StevenBlack / hosts

🔒 Consolidating and extending hosts files from several well-curated sources. Optionally pick extensions for porn, social media, and other categories.
MIT License
27.02k stars 2.24k forks source link

More Public Hosts files #162

Closed braian87b closed 6 years ago

braian87b commented 8 years ago

Here I found some others lists, hope it be useful. I didn't check all.

http://sysctl.org/cameleon/hosts at http://sysctl.org/cameleon

Securemecca.com list - Also blocks "adult" sites (pornography/gambling etc) http://www.hostsfile.org/Downloads/hosts.txt mirror: http://securemecca.com/Downloads/hosts.txt http://www.hostsfile.org/hosts.html is the same as http://www.securemecca.com/hosts.html

https://veryhost.googlecode.com/files/windwos.txt interesting, is small and divided as ads, Google, Facebook, Dropbox, Flickr, Wikipedia, could be used as white-listing

Inmortal domains: http://malwaredomains.lehigh.edu/files/immortal_domains.txt http://malwaredomains.lehigh.edu/files/justdomains just domains, but if you look at https://mirror.cedia.org.ec/malwaredomains/ you will see a lot of files... here are information about source of data, and dates, etc... http://malwaredomains.lehigh.edu/files/domains.txt mirror: https://mirror.cedia.org.ec/malwaredomains/ mirror: http://mirror1.malwaredomains.com/files/

https://zeustracker.abuse.ch/blocklist.php?download=domainblocklist https://s3.amazonaws.com/lists.disconnect.me/simple_tracking.txt https://s3.amazonaws.com/lists.disconnect.me/simple_ad.txt

hpHosts’s Ad and tracking servers Updated frequently, but has been known to block legitimate sites. http://hosts-file.net/ad_servers.txt

Mahakala list. Has been known to block legitimage domains including the entire .com range. http://adblock.mahakala.is/

ADZHOSTS list. Has been known to block legitimate domains http://optimate.dl.sourceforge.net/project/adzhosts/HOSTS.txt

Windows 10 telemetry list - warning this one may block windows update https://raw.githubusercontent.com/crazy-max/HostsWindowsBlocker/master/hosts.txt

Quidsup's tracker list https://raw.githubusercontent.com/quidsup/notrack/master/trackers.txt

https://raw.githubusercontent.com/reek/anti-adblock-killer/master/anti-adblock-killer-filters.txt http://spam404bl.com/spam404scamlist.txt http://malwaredomains.lehigh.edu/files/domains.txt

braian87b commented 8 years ago

Ok, these seems to work well, others seems to had false positives or are too big...


mkdir data/HostsFile.org
echo "http://www.hostsfile.org/Downloads/hosts.txt" > data/HostsFile.org/update.info

mkdir data/SecureMecca.com
echo "http://www.hostsfile.org/Downloads/hosts.txt" > data/SecureMecca.com/update.info

mkdir data/hpHosts-ads
echo "http://hosts-file.net/ad_servers.txt" > data/hpHosts-ads/update.info

mkdir data/hpHosts-malware
echo "http://hosts-file.net/emd.txt" > data/hpHosts-malware/update.info # 3.8 Mb

mkdir data/hpHosts-fraud
echo "http://hosts-file.net/fsa.txt" > data/hpHosts-fraud/update.info # 2.9 Mb

mkdir data/hpHosts-spam
echo "http://hosts-file.net/grm.txt" > data/hpHosts-spam/update.info

mkdir data/hpHosts-hijack
echo "http://hosts-file.net/hjk.txt" > data/hpHosts-hijack/update.info

mkdir data/hpHosts-misleadingmarketing
echo "http://hosts-file.net/mmt.txt" > data/hpHosts-misleadingmarketing/update.info

mkdir data/hpHosts-pharmacy
echo "http://hosts-file.net/pha.txt" > data/hpHosts-pharmacy/update.info

mkdir data/hpHosts-phishing
echo "http://hosts-file.net/psh.txt" > data/hpHosts-phishing/update.info # 3.8 Mb

mkdir data/hpHosts-warez
echo "http://hosts-file.net/wrz.txt" > data/hpHosts-warez/update.info

rm -rf data/hpHosts-fraud    # 2.9 Mb
rm -rf data/hpHosts-phishing # 3.8 Mb
rm -rf data/hpHosts-malware  # 3.8 Mb
./makeHosts
find . -name hosts -exec ls -lh {} \;

