Libraries tagged by unprotect

protonemedia/laravel-xss-protection

127 Favers
234699 Downloads

Laravel XSS protection, middleware and sanitization

Go to Download


owasp/csrf-protector-php

218 Favers
248157 Downloads

CSRF protector php, a standalone php library for csrf mitigation in web applications. Easy to integrate in any php web app.

Go to Download


rahulalam31/laravel-abuse-ip

212 Favers
5878 Downloads

Block ip address of all spammer's around the world.

Go to Download


phpmussel/phpmussel

422 Favers
193164 Downloads

PHP-based anti-virus anti-trojan anti-malware solution.

Go to Download


auth0/symfony

124 Favers
381678 Downloads

Symfony SDK for Auth0 Authentication and Management APIs.

Go to Download


silverstripe/spamprotection

44 Favers
814538 Downloads

Spam protection module for SilverStripe.

Go to Download


happyr/linkedin-api-client

202 Favers
1589156 Downloads

LinkedIn API client. Handles OAuth, CSRF protection. Easy to implement and extend. This is a standalone library for any composer project.

Go to Download


graham-campbell/binput

178 Favers
457060 Downloads

Binput Is An Input Protector For Laravel

Go to Download


gilbitron/easycsrf

93 Favers
166455 Downloads

A simple, standalone CSRF protection library

Go to Download


10up/10up-experience

130 Favers
282940 Downloads

The 10up Experience plugin configures WordPress to better protect and inform clients, aligned to 10up's best practices

Go to Download


bjyoungblood/bjy-authorize

288 Favers
749540 Downloads

Zend\Acl based firewall system for ZF2 dispatch protection

Go to Download


elic-dev/laravel-site-protection

44 Favers
205652 Downloads

Protect your site with a simple password form

Go to Download


shieldon/shieldon

853 Favers
20869 Downloads

Web application firewall for PHP.

Go to Download


phpmussel/core

10 Favers
96414 Downloads

phpMussel core

Go to Download


maba/gentle-force-bundle

56 Favers
419313 Downloads

Symfony bundle that integrates gentle-force library for limiting both brute-force attempts and ordinary requests, using leaky/token bucket algorithm, based on Redis

Go to Download


<< Previous Next >>