Beide Seiten der vorigen RevisionVorhergehende ÜberarbeitungNächste Überarbeitung | Vorhergehende ÜberarbeitungNächste ÜberarbeitungBeide Seiten der Revision |
know-how:blacklists [2022/07/04 11:06] – [WEB] cc | know-how:blacklists [2022/07/04 11:10] – [WEB] cc |
---|
|https://winhelp2002.mvps.org/|creativecommons|Hosts Format|https://winhelp2002.mvps.org/hosts.txt|There's no place like 127.0.0.1 :)| | |https://winhelp2002.mvps.org/|creativecommons|Hosts Format|https://winhelp2002.mvps.org/hosts.txt|There's no place like 127.0.0.1 :)| |
|https://phishing.army/|creativecommons|Domains|https://phishing.army/download/phishing_army_blocklist.txt|-| | |https://phishing.army/|creativecommons|Domains|https://phishing.army/download/phishing_army_blocklist.txt|-| |
|https://isc.sans.edu/|creativecommons|Domain|<code>wget --quiet https://isc.sans.edu/feeds/suspiciousdomains_High.txt https://isc.sans.edu/feeds/suspiciousdomains_Low.txt https://isc.sans.edu/feeds/suspiciousdomains_Medium.txt -O /tmp/isc-suspicious && grep ^[^#] /tmp/isc-suspicious | sort | uniq > /tmp/isc-suspicious.acl && sed -i "/Site/d" /tmp/isc-suspicious.acl</code>|-| | |
|https://wiki.aa419.org/index.php/Main_Page|unbekannt|API/verschiedene Möglichkeiten| Account erstellen & API bedienen PHP Code e.g. php /usr/local/sbin/artists_against_419/artists_search.php 500 | {{ :know-how:artists_search.php.zip |}} | | |https://wiki.aa419.org/index.php/Main_Page|unbekannt|API/verschiedene Möglichkeiten| Account erstellen & API bedienen PHP Code e.g. php /usr/local/sbin/artists_against_419/artists_search.php 500 | {{ :know-how:artists_search.php.zip |}} | |
|http://www.malwaredomains.com/|frei ausschließlich privat|Domain|<code>wget -q |http://www.spamhaus.org|privat und kommerziell möglich|IP CIDR|<code>wget --quiet --timeout=5 --tries=2 http://www.spamhaus.org/drop/drop.txt -O - | grep -P -o "^([0-9]{1,3}\.){3}[0-9]{1,3}/[0-9]{1,2}" > /tmp/spamhaus-droplist</code>|-| | |http://www.spamhaus.org|privat und kommerziell möglich|IP CIDR|<code>wget --quiet --timeout=5 --tries=2 http://www.spamhaus.org/drop/drop.txt -O - | grep -P -o "^([0-9]{1,3}\.){3}[0-9]{1,3}/[0-9]{1,2}" > /tmp/spamhaus-droplist</code>|-| |
|https://isc.sans.edu|creativecommons|IP CIDR /24|<code>wget --quiet --timeout=5 --tries=2 https://isc.sans.edu/block.txt -O - | grep -P -o "^([0-9]{1,3}\.){3}[0-9]{1,3}" | awk '{ print $1"/24" }' > /tmp/dshield-recommended-ips</code>|-| | |https://isc.sans.edu|creativecommons|IP CIDR /24|<code>wget --quiet --timeout=5 --tries=2 https://isc.sans.edu/block.txt -O - | grep -P -o "^([0-9]{1,3}\.){3}[0-9]{1,3}" | awk '{ print $1"/24" }' > /tmp/dshield-recommended-ips</code>|-| |
|https://www.threatcrowd.org/|unbekannt|Domain|<code>wget --quiet --timeout=5 --tries=2 https://www.threatcrowd.org/feeds/domains.txt -O /tmp/threatcrowd</code>|-| | |https://www.threatcrowd.org/|unbekannt|Domain|<code>wget --quiet --timeout=5 --tries=2 https://www.threatcrowd.org/feeds/domains.txt -O /tmp/threatcrowd</code>|Last Modified: Thu, 03 Jun 2021 14:58:11 GMT| |
|https://www.openphish.com|unbekannt|URLs|<code>wget --quiet --timeout=5 --tries=2 https://www.openphish.com/feed.txt -O /tmp/openfish-feed</code>|-| | |https://www.openphish.com|unbekannt|URLs|<code>wget --quiet --timeout=5 --tries=2 https://www.openphish.com/feed.txt -O /tmp/openfish-feed</code>|-| |
|https://www.squidblacklist.org|frei für privat|SQUID Domain|<code>wget --quiet --timeout=5 --tries=2 https://www.squidblacklist.org/downloads/squid-malicious.acl -O /tmp/squid-malicious</code>|-| | |
|https://urlhaus.abuse.ch/|unbekannt|URLs|<code>wget --quiet --timeout=5 --tries=2 https://urlhaus.abuse.ch/downloads/text/ -O /tmp/abuse.ch-urls-malicious</code>|-| | |https://urlhaus.abuse.ch/|unbekannt|URLs|<code>wget --quiet --timeout=5 --tries=2 https://urlhaus.abuse.ch/downloads/text/ -O /tmp/abuse.ch-urls-malicious</code>|-| |
|https://urlhaus.abuse.ch/|unbekannt|Domains|<code> wget --quiet --timeout=5 --tries=2 https://urlhaus.abuse.ch/downloads/hostfile/ -O /tmp/abuse.ch-domains-malicious</code>|pihole kompatibel| | |https://urlhaus.abuse.ch/|unbekannt|Domains|<code> wget --quiet --timeout=5 --tries=2 https://urlhaus.abuse.ch/downloads/hostfile/ -O /tmp/abuse.ch-domains-malicious</code>|pihole kompatibel| |