hblock
Improve your security and privacy by blocking ads, tracking and malware domains.
This POSIX-compliant shell script, designed for Unix-like systems, gets a list of domains that serve ads, tracking scripts and malware from multiple sources (see below) and creates a hosts file (alternative formats are also supported) that prevents your system from connecting to them.
https://hblock.molinero.xyz
https://github.com/hectorm/hblock
adaway.org https://adaway.org/hosts.txt
AdBlock NoCoin List https://raw.githubusercontent.com/hoshsadiq/adblock-nocoin-list/master/hosts.txt
AdGuard - Simplified https://filters.adtidy.org/extension/chromium/filters/15.txt
anudeepND - adservers https://raw.githubusercontent.com/anudeepND/blacklist/master/adservers.txt
disconnect.me - Ad https://s3.amazonaws.com/lists.disconnect.me/simple_ad.txt
disconnect.me - Malvertising https://s3.amazonaws.com/lists.disconnect.me/simple_malvertising.txt
disconnect.me - Malware https://s3.amazonaws.com/lists.disconnect.me/simple_malware.txt
disconnect.me - Tracking https://s3.amazonaws.com/lists.disconnect.me/simple_tracking.txt
EasyList https://easylist.to/easylist/easylist.txt
EasyPrivacy https://easylist.to/easylist/easyprivacy.txt
ETH Phishing Detect https://raw.githubusercontent.com/MetaMask/eth-phishing-detect/master/src/hosts.txt
FadeMind - add.2o7Net https://raw.githubusercontent.com/FadeMind/hosts.extras/master/add.2o7Net/hosts
FadeMind - add.Dead https://raw.githubusercontent.com/FadeMind/hosts.extras/master/add.Dead/hosts
FadeMind - add.Risk https://raw.githubusercontent.com/FadeMind/hosts.extras/master/add.Risk/hosts
FadeMind - add.Spam https://raw.githubusercontent.com/FadeMind/hosts.extras/master/add.Spam/hosts
KADhosts https://raw.githubusercontent.com/azet12/KADhosts/master/KADhosts.txt
malwaredomainlist.com https://www.malwaredomainlist.com/hostslist/hosts.txt
malwaredomains.com - Immortal domains http://mirror1.malwaredomains.com/files/immortal_domains.txt
malwaredomains.com - Just domains http://mirror1.malwaredomains.com/files/justdomains
matomo.org - Spammers https://raw.githubusercontent.com/matomo-org/referrer-spam-blacklist/master/spammers.txt
mitchellkrogza - Badd-Boyz-Hosts https://raw.githubusercontent.com/mitchellkrogza/Badd-Boyz-Hosts/master/hosts
pgl.yoyo.org https://pgl.yoyo.org/adservers/serverlist.php?hostformat=nohtml&mimetype=plaintext
ransomwaretracker.abuse.ch https://ransomwaretracker.abuse.ch/downloads/RW_DOMBL.txt
someonewhocares.org http://someonewhocares.org/hosts/hosts
spam404.com https://raw.githubusercontent.com/Dawsey21/Lists/master/main-blacklist.txt
StevenBlack https://raw.githubusercontent.com/StevenBlack/hosts/master/data/StevenBlack/hosts
winhelp2002.mvps.org http://winhelp2002.mvps.org/hosts.txt
ZeroDot1 - CoinBlockerLists https://zerodot1.gitlab.io/CoinBlockerLists/hosts_browser
zeustracker.abuse.ch https://zeustracker.abuse.ch/blocklist.php?download=domainblocklist
π‘ @NoGoolag
#hblock #hosts #list #adblock #tracker #malware #shell #script
Improve your security and privacy by blocking ads, tracking and malware domains.
