screenshot
    2723 total visits
    The iptables command is used to verify if the current IP address is authorized to access a server with another specified IP and port number.phphilter may grant access to the user IP address and make the necessary alter iptables configuration if the user provides a valid user name and password via HTTP authentication.Requirements: PHP 5.0 or higher
  6. No Screenshot
    1570 total visits
    Connect to SSH uses the SSH2 PHP extension to establish a secure shell connection to a specified server. Connect to SSH executes a remote program and returns whether it run successfully. Requirements: PHP 5.0 or higher
  7. No Screenshot
    1632 total visits
    CSRF protector can generate a random key and store it in a database record associated to the current session. It uses PEAR MDB2 database abstraction layer to support many types of databases. When the form is submitted with a token hidden input field, the class can also check if the key is valid. If it exists, the key record is ...
  8. No Screenshot
    2004 total visits
    Spam blocker can perform a query to the Project Honey Pot RBL DNS server for a given IP address using your RBL API key. It analyzes the RBL response and set a session variable if the current user IP address is of a spammer that should be blocked. Spam blocker logs the allowed and blocked IP addresses to a file ...
  9. No Screenshot
    1870 total visits
    Checksum can generate a checksum from a list of parameters and values to be passed in links using a private constant key value. It can also determine if a checksum is valid for a given list of parameters and values. A time range can be defined so that the checksum is only valid if the current time is within that ...
  10. No Screenshot
    1714 total visits
    The HTML code is scanned for references to ActiveX controls, executable programs, shared library files or batch scripts. Requirements: PHP 4.0 or higher
  11. No Screenshot
    1578 total visits
    Security authorization can start a session and store a variable with a value that is also encrypted and set to a cookie. If the cookie has expired or the decrypted cookie value different than the session variable value, the session is destroyed and the user is redirected to an authentication page. The cookie can be regenerated and verified for every ...
  12. No Screenshot
    1481 total visits
    Time to generate a page or blocks can be used to measure partial time to execute parts of the current script by adding check points. Each check point may have a different name.The time it took to reach each check point can be displayed in an HTML table.Requirements: PHP 3.0 or higher
  13. No Screenshot
    1648 total visits
    hide_mail_link hides the email address away from crawlers. It still generates a clickable link.The code generated is "tidy-proof". hide_mail_link needs a javascript-enabled browser to work.
  14. No Screenshot
    1853 total visits
    YAMC is meant to generate encoded mailto: links to prevent e-mail address harvesting done by robot scripts used by spammers to crawl the Web pages and collect e-mail addresses.YAMC generates the mailto: HTML links using Javascript code also generated by the class to decode the addresses when the user clicks on the links, so mailto: links open correctly on normal ...
  15. No Screenshot
    2214 total visits
    Uda Iskariot is meant to present mailto: links as images so the robots used by spammers to harvest e-mail addresses cannot read them. The images of the e-mail addresses are outputted in the JPEG format using the GD library.Uda Iskariot comes with an example of e-mail links that point to an URL of a script that looks the e-mail address ...
Pages 6 of 10« 2 3 4 5 6 7 8 9 10 »