Linux 软件免费装
Banner图

Login Armor

开发者 wpformation
更新时间 2026年5月11日 23:47
捐献地址: 去捐款
PHP版本: 8.1 及以上
WordPress版本: 6.9
版权: GPLv2 or later
版权网址: 版权信息

标签

activity log login security brute force hide login limit login

下载

2.1.12 2.1.13 2.0.1 2.0.2 2.0.3 2.0.4 2.0.5 2.1.1 2.0.0 2.1.0 2.1.2 2.1.3 2.1.4 2.1.6 1.0.2 2.1.7 2.1.8 2.1.9 2.1.10 2.1.11

详情介绍:

Eight security layers. One lightweight plugin. Zero compromise. Login Armor is a complete WordPress security stack built for agencies, freelancers and pros who deliver audit-ready sites. No premium tier, no bundled marketing dashboard, no telemetry. Every module runs locally, ships with safe defaults, and stays out of your way. Stop juggling Wordfence's bloat, Solid Security's upsells, and Limit Login Attempts' gaps. Login Armor delivers eight independent modules in under one megabyte, with the discipline of an enterprise plugin and the licensing of free software. Why Login Armor Eight independent modules 1. Hide Login - Replace wp-login.php with a custom slug. Anyone hitting the old URL gets a 404 from your theme - no leakage that WordPress is even installed. Compatible with multisite, password-protected posts, reverse proxies, and password recovery flows. The branded pre-activation modal lets you pick or generate the slug before flipping the switch, and emails it to you so you can't lock yourself out. 2. Brute Force Protection - Cascading lockouts after repeated failed logins. Locked attackers see a branded 429 landing page with a live countdown. Repeated lockouts escalate to a 24-hour ban. Lostpassword, register, XML-RPC and the REST users endpoint are all gated when an IP is locked, so attackers can't pivot. Subnet blocking handles distributed attacks. Trusted X-Forwarded-For for sites behind Cloudflare or a load balancer. 3. Hardening - Thirteen one-click toggles across surface reduction, credential hardening, and request filtering. Disable XML-RPC, the theme/plugin file editor, the WordPress version exposure (including ?ver= on assets, even for WP 6.5+ ES modules), application passwords, author enumeration, and more. Block reserved usernames with Unicode-confusable detection. Add an invisible login honeypot. Block PHP execution in uploads and directory listing via atomic-write .htaccess rules. 4. Two-Factor Authentication - Enterprise-grade 2FA in three flavours: TOTP via any authenticator app (Google Authenticator, Authy, 1Password, Bitwarden), one-time codes by email, and printable backup codes. Trusted devices remembered for thirty days so you only verify once per browser. A recovery flow lets a user reset their second factor by email when the authenticator is lost, without a support ticket. Per-role enforcement, configurable grace period, and a session-aware logout. 5. Detection and Incidents - A real-time detection engine groups raw events into six attack patterns: brute force, credential stuffing, distributed scan, post-compromise activity, lockout cascade, and protocol abuse. Each incident has a drill-down view with timeline, source IPs, target users, severity, user-agent fingerprint, and one-click resolution actions (reset password, block subnet, mark resolved). 6. Activity Log - Compliance-ready audit trail of admin actions: plugin installs, settings changes, role updates, user creation, content publishing, theme switches, 2FA enrollment events. Filter, search and export to CSV with configurable retention. Seven logger domains, all togglable independently. 7. Login Page Security Headers - Content-Security-Policy, X-Frame-Options, Permissions-Policy, Referrer-Policy and X-Content-Type-Options on wp-login.php and the lockout page. Two presets (standard and strict) with an optional CSP report-uri. 8. Breach Check - Detect users logging in with a password that appears in public data breach corpora, using privacy-preserving k-anonymity lookups against Have I Been Pwned. Only the first 5 hex characters of a SHA-1 prefix leave the server, the password and full hash never travel. Optional opt-in email lookup against XposedOrNot. Fail-soft: a HIBP outage never blocks login. Plus Built by Login Armor is built and maintained by WPFormation, a French WordPress agency obsessed with sites that are clean, fast, and audit-ready. We use this plugin on every site we ship. GPL forever. PHP 8.1+. WordPress 6.8+. Zero dependencies. Huit couches de securite. Un seul plugin leger. Zero compromis. Login Armor est une stack complete de securite WordPress concue pour les agences, les freelances et les pros qui livrent des sites prets a passer un