jmdugan / blocklistsLinks
Shared lists of problem domains people may want to block with hosts files
☆4,574Updated 11 months ago
Alternatives and similar repositories for blocklists
Users that are interested in blocklists are comparing it to the libraries listed below
Sorting:
- Archived list of domains using Cloudflare DNS at the time of the CloudBleed announcement.☆1,922Updated 8 years ago
- user.js -- Firefox configuration hardening☆2,849Updated last week
- Curated List of Privacy Respecting Services and Software☆2,013Updated 2 years ago
- Useful IT policies☆4,899Updated last year
- gmail backup software☆3,617Updated 3 years ago
- Automatically updated, moderated and optimized lists for blocking ads, trackers, malware and other garbage☆2,307Updated 2 years ago
- A set of Ansible playbooks to build and maintain your own private cloud: email, calendar, contacts, file sync, IRC bouncer, VPN, and more…☆10,458Updated 2 years ago
- AdNauseam: Fight back against advertising surveillance☆4,864Updated last week
- The corrective bash syntax highlighter☆4,715Updated last year
- 🔑🔥📈 Next Level PGP☆3,477Updated 6 years ago
- Wipe and reinstall a running Linux system via SSH, without rebooting. You know you want to.☆7,288Updated 4 years ago
- « usbkill » is an anti-forensic kill-switch that waits for a change on your USB ports and then immediately shuts down your computer.☆4,553Updated last year
- Librefox: Firefox with privacy enhancements☆1,761Updated 4 years ago
- Using speech-to-text to fully check out during con calls☆2,091Updated 6 years ago
- A compilation of sites with dumb password rules.☆3,014Updated last month
- 🛡🛠 You are being watched. Protect your privacy against global mass surveillance.☆3,129Updated 3 years ago
- ultrafast single TCP packet audio/visual experience☆1,403Updated last year
- Learn how to master the art of baking the programmer way.☆4,121Updated 2 years ago
- Some of the hidden norms about Hacker News not otherwise covered in the Guidelines and the FAQ.☆3,744Updated 8 months ago
- See what a program does before deciding whether you really want it to happen (NO LONGER MAINTAINED)☆6,340Updated 8 years ago
- A collection of debugging stories. PRs welcome (sorry for the backlog) :-)☆3,812Updated last year
- uMatrix: Point and click matrix to filter net requests according to source, destination and type☆4,633Updated 4 years ago
- Automate Scrubbing your Facebook Presence☆2,676Updated 3 years ago
- Chrome extension which blocks requests to sites which have used legal threats to remove themselves from other blacklists.☆649Updated 3 months ago
- ☆1,934Updated 4 years ago
- Create On Demand Disposable OpenVPN Endpoints on AWS.☆2,017Updated 5 years ago
- A ssh server that knows who you are. $ ssh whoami.filippo.io☆2,283Updated last month
- A list of command-line tools for manipulating structured text data☆7,078Updated 3 weeks ago
- [ab]using Unicode to create tragedy☆3,747Updated 2 years ago
- A proposed standard that allows websites to define security policies.☆1,836Updated 2 years ago