A collection of domains, wildcards and substrings designed for dnscrypt-proxy filter method.

Related tags

Networkingblock
Overview

block

A collection of domains, wildcards and substrings designed for dnscrypt-proxy filter method.

  • allowed-names.txt: it's the file used to bypass a specific domain blocked by a rule contained in the blocked-names.txt file.
  • domains-blocklist.conf: it's used to configure the sources to merge during the build process.
  • domains-blocklist-local-additions.txt: it's used during the generation process to add your own additions and remove duplicates from the sources.
  • domains-allowlist.txt: it's used during the generation process to remove legit domains.
  • generate-domains-blocklist.py: it's the script used to launch the build process.

Sources

blocked-names.txt

Source Maintainer(s) Description Home Page RAW Source License
Developer Dan: Ads & Tracking Daniel (lightswitch05) Block advertisements and tracking. LINK RAW Apache-2.0
Developer Dan: AMP Hosts Daniel (lightswitch05) Block Google's Accelerated Mobile Pages (AMP). LINK RAW Apache-2.0
Developer Dan: Tracking Aggressive Daniel (lightswitch05) A very aggressive block list for tracking, geo-targeting and ads. LINK RAW Apache-2.0
domains-blocklist-local-additions.txt quindecim Domains, wildcards and substrings collection. LINK RAW GPLv3
domains-allowlist.txt quindecim Legit domains collection. LINK RAW GPLv3
Energized Protection: Core Hosts Team Boltz Core of the Energized Proterction lists. LINK RAW MIT
Energized Protection: Regional Extension Team Boltz Regional annoyance blocking. LINK RAW MIT
Energized Protection: Xtreme Extension Team Boltz Privacy protection at its best. LINK RAW MIT
hBlock Héctor Molinero Fernández (hectorm) A merged list from a variety of other lists. LINK RAW MIT
NoTracking notracking A merged list from a variety of other lists. LINK RAW All Rights Reserved
OISD: full Stephan (sjhgvr) A merged list from a variety of other lists. LINK RAW All Rights Reserved
OISD: extra Stephan (sjhgvr) OISD's controversial domains list. LINK RAW All Rights Reserved
Oneoffdallas: DoH Servers List oneoffdallas A list of publicly available DNS over HTTPS (DoH) servers. LINK RAW MIT

blocked-ips.txt

Source Maintainer(s) Description Home Page RAW Source License
DNSCrypt: Rebind Protection jedisct1 DNS rebinding protection LINK - ISC

Build

To generate your own list you can clone this repo, move into the config folder, edit files according to your needs and run this command:

python3 generate-domains-blocklist.py > list.txt.tmp && mv -f list.txt.tmp list
NanoChat - nano chat server and client

NanoChat This is a work in progress! NanoChat is an application for connecting with your friends using Python that uses ONLY default Python libraries.

Miss Bliss 1 Nov 13, 2021
Simple P2P application for sending files over open and forwarded network ports.

FileShareV2 A major overhaul to the V1 (now deprecated) FileShare application. V2 brings major improvements in both UI and performance. V2 is now base

Michael Wang 1 Nov 23, 2021
A Cheap Flight Alert program sends you a SMS to notify cheap flights in next 8 months.

Flight Dealer A Cheap Flight Alert program sends you a SMS to notify cheap flights (return trips) in next 6 months. Installing Download the Python 3 i

Aytaç Kaşoğlu 2 Feb 10, 2022
Network Dynaimcs Simulation

A Final Year Project in CUHK, Autumn 2021 Network Dynaimcs Simulation Files param.h edit all the variables & settings here simulate.c the main program

Likchun 0 Mar 28, 2022
gRPC typing stubs for Python

gRPC Typing Stubs for Python This is a PEP-561-compliant stub-only package which provides type information of gRPC. Install using pip: pip install grp

Blake Williams 27 Dec 20, 2022
netpy - more than implementation of netcat 🐍🔥

netpy - more than implementation of netcat 🐍🔥

Mahmoud S. ElGammal 1 Jan 26, 2022
Simple reverse backdoor utility, that uses sockets to communicate.

reverse_backdoor Simple reverse backdoor utility, that uses sockets to communicate. How to use Run rev_bd_listener.py using command below: $ python3 r

1 Dec 10, 2021
Medusa is a cross-platform agent compatible with both Python 3.8 and Python 2.7.

Medusa Medusa is a cross-platform agent compatible with both Python 3.8 and Python 2.7. Installation To install Medusa, you'll need Mythic installed o

Mythic Agents 123 Nov 09, 2022
Load balancing DICOM router

dicom-loadbalancer Load balancing DICOM router (WORK IN PROGRESS) The DICOM loadbalancer provides functionality for acting as any number of DICOM SCPs

Søren Boll Overgaard 1 Jan 15, 2022
pureSxS - A tool to export Component Based Servicing packages from a full Windows installation

pureSxS A tool to export Component Based Servicing packages from a full Windows installation. Usage pureSxS.py source_mum destination pureSxS wor

Gamers Against Weed 3 Oct 03, 2022
A simple hosts picker for Microsoft Services

A simple Python scrip for you to select the fastest IP for Microsoft services.

Konnyaku 394 Dec 17, 2022
An advanced real time threat intelligence framework to identify threats and malicious web traffic on the basis of IP reputation and historical data.

ARTIF is a new advanced real time threat intelligence framework built that adds another abstraction layer on the top of MISP to identify threats and malicious web traffic on the basis of IP reputatio

CRED 225 Dec 31, 2022
SonicWall SSL-VPN Exploit

VisualDoor SonicWall SSL-VPN Exploit, as used by Phineas Fisher to hack Cayman Trust Bank and Hacking Team.

169 Nov 15, 2022
Fmog: Fortinet Mass Object Generator. This script will take a list of IP addresses and create address objects with the same name

Fmog: Fortinet Mass Object Generator This script will take a list of IP addresses and create address objects with the same name. It will also add them

2 Oct 26, 2021
Truetool - A TrueCharts automatic and bulk update utility

truetool A easy tool for frequently used TrueNAS SCALE CLI utilities. Previously

TrueCharts 125 Jan 04, 2023
An curated collection of awesome resources about networking in cybersecurity

An ongoing curated collection of awesome software, libraries, frameworks, talks & videos, best practices, learning tutorials and important practical resources about networking in cybersecurity

Paul Veillard, P. Eng 7 Nov 30, 2022
Impacket is a collection of Python classes for working with network protocols.

What is Impacket? Impacket is a collection of Python classes for working with network protocols. Impacket is focused on providing low-level programmat

SecureAuth Corporation 10.4k Jan 09, 2023
User-friendly packet captures

capture-packets: User-friendly packet captures Please read before using All network traffic occurring on your machine is captured (unless you specify

Seth Michael Larson 2 Feb 05, 2022
This is the code repository for the USENIX Security 2021 paper, "Weaponizing Middleboxes for TCP Reflected Amplification".

weaponizing-censors Censors pose a threat to the entire Internet. In this work, we show that censoring middleboxes and firewalls can be weaponized by

UMD Breakerspace 119 Dec 31, 2022
Dshell is a network forensic analysis framework.

Dshell An extensible network forensic analysis framework. Enables rapid development of plugins to support the dissection of network packet captures. K

DEVCOM Army Research Laboratory 5.4k Jan 06, 2023