This POSIX-compliant shell script, designed for Unix-like systems, gets a list of domains that serve ads, tracking scripts and malware from multiple sources (see below) and creates a hosts file (alternative formats are also supported) that prevents your system from connecting to them.
https://hblock.molinero.xyz
https://github.com/hectorm/hblock
adaway.org https://adaway.org/hosts.txt
AdBlock NoCoin List https://raw.githubusercontent.com/hoshsadiq/adblock-nocoin-list/master/hosts.txt
AdGuard - Simplified https://filters.adtidy.org/extension/chromium/filters/15.txt
anudeepND - adservers https://raw.githubusercontent.com/anudeepND/blacklist/master/adservers.txt
disconnect.me - Ad https://s3.amazonaws.com/lists.disconnect.me/simple_ad.txt
disconnect.me - Malvertising https://s3.amazonaws.com/lists.disconnect.me/simple_malvertising.txt
disconnect.me - Malware https://s3.amazonaws.com/lists.disconnect.me/simple_malware.txt
disconnect.me - Tracking https://s3.amazonaws.com/lists.disconnect.me/simple_tracking.txt
EasyList https://easylist.to/easylist/easylist.txt
EasyPrivacy https://easylist.to/easylist/easyprivacy.txt
ETH Phishing Detect https://raw.githubusercontent.com/MetaMask/eth-phishing-detect/master/src/hosts.txt
FadeMind - add.2o7Net https://raw.githubusercontent.com/FadeMind/hosts.extras/master/add.2o7Net/hosts
FadeMind - add.Dead https://raw.githubusercontent.com/FadeMind/hosts.extras/master/add.Dead/hosts
FadeMind - add.Risk https://raw.githubusercontent.com/FadeMind/hosts.extras/master/add.Risk/hosts
FadeMind - add.Spam https://raw.githubusercontent.com/FadeMind/hosts.extras/master/add.Spam/hosts
KADhosts https://raw.githubusercontent.com/azet12/KADhosts/master/KADhosts.txt
malwaredomainlist.com https://www.malwaredomainlist.com/hostslist/hosts.txt
malwaredomains.com - Immortal domains http://mirror1.malwaredomains.com/files/immortal_domains.txt
malwaredomains.com - Just domains http://mirror1.malwaredomains.com/files/justdomains
matomo.org - Spammers https://raw.githubusercontent.com/matomo-org/referrer-spam-blacklist/master/spammers.txt
mitchellkrogza - Badd-Boyz-Hosts https://raw.githubusercontent.com/mitchellkrogza/Badd-Boyz-Hosts/master/hosts
pgl.yoyo.org https://pgl.yoyo.org/adservers/serverlist.php?hostformat=nohtml&mimetype=plaintext
ransomwaretracker.abuse.ch https://ransomwaretracker.abuse.ch/downloads/RW_DOMBL.txt
someonewhocares.org http://someonewhocares.org/hosts/hosts
spam404.com https://raw.githubusercontent.com/Dawsey21/Lists/master/main-blacklist.txt
StevenBlack https://raw.githubusercontent.com/StevenBlack/hosts/master/data/StevenBlack/hosts
winhelp2002.mvps.org http://winhelp2002.mvps.org/hosts.txt
ZeroDot1 - CoinBlockerLists https://zerodot1.gitlab.io/CoinBlockerLists/hosts_browser
zeustracker.abuse.ch https://zeustracker.abuse.ch/blocklist.php?download=domainblocklist
π‘ @NoGoolag
#hblock #hosts #list #adblock #tracker #malware #shell #script
A way to programmatically disable the "Find my device" in gapps from being a device administrator
The trick is to disable gms - which clears device admin status, and then enable it again:
Best is, to run the script at boot, with a delay - in order to kick in only after "Find my device" was reactivated and kill it for good.
Best way would be, to put it in your
Source, last (unvoted!) comment here:
https://stackoverflow.com/questions/13911444/disable-deviceadmin-from-shell
π‘ @NoGoolag
#find #findmydevice #disable #device #administrator #google #gms #script #shell #gapps
The trick is to disable gms - which clears device admin status, and then enable it again:
pm disable-user com.google.android.gms
pm enable com.google.android.gms
I know most of you don't have GApps at all on board, but still it might be useful to know.Best is, to run the script at boot, with a delay - in order to kick in only after "Find my device" was reactivated and kill it for good.
