jmdugan / blocklistsLinks
Shared lists of problem domains people may want to block with hosts files
ā4,579Updated last year
Alternatives and similar repositories for blocklists
Users that are interested in blocklists are comparing it to the libraries listed below
Sorting:
- šš„š Next Level PGPā3,475Updated 6 years ago
- The corrective bash syntax highlighterā4,738Updated last month
- gmail backup softwareā3,627Updated 3 years ago
- Wipe and reinstall a running Linux system via SSH, without rebooting. You know you want to.ā7,307Updated 4 years ago
- Curated List of Privacy Respecting Services and Softwareā2,026Updated 2 years ago
- Brad's homelab setupā2,093Updated 5 years ago
- Create and maintain your own man pages so you can remember how to do stuffā1,823Updated 4 years ago
- uMatrix: Point and click matrix to filter net requests according to source, destination and typeā4,650Updated 4 years ago
- Simple, native and efficient local ad blocker. Only Bash.ā1,860Updated last month
- Create On Demand Disposable OpenVPN Endpoints on AWS.ā2,016Updated 5 years ago
- š”š You are being watched. Protect your privacy against global mass surveillance.ā3,146Updated 3 years ago
- Librefox: Firefox with privacy enhancementsā1,768Updated 4 years ago
- Automatically updated, moderated and optimized lists for blocking ads, trackers, malware and other garbageā2,306Updated 2 years ago
- GnuPG symmetric secrets manager using Bash.ā1,564Updated 8 months ago
- A collection of SQL queries to social media datasets.ā1,546Updated 6 years ago
- Browse Hacker News like a haxor: A Hacker News command line interface (CLI).ā4,116Updated 3 years ago
- Automate Scrubbing your Facebook Presenceā2,671Updated 4 years ago
- Make a self hosted OpenVPN server in 15 minutesā807Updated 8 years ago
- A simple static site generator for photoessaysā4,434Updated 3 years ago
- user.js -- Firefox configuration hardeningā2,865Updated 2 months ago
- Using speech-to-text to fully check out during con callsā2,093Updated 6 years ago
- Some of the hidden norms about Hacker News not otherwise covered in the Guidelines and the FAQ.ā3,749Updated 11 months ago
- See what a program does before deciding whether you really want it to happen (NO LONGER MAINTAINED)ā6,333Updated 8 years ago
- A history of edits to the US Constitution as it has been amended. Written in markdown to match original formatting.ā2,171Updated 5 years ago
- Useful IT policiesā4,898Updated last year
- Chrome extension which blocks requests to sites which have used legal threats to remove themselves from other blacklists.ā648Updated 6 months ago
- A comparison between some VPS providers. It uses Ansible to perform a series of automated benchmark tests over the VPS servers that you sā¦ā1,428Updated 7 years ago
- Let's make an annoyance free, better open internet, altogether!ā2,757Updated this week
- Automatically track which applications you use and for how long.ā2,241Updated 4 years ago
- Machine Learning meets ketosis: how to effectively lose weightā3,316Updated 3 years ago