audit. Pas de version premium, pas de tableau de bord marketing integre, pas de telemetrie. Chaque module tourne en local, embarque des reglages par defaut securises, et reste discret. Fini de jongler entre la lourdeur de Wordfence, les fenetres d'upsell de Solid Security et les angles morts de Limit Login Attempts. Login Armor regroupe huit modules independants en moins d'un mega-octet, avec la rigueur d'un plugin entreprise et la licence d'un logiciel libre. Pourquoi Login Armor Huit modules independants 1. Masquer la connexion : remplace wp-login.php par une URL personnalisee. Toute tentative sur l'ancienne URL renvoie une 404 du theme, sans reveler la presence de WordPress. Compatible multisite, articles proteges par mot de passe, reverse proxies, et flux de recuperation de mot de passe. La modale de pre-activation vous laisse choisir ou generer le slug avant d'activer le module, et vous l'envoie par e-mail pour eviter tout verrouillage. 2. Protection contre la force brute : verrouillages en cascade apres plusieurs echecs. Les attaquants verrouilles voient une page 429 brandee avec un compte a rebours en direct. Les verrouillages repetes montent a un bannissement de 24 h. Les pages lostpassword, register, XML-RPC et l'endpoint REST users sont egalement bloques pour les IPs verrouillees, pour empecher le pivot. Blocage de sous-reseaux pour les attaques distribuees. Support de X-Forwarded-For pour les sites derriere Cloudflare ou un load balancer. 3. Renforcement : treize bascules en un clic, regroupees en reduction de surface, durcissement des identifiants et filtrage des requetes. Desactivation de XML-RPC, de l'editeur de fichiers theme/extension, de l'exposition de la version WordPress (y compris le ?ver= sur les assets, meme les modules ES de WP 6.5+), des mots de passe applicatifs, de l'enumeration des auteurs. Blocage des identifiants reserves avec detection des homoglyphes Unicode. Pot de miel invisible sur le formulaire de connexion. Blocage de l'execution PHP dans wp-content/uploads/ et desactivation du listing de repertoires via des regles .htaccess ecrites en mode atomique. 4. Authentification a deux facteurs : 2FA prete pour la production avec trois methodes : TOTP via n'importe quelle application authenticator (Google Authenticator, Authy, 1Password, Bitwarden), codes a usage unique par e-mail, codes de secours imprimables. Appareils de confiance memorises pendant trente jours, vous ne validez qu'une fois par navigateur. Une procedure de recuperation laisse l'utilisateur reinitialiser son second facteur par e-mail en cas de perte, sans ouvrir de ticket. Application par role, periode de grace configurable, et deconnexion qui ferme proprement les sessions actives. 5. Detection et incidents : un moteur en temps reel regroupe les evenements bruts en six patterns d'attaque : force brute, credential stuffing, scan distribue, activite post-compromission, cascade de verrouillages et abus protocolaires. Chaque incident dispose d'une vue detaillee : chronologie, IPs sources, comptes cibles, severite, empreinte user-agent et actions de resolution en un clic (reinitialisation de mot de passe, blocage de sous-reseau, marquage resolu). 6. Journal d'activite : piste d'audit conforme des actions admin : installations d'extensions, modifications de reglages, changements de role, creations d'utilisateurs, publications de contenu, changements de theme, evenements 2FA. Filtrage, recherche et export CSV avec retention configurable. Sept domaines de loggers, activables independamment. 7. En-tetes de securite de la page de connexion : Content-Security-Policy, X-Frame-Options, Permissions-Policy, Referrer-Policy et X-Content-Type-Options sur wp-login.php et la page de verrouillage. Deux presets (standard et strict) avec une option de CSP report-uri. 8. Detection de fuites : repere les utilisateurs qui se connectent avec un mot de passe present dans des fuites publiques, via des recherches preservant la vie privee (k-anonymat) sur Have I Been Pwned. Seuls les 5 premiers caracteres hexa d'un prefixe SHA-1 quittent votre serveur ; le mot de passe et le hachage complet ne sortent jamais. Verification e-mail optionnelle (opt-in, desactivee par defaut) via XposedOrNot. Fail-soft : une coupure de HIBP ne bloque jamais la connexion. En plus Concu par Login Armor est concu et maintenu par WPFormation, une agence WordPress francaise obsedee par les sites propres, rapides et audit-ready. On utilise ce plugin sur chaque site qu'on livre. GPL pour toujours. PHP 8.1+. WordPress 6.8+. Zero dependance.