#!/system/bin/sh
(
sleep 60
pm disable-user com.google.android.gms
pm enable com.google.android.gms
) &
Commands are in a backgrounded subshell in order not to delay boot.Best way would be, to put it in your
init.d
, or execute it from Kernel Adiutor, or with Magisk boot hooks and put it in /data/adb/post-fs-data.d/
.Source, last (unvoted!) comment here:
https://stackoverflow.com/questions/13911444/disable-deviceadmin-from-shell
π‘ @NoGoolag
#find #findmydevice #disable #device #administrator #google #gms #script #shell #gapps
Forwarded from BlackBox (Security) Archiv
Fido: Full ISO Download Script (for Windows retail ISOs)
Fido is a PowerShell script that is primarily designed to be used in Rufus, but that can also be used in standalone fashion, and whose purpose is to automate access to the official Microsoft Windows retail ISO download links.
π Description
This script exists because, while Microsoft does make retail ISO download links freely and publicly available (at least for Windows 8 and Windows 10), it only does so after actively forcing users to jump through a lot of unwarranted hoops, that create an exceedingly counterproductive, if not downright unfriendly, consumer experience and that greatly detract from what people really want (direct access to ISO downloads).
As to the reason one might want to download Windows retail ISOs, as opposed to the ISOs that are generated by Microsoft's own Media Creation Tool (MCT), this is because using official retail ISOs is currently the only way to assert with absolute certainty that the OS content has not been altered. Indeed, because there only exists a single master for each of them, Microsoft retail ISOs are the only ones you can obtain an official SHA-1 for (from MSDN, if you have access to it, or from sites such as this one) allowing you to be 100% sure that the image you are using has not been corrupted and is safe to use.
π‘ How it works
The script basically performs the same operation as one might perform when visiting either of the following URLs (that is, provided that you have also changed your User-Agent browser string, since, when they detect that you are using a version of Windows that is the same as the one you are trying to download, the Microsoft web servers at these addresses redirect you away from the pages that allow you to download retail ISOs):
https://www.microsoft.com/software-download/Windows8ISO
https://www.microsoft.com/software-download/Windows10ISO
After visiting those with a full browser (Internet Explorer, running through the Invoke-WebRequest PowerShell Cmdlet), to confirm that they are accessible, the script then queries the web API from the Microsoft servers to first request the language selection available for the version of Windows selected by the user, and then request the actual download links for all the architectures available for that specific combination of version + language.
ππΌ Read more:
https://github.com/pbatard/Fido
#Fido #script #PowerShell #Rufus #Windows #download #ISO #retail
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
Fido is a PowerShell script that is primarily designed to be used in Rufus, but that can also be used in standalone fashion, and whose purpose is to automate access to the official Microsoft Windows retail ISO download links.
π Description
This script exists because, while Microsoft does make retail ISO download links freely and publicly available (at least for Windows 8 and Windows 10), it only does so after actively forcing users to jump through a lot of unwarranted hoops, that create an exceedingly counterproductive, if not downright unfriendly, consumer experience and that greatly detract from what people really want (direct access to ISO downloads).
As to the reason one might want to download Windows retail ISOs, as opposed to the ISOs that are generated by Microsoft's own Media Creation Tool (MCT), this is because using official retail ISOs is currently the only way to assert with absolute certainty that the OS content has not been altered. Indeed, because there only exists a single master for each of them, Microsoft retail ISOs are the only ones you can obtain an official SHA-1 for (from MSDN, if you have access to it, or from sites such as this one) allowing you to be 100% sure that the image you are using has not been corrupted and is safe to use.
