WordPress plugin to reduce comment spam with a smarter honeypot. The trickiest thing here is to make sure the comment form is done in the new style in your comment form. Since this plugin rearranges form fields, it requires the newer comment template. The website still gets trackback spam, which is harder to figure out a solution for because a trackback is sort of meant to be done by computers. The only solution for trackback spam is to turn off trackbacks. This plugin is not intended to stop trackback spam. Installation: Go to the release page on GitHub, download the latest zip file, rename it to wp-smart-honeypot.zip, go to your WordPress admin panel, click on Plugin » Add New, then click the upload tab, browse for your wp-smart-honeypot.zip and click Install Now, and finally activate the plugin. Notes: This plugin may include some form elements related to bootstrap. You may need to modify the PHP before using it on your site. If you are not using WordPress and would like to see a PHP example of a honeypot form in use, refer to the documentation.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
GuardDog is a CLI tool that identifies malicious PyPI and npm packages using heuristics-based analysis of source code and metadata.
A PHP port of Rack::Honeypot, a spam trap that detects and blocks spambots
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.
Search engine for open-source Git repositories with advanced features like case sensitivity and regular expressions.
A technology lookup and lead generation tool that identifies the technology stack of any website and provides features for market research, competitor analysis, and data enrichment.
APKiD is a tool that identifies compilers, packers, obfuscators, and other weird stuff in APK files.
An open-source tool that automates the detection and analysis of DLL hijacking vulnerabilities in Windows applications, providing detailed reports and remediation guidance.
A comprehensive toolkit for web application security testing, offering a range of products and solutions for identifying vulnerabilities and improving security posture.
A deliberately vulnerable Java web application designed for educational purposes to teach web application security concepts and common vulnerabilities.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.