jmdugan / blocklistsLinks
Shared lists of problem domains people may want to block with hosts files
☆4,579Updated last year
Alternatives and similar repositories for blocklists
Users that are interested in blocklists are comparing it to the libraries listed below
Sorting:
- Some of the hidden norms about Hacker News not otherwise covered in the Guidelines and the FAQ.☆3,742Updated 10 months ago
- Useful IT policies☆4,899Updated last year
- 🔑🔥📈 Next Level PGP☆3,475Updated 6 years ago
- Wipe and reinstall a running Linux system via SSH, without rebooting. You know you want to.☆7,297Updated 4 years ago
- gmail backup software☆3,615Updated 3 years ago
- Curated List of Privacy Respecting Services and Software☆2,022Updated 2 years ago
- Archived list of domains using Cloudflare DNS at the time of the CloudBleed announcement.☆1,920Updated 8 years ago
- The corrective bash syntax highlighter☆4,727Updated 2 weeks ago
- uBlock: a fast, lightweight, and lean blocker for Chrome, Firefox, and Safari.☆8,226Updated 3 years ago
- uMatrix: Point and click matrix to filter net requests according to source, destination and type☆4,643Updated 4 years ago
- user.js -- Firefox configuration hardening☆2,859Updated 2 months ago
- A set of Ansible playbooks to build and maintain your own private cloud: email, calendar, contacts, file sync, IRC bouncer, VPN, and more…☆10,460Updated 3 years ago
- 🔒 Consolidating and extending hosts files from several well-curated sources. Optionally pick extensions for porn, social media, and othe…☆29,394Updated this week
- OpenSnitch is a GNU/Linux interactive application firewall inspired by Little Snitch.☆12,481Updated this week
- Create and maintain your own man pages so you can remember how to do stuff☆1,817Updated 4 years ago
- Browse Hacker News like a haxor: A Hacker News command line interface (CLI).☆4,086Updated 3 years ago
- Brad's homelab setup☆2,063Updated 5 years ago
- Automate Scrubbing your Facebook Presence☆2,674Updated 3 years ago
- Chrome extension which blocks requests to sites which have used legal threats to remove themselves from other blacklists.☆648Updated 5 months ago
- A list of command-line tools for manipulating structured text data☆7,095Updated last month
- Machine Learning meets ketosis: how to effectively lose weight☆3,319Updated 3 years ago
- The magma server daemon, is an encrypted email system with support for SMTP, POP, IMAP, HTTP and MOLTEN,. Additional support for DMTP and…☆1,831Updated 9 months ago
- Stop Firefox leaking data about you☆900Updated 4 years ago
- GnuPG symmetric secrets manager using Bash.☆1,563Updated 7 months ago
- « usbkill » is an anti-forensic kill-switch that waits for a change on your USB ports and then immediately shuts down your computer.☆4,562Updated last year
- Automatically updated, moderated and optimized lists for blocking ads, trackers, malware and other garbage☆2,310Updated 2 years ago
- Create On Demand Disposable OpenVPN Endpoints on AWS.☆2,016Updated 5 years ago
- DNS Performance test☆2,481Updated last year
- See what a program does before deciding whether you really want it to happen (NO LONGER MAINTAINED)☆6,335Updated 8 years ago
- A comparison between some VPS providers. It uses Ansible to perform a series of automated benchmark tests over the VPS servers that you s…☆1,431Updated 7 years ago