安装:

  1. Upload the login-armor directory to /wp-content/plugins/
  2. Activate the plugin through the 'Plugins' menu in WordPress
  3. Go to LoginArmor in the admin menu to configure
For multisite: Network Activate the plugin to apply it across all sites. Setting up Hide Login
  1. Go to LoginArmor > Settings > Hide Login section
  2. Enter your desired login slug (e.g., my-login)
  3. Save settings
  4. Bookmark your new login URL: you will need it to access your admin
Recovering access If you forget your custom login URL:

屏幕截图:

  • Overview dashboard - health cards, security pulse, live event tail, threat banner that surfaces active attacks.
  • Incidents - real-time pattern detection grouped by attack class with severity and one-click resolution.
  • Incident drill-down - full timeline, user-agent fingerprint, suggested actions, escalation flag.
  • Events - complete login attempts log with filters and CSV export.
  • Activity Log - admin action audit trail across seven domains, filterable and exportable.
  • Settings - modular configuration with live security score and a sticky save bar.
  • Hide Login pre-activation modal - pick or generate the secret URL and email it to yourself before flipping the switch.
  • Hardening - thirteen one-click toggles grouped by surface reduction, credential hardening, and request filtering.
  • Two-factor authentication setup - QR code for any authenticator app, copy-paste fallback, and live verification.
  • Breach Check - fully transparent k-anonymity lookups, separate password and email toggles, opt-in email check disabled by default.

升级注意事项:

2.1.13 Bug fix. Silent 2FA failure on installs with permalink_structure without trailing slash (e.g. /%postname%) — the verify cookie path mismatched the request path after handle_loaded's normalisation. Fixed cookie path to omit trailing slash. Neutral on trailing-slash installs. 2.1.12 Bug fix. Hide Login rendered without CSS when both apex and www routed to the same WP (shared hosting). Two fixes: canonical-host 301 in Hide Login + host-aware CSP in Login Page Security Headers. Neutral on single-host installs. New filter login_armor_canonical_host_redirect for opt-out. 2.1.11 Bug fix release for multisite + domain mapping setups. Hide Login URL is now host-aware (picks home_url or site_url based on HTTP_HOST). Fixes a V2.1.9 regression where mapped subsites would redirect to /wp-admin/ (404) instead of serving the slug page. Standard installs and multisite headless continue to work. 2.1.10 Cosmetic fix. The 404 page served when an anonymous visitor hits /wp-admin/ with Hide Login enabled now renders as a proper WordPress 404 (body class error404, SEO noindex meta, theme 404 template) instead of a half-bootstrapped page. No security or functional change. 2.1.9 Bug fix. Hide Login now builds the rewritten login URL from site_url() (matching wp_login_url() in WP core) instead of home_url(). Fixes silent breakage on multisite headless, WordPress in subdirectory, and reverse-proxy installs. Neutral on standard installs. 2.1.8 Hygiene release after a full V2.1.7 audit. Three LOW fixes batched: webhook stats query no longer warns on fresh installs, lockout_window option now cleaned on uninstall, five missing French translations added (Activity Log integrity badges, Breach Check messages). No code path change visible to end users. 2.1.7 Preventive: hardens the Email 2FA enrollment flow. Failed wp_mail() no longer leaves a half-committed 2FA state, and a new pre-activation modal forces a real test email + a safety-net check before the user can lock themselves out. Recommended for every install where Email-based 2FA is enabled. 2.1.6 Preventive release. Eliminates a latent V2.1.3-style fatal risk in the TwoFactor module. Finishes the uninstall.php cleanup (zero residual data). Surfaces Activity Log integrity coverage scope in admin UI. No new features, no DB migration. 2.1.4 Critical hotfix: 2.1.3 fatal-errored on every fresh install (Class "LoginArmor\ActivityLog\ActivityLog" not found). Sites with Activity Log already enabled were unaffected. Recommended for every install, urgent for new installs. 2.1.3 Critical hotfix: Hardening "Hide WP version" was stripping cache-buster from our own assets, so updates past 2.1.0 were invisible behind hosting CDNs (LiteSpeed LSADC, Cloudflare). Recommended for every install. 2.1.2 Critical hotfix: the Settings tab fatal-errored on every fresh install that had not yet enabled the Activity Log module (Class WebhookDispatcher not found). Recommended for every install. 2.1.1 Activity Log integrity: every row is HMAC-signed and chained, detects any tampering. Optional signed webhook forwarding (SIEM / Slack / Datadog / any HTTPS). New WP-CLI verify-chain. Bundles 6 hardening fixes. Migration automatic. Recommended for every install. 2.1.0 Security: 2FA pending token moved from URL query string to a signed HttpOnly + SameSite=Strict cookie. Closes URL-leak (browser history / Referer / access logs) and DB-leak (clear token no longer in wp_options). Recommended for every install with 2FA enabled. 2.0.5 Security audit pass: REST author-enum scope, optional HSTS, IPv6 subnet fix, 0.0.0.0 placeholder DoS skip, .htaccess admin-rules preservation. No regression. Recommended. 2.0.4 Real fix for the lockout 429 page on hosts with a public page cache (LiteSpeed Cache, WP Rocket, Cloudflare). Recommended after the 2.0.1-2.0.3 sequence. 2.0.3 Hotfix: HTTP/2 stream termination on LiteSpeed/LSAPI for the branded lockout page. Recommended. 2.0.2 Critical fix: 429 branded lockout page now reaches the browser. Recommended. 2.0.1 Branded 429 lockout page on the triggering attempt + Reset Stats UI + correct WP.org banner/icon. Recommended. 2.0.0 First WordPress.org release of the V2 line. Eight independent security modules. Recommended.

