jmdugan / blocklistsLinks
Shared lists of problem domains people may want to block with hosts files
☆4,567Updated 8 months ago
Alternatives and similar repositories for blocklists
Users that are interested in blocklists are comparing it to the libraries listed below
Sorting:
- Useful IT policies☆4,893Updated last year
- The corrective bash syntax highlighter☆4,692Updated 9 months ago
- Create On Demand Disposable OpenVPN Endpoints on AWS.☆2,015Updated 5 years ago
- gmail backup software☆3,613Updated 3 years ago
- A set of Ansible playbooks to build and maintain your own private cloud: email, calendar, contacts, file sync, IRC bouncer, VPN, and more…☆10,447Updated 2 years ago
- Wipe and reinstall a running Linux system via SSH, without rebooting. You know you want to.☆7,274Updated 3 years ago
- Curated List of Privacy Respecting Services and Software☆1,999Updated last year
- A compilation of sites with dumb password rules.☆3,011Updated this week
- Some of the hidden norms about Hacker News not otherwise covered in the Guidelines and the FAQ.☆3,710Updated 5 months ago
- Automate Scrubbing your Facebook Presence☆2,675Updated 3 years ago
- Create and maintain your own man pages so you can remember how to do stuff☆1,812Updated 4 years ago
- 🔑🔥📈 Next Level PGP☆3,474Updated 6 years ago
- Brad's homelab setup☆1,913Updated 5 years ago
- Archived list of domains using Cloudflare DNS at the time of the CloudBleed announcement.☆1,919Updated 8 years ago
- Browse Hacker News like a haxor: A Hacker News command line interface (CLI).☆4,015Updated 3 years ago
- « usbkill » is an anti-forensic kill-switch that waits for a change on your USB ports and then immediately shuts down your computer.☆4,529Updated last year
- Machine Learning meets ketosis: how to effectively lose weight☆3,324Updated 3 years ago
- user.js -- Firefox configuration hardening☆2,836Updated 5 months ago
- Automatically updated, moderated and optimized lists for blocking ads, trackers, malware and other garbage☆2,307Updated 2 years ago
- A collection of SQL queries to social media datasets.☆1,544Updated 5 years ago
- Step-by-step guide on how to create a GPG key on keybase.io, adding it to a local GPG setup and using it with Git and GitHub.☆2,640Updated 2 years ago
- 🛡🛠 You are being watched. Protect your privacy against global mass surveillance.☆3,119Updated 3 years ago
- Completely block Google and its services☆1,362Updated this week
- 👨🏭Set up your Linux server with plain shell scripts☆1,175Updated 3 years ago
- GnuPG symmetric secrets manager using Bash.☆1,551Updated 2 months ago
- Learn how to master the art of baking the programmer way.☆4,108Updated 2 years ago
- A comparison between some VPS providers. It uses Ansible to perform a series of automated benchmark tests over the VPS servers that you s…☆1,421Updated 7 years ago
- Make a self hosted OpenVPN server in 15 minutes☆808Updated 8 years ago
- Like nmap for mapping wifi networks you're not connected to, plus device tracking☆2,679Updated last year
- A list of command-line tools for manipulating structured text data☆7,047Updated 4 months ago