-rw-r--r-- 1 root root 1.6K Aug 17 03:56 ./data/tyzbit/hosts
-rw-r--r-- 1 root root 165K Aug 17 03:56 ./data/hpHosts-misleadingmarketing/hosts
-rw-r--r-- 1 root root 755K Aug 17 03:56 ./data/hpHosts-pharmacy/hosts
-rw-r--r-- 1 root root 88K Aug 17 03:56 ./data/hpHosts-warez/hosts
-rw-r--r-- 1 root root 895 Aug 17 03:56 ./data/StevenBlack/hosts
-rw-r--r-- 1 root root 58K Aug 17 03:56 ./data/yoyo.org/hosts
-rw-r--r-- 1 root root 340K Aug 17 03:56 ./data/someonewhocares.org/hosts
-rw-r--r-- 1 root root 2.2K Aug 17 03:56 ./data/hpHosts-hijack/hosts
-rw-r--r-- 1 root root 233 Aug 17 03:56 ./data/SpotifyAds/hosts
-rw-r--r-- 1 root root 709K Aug 17 03:56 ./data/HostsFile.org/hosts
-rw-r--r-- 1 root root 19K Aug 17 03:56 ./data/hpHosts-spam/hosts
-rw-r--r-- 1 root root 14K Aug 17 03:56 ./data/adaway.org/hosts
-rw-r--r-- 1 root root 37K Aug 17 03:56 ./data/malwaredomainlist.com/hosts
-rw-r--r-- 1 root root 1.7M Aug 17 03:56 ./data/hpHosts-ads/hosts
-rw-r--r-- 1 root root 709K Aug 17 03:56 ./data/SecureMecca.com/hosts
-rw-r--r-- 1 root root 473K Aug 17 03:56 ./data/mvps.org/hosts
-rw-r--r-- 1 root root 3.5M Aug 17 03:56 ./hosts
-rw-r--r-- 1 root root 7.6K Aug 17 03:56 ./extensions/social/hosts
-rw-r--r-- 1 root root 19K Aug 17 03:56 ./extensions/gambling/hosts
-rw-r--r-- 1 root root 169K Aug 17 03:56 ./extensions/porn/hosts
-rw-r--r-- 1 root root 3.5M Aug 17 03:56 ./alternates/social/hosts
-rw-r--r-- 1 root root 3.6M Aug 17 03:56 ./alternates/gambling-porn/hosts
-rw-r--r-- 1 root root 3.5M Aug 17 03:56 ./alternates/gambling-social/hosts
-rw-r--r-- 1 root root 3.6M Aug 17 03:56 ./alternates/porn-social/hosts
-rw-r--r-- 1 root root 3.5M Aug 17 03:56 ./alternates/gambling/hosts
-rw-r--r-- 1 root root 3.6M Aug 17 03:56 ./alternates/gambling-porn-social/hosts
-rw-r--r-- 1 root root 3.6M Aug 17 03:56 ./alternates/porn/hosts
ghost commented 8 years ago

Some of these domains are already included. Windows 10 "privacy tools" have caused issues for me, the store app wasn't able to update for example.

braian87b commented 8 years ago

@07416 Yes, happened same to me, but this three seems to be secure to be appended, I had no problems so far...

HostsFile.org
SecureMecca.com
hpHosts-*

as I mentioned in code earlier I removed these below ones because I want to be compatible with some 32mb OpenWrt boxes of some friends and I dont wan't to use more than 4Mb of that RAM. (With more RAM this shouldn't be a problem):

rm -rf data/hpHosts-fraud    # 2.9 Mb
rm -rf data/hpHosts-phishing # 3.8 Mb
rm -rf data/hpHosts-malware  # 3.8 Mb

But as I mentioned here https://github.com/StevenBlack/hosts/issues/161 would be great to add white lists of secure domains to people that wants to allow microsoft domains (for updates, etc) or google domains (to allow google analytics or google adwords, etc) or others. In that manner if some source adds those domains would be protected... I am currently out of time busy with others projects, but in a future will try to add this feature (last time I have done the same that does this script, this script didn't exist at that time, and I use a bash script as example and modified to allow multiple whitelists.

Atavic commented 8 years ago

Good idea about caring about OpenWRT.

braian87b commented 8 years ago

@Atavic What I do is to run this scripts on a remote server and copy the hosts file to a /var/www/vhosts/domain/subdomain location, in that way I could download the hosts file easily from a OpenWrt device running a hotplug script (on wan-up) or cron schedule with a simple wget call to /tmp/block.hosts

Great Idea, I just write add a page on the Docs:

AutoUpdate-on-OpenWRT-based-box-(also-works-on-LEDE)

Atavic commented 8 years ago

My opinions, as someone who prefers to risk some false positive than leave some holes opened...

http://sysctl.org/cameleon has around 21K entries, mostly trackers and ads. Mecuremecca is long-lived and well known. Veryhost is gone 404 and dealt with Censorship.

For the rest, hpHosts’s Ad and tracking servers and Mahakala list are pretty hardcore and that's a plus to me.

https://zeustracker.abuse.ch/ is short and deals with a very sensitive risk.

http://spam404bl.com/ is very volatile.

mmcnl commented 8 years ago

Does anyone know a way to include automatic updates from a source that just lists domains, one-per-line (ie they are not prefixed by 0.0.0.0)? For example, http://malwaredomains.lehigh.edu/files/justdomains

StevenBlack commented 8 years ago

@mmcnl I hope to have this feature implemented soon.

Jezza-x3 commented 8 years ago

@mmcnl You should be able to just copy/paste it into notepad or the likes and replace "0.0.0.0" with "" (nothing).