View attachment 21829
Description
Loginizer is a WordPress plugin which helps you fight against bruteforce attack by blocking login for the IP after it reaches maximum retries allowed. You can blacklist or whitelist IPs for login using Loginizer. You can use various other features like Two Factor Auth, reCAPTCHA, PasswordLess Login, etc. to improve security of your website.
Loginizer is actively used by more than 1000000+ WordPress websites.
You can find our official...
Download Loginizer Security Pro v1.7.2 Nulled
= 1.7.2 =
* [Improvement] [Pro] Allowed HTML characters in Passwordless email.
* [Bug Fix] Improved performance on sites running Loginizer with WooCommerce.
* [Bug Fix] Added validation not to allow values less than 0 in Brute Force admin settings.
* [Bug Fix] Some language strings were hardcoded in English and could not be translated. This is fixed and all strings can now be translated.
* [Bug Fix] Resolved PHP Warnings and Notices on...
Download Loginizer Security Pro v1.7.3 Nulled
= 1.7.3 =
* [Bug Fix] Added validation not to allow values less than 0 for all Brute Force admin settings.
- [Feature] CSRF Protection adds a unique session key in your admin URL when you login to it, which adds another layer of security to your WordPress website as it makes it difficult to predict the URL hence making it difficult and nearly impossble to do CSRF attacts on your WordPress admin panel.
- [Task] 2FA Support for MasterStudy Custom Login
- [Bug Fix] Some users were facing an error when using 2FA App verification that has been fixed.
- [Task] Tested compatibility with WordPress 6.1
- [Bug Fix] There was an issue with sanitizing URL that has been fixed.
- [Security] Minor security issues reported by patchstack have been fixed with in 24 hours of reporting.
- [Bug-Fix] For some themes the Maths capatch input was invisible that has been fixed.
- [Bug-Fix] Users were getting PHP notice in init.php file that has been fixed.
- [Bug-Fix] Math cookie has been set as secure now.
- [Security-Fix] We were sanitizing an output in place of escaping it, that has been fixed [Reported by Erwan Le Rousseau from WPScan]