π‘ How it works
The script basically performs the same operation as one might perform when visiting either of the following URLs (that is, provided that you have also changed your User-Agent browser string, since, when they detect that you are using a version of Windows that is the same as the one you are trying to download, the Microsoft web servers at these addresses redirect you away from the pages that allow you to download retail ISOs):
https://www.microsoft.com/software-download/Windows8ISO
https://www.microsoft.com/software-download/Windows10ISO
After visiting those with a full browser (Internet Explorer, running through the Invoke-WebRequest PowerShell Cmdlet), to confirm that they are accessible, the script then queries the web API from the Microsoft servers to first request the language selection available for the version of Windows selected by the user, and then request the actual download links for all the architectures available for that specific combination of version + language.
ππΌ Read more:
https://github.com/pbatard/Fido
#Fido #script #PowerShell #Rufus #Windows #download #ISO #retail
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
Forwarded from BlackBox (Security) Archiv
Script for getting unlimited GB on Warp+ ( https://1.1.1.1/ )
With this script, you can recharge your account indefinitely.
About warp+
WARP+ uses Cloudflareβs virtual private backbone, known as Argo, to achieve higher speeds and ensure your connection is encrypted across the long haul of the Internet.
ππΌ Read more:
https://github.com/ALIILAPRO/warp-plus-cloudflare
https://blog.cloudflare.com/announcing-warp-plus/
#cloudflare #warp #FuckCloudflare #script
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
With this script, you can recharge your account indefinitely.
About warp+
WARP+ uses Cloudflareβs virtual private backbone, known as Argo, to achieve higher speeds and ensure your connection is encrypted across the long haul of the Internet.
ππΌ Read more:
https://github.com/ALIILAPRO/warp-plus-cloudflare
https://blog.cloudflare.com/announcing-warp-plus/
#cloudflare #warp #FuckCloudflare #script
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
GitHub
ALIILAPRO/warp-plus-cloudflare
Script for getting unlimited GB on Warp+ ( https://1.1.1.1/ ) - ALIILAPRO/warp-plus-cloudflare
Forwarded from BlackBox (Security) Archiv
Generate WireGuard profile from Cloudflare Warp account
wgcf is a utility for Cloudflare Warp that allows you to create and manage accounts, assign license keys, and generate WireGuard profiles.
π‘ Features:
ππΌ Register new Cloudflare Warp device and account
ππΌ Update account to allow connection via WireGuard
ππΌ Update account with new license key, sharing Warp+ status with up to 5 devices
ππΌ Generate WireGuard profile
ππΌ Check Cloudflare device status
ππΌ Print trace information to debug Warp/Warp+ status
π» Download:
You can find pre-compiled binaries on the releases page.
https://github.com/ViRb3/wgcf/releases
ππΌ Read more:
https://github.com/ViRb3/wgcf
π Try with:
Script for getting unlimited GB on Warp+ ( https://1.1.1.1/ )
https://t.me/BlackBox_Archiv/919
#cloudflare #warp #FuckCloudflare #script
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
wgcf is a utility for Cloudflare Warp that allows you to create and manage accounts, assign license keys, and generate WireGuard profiles.
π‘ Features:
ππΌ Register new Cloudflare Warp device and account
ππΌ Update account to allow connection via WireGuard
ππΌ Update account with new license key, sharing Warp+ status with up to 5 devices
ππΌ Generate WireGuard profile
ππΌ Check Cloudflare device status
ππΌ Print trace information to debug Warp/Warp+ status
π» Download:
You can find pre-compiled binaries on the releases page.
https://github.com/ViRb3/wgcf/releases
ππΌ Read more:
https://github.com/ViRb3/wgcf
π Try with:
Script for getting unlimited GB on Warp+ ( https://1.1.1.1/ )
https://t.me/BlackBox_Archiv/919
#cloudflare #warp #FuckCloudflare #script
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
GitHub
Releases Β· ViRb3/wgcf
π€ Cross-platform, unofficial CLI for Cloudflare Warp - ViRb3/wgcf