常见问题:

Will it lock me out of my own site?

No. Hide Login always sends a one-time recovery URL to the admin email. If you lose the slug, check your inbox. The plugin also honors wp-cli fallback so you can reset anything from SSH.

Does it slow my site down?

No. Everything is lazy-loaded and indexed. On a normal login flow the extra SQL cost is under 2 ms.

Is it compatible with Cloudflare / reverse proxies?

Yes. IP detection honors trusted X-Forwarded-For headers; you pick the header in Settings.

Does it work with multisite?

Yes, subdomain and subfolder. Each site has its own modules, logs, and thresholds.

Can I use LoginArmor alongside Wordfence / iThemes Security / Solid Security?

Yes, but disable overlapping modules on one side to avoid double lockouts.

Where is the data stored?

Three custom tables in your own database: events, incidents, activity. Nothing leaves your server.

How do I migrate my configuration?

Settings are plain WordPress options. Export/import via WP-CLI or any standard options-sync tool.

Is there a pro version?

Not currently. LoginArmor is fully free and open source. GPL forever.

Where can I report bugs or request features?

Support forum: wordpress.org/support/plugin/login-armor/.

更新日志:

2.1.13 Bug fix release. Fixes a silent 2FA failure on installs whose permalink_structure does not end with a trailing slash (e.g. /%postname%). With 2FA enabled, the verification challenge after submitting login credentials would disappear and the user would land back on the login form with no error message. Reported by a user on 2026-05-11. 2.1.12 Bug fix release. Fixes broken-CSS rendering on the login page when both apex and www hostnames route to the same WordPress without a server-level canonical 301 (common on shared hosting). Two complementary fixes. 2.1.11 Bug fix release. Fixes a V2.1.9 regression on multisite + domain mapping setups (where sub-sites are mapped to external domains via WP MU Domain Mapping or native WP 4.5+). 2.1.10 Cosmetic fix release. The 404 page served when an anonymous visitor hits /wp-admin/ with Hide Login enabled now renders as a proper WordPress 404 instead of a half-bootstrapped theme page with a duplicated header. 2.1.9 Bug fix release. Hide Login now uses site_url() instead of home_url() to build the rewritten login URL, matching what WordPress core does inside wp_login_url(). 2.1.8 Hygiene release issued from a full V2.1.7 audit. Three findings, all LOW severity, batched in a single update. 2.1.7 Preventive release on the Email 2FA enrollment flow. Closes a self-lockout pattern reported by a user whose hosting silently dropped outgoing mail. 2.1.6 Preventive release bundling V2.1.5 + post-tag cleanup findings. No bug observed in production — eliminates a latent V2.1.3-style fatal risk in the TwoFactor module and finishes the uninstall.php cleanup audit. 2.1.4 Critical hotfix. 2.1.3 Critical hotfix. 2.1.2 Critical hotfix + UX polish. 2.1.1 2.1.0 2.0.5 Security audit pass. Five fixes identified by an internal Phase 1 + Phase 2 audit against 2.0.4, each double-checked on production before patching. No functional regression. 2.0.4 Real fix for the lockout 429 page never appearing on hosts with a public page cache fronting the Hide Login slug. 2.0.3 Same-day hotfix on top of 2.0.2 for HTTP/2 stream termination. 2.0.2 Critical fix for the lockout 429 page. 2.0.1 Post-launch patch. 2.0.0 First WordPress.org public release of the V2 line. Bundles eight independent security modules in a single sub-megabyte plugin: Hide Login (custom URL slug + branded lockout page), Brute Force Protection (cascading lockouts, subnet blocking, X-Forwarded-For), Hardening (13 one-click toggles), Two-Factor Authentication (TOTP + Email OTP + backup codes + trusted devices + recovery flow), Detection and Incidents (6 attack patterns), Activity Log (compliance-ready audit trail), Login Page Security Headers (CSP / X-Frame-Options / Permissions-Policy presets), and Breach Check (HIBP k-anonymity + opt-in XposedOrNot). Pre-release security audit: