This is a collection of filterlists made by me (iam-py-test).
Feel free to use any and all of them (they are under CC0) in uBlock Origin, AdGuard, AdBlock Plus (special version required), or in any other way (i.e. PiHole, /etc/hosts)
Please report any issues you have and I will try to fix them; please note I may not reply within the day the issue is posted as I am often busy.
Thank you to all the people in https://github.com/iam-py-test/my_filters_001/blob/main/CONTRIBUTORS.md for helping improve these filters.
The malicious website blocklist should now work in AdGuard on Windows. Please try it out (especially in AdGuard on Mac, iOS, and Android as I lack the ability to test those versions) and report any bugs. Make sure you are using the designated version
Please note! I am only one person, and I do not have much time to dedicate to this project. These lists don't get updated as often as they should, and I'm sorry.
- The malicious website blocklist (antimalware.txt) (Subscribe) (Without iam-py-test's anti-PUP list included)
- DuckDuckGo Clean up (duckduckgo-clean-up.txt) - Generated from The malicious website blocklist and iam-py-test's anti-PUP list
- Brave Search Clean up (brave-clean-up.txt) - Generated from The malicious website blocklist and iam-py-test's anti-PUP list
- Everything in the Alternative list formats folder
- The Malicious Website Blocklist lite
- My anti-Facebook list
- Anti-Norton tracking list HOSTs file (anti-norton-tracking.txt)
- iam-py-test's Discord cleanup list (discord_cleanup.txt)
- DuckDuckGo Additional Cleanup (duckduckgo_extra_clean.txt)
- Anti-Dynamic DNS (antidynamicdns.txt)
- IP Lookup service blocklist (antiiplookup.txt)
- Anti-typosquatting list (antitypo.txt)
- Anti-redirectors list (anti-redirectors.txt)
- My anti-rickroll list (anti-rickroll-list.txt)
- The clickbait blocklist (clickbait.txt) (Subscribe)
- My Enhanced Protection list (Warning: This list is pretty much unmaintained and very poorly thought out)
- Annoyances (annoyances.txt)
- Everything in the Sandbox folder
- The useless filter list (useless-list.txt)
- test_filter.txt
- Pornography Blocklist (porn.txt) (Subscribe to this dead list)
- The device privacy list (device_privacy.txt)
- Anti-cookie-consent and paywalls list (anti-cookie+sign up.txt)
- Google Safe Browsing reverse-engineered
- Microsoft Smart Screen reverse-engineered
- trojan_protection_list.txt
- Anti-over-promoted Windows antivirus list (could not find enough instances of this that would not break legitimate websites)
- anti-cookie+sign up_extention.txt (had one purpose - to work with my custom scriptlets - but the website it was intended to work for changed cookie values to quickly for it to work)
- "Personal filters" (iam-py-test.txt)
- "Lockdown mode" This list has an extremely specific purpose, and SHOULD NOT BE USED.
- TLD blocking lists (more information)
- Anti-'page visit counter' list
- Anti-'ip lookup' list
The filters in the Alternative list formats folder are versions of some of the lists above for different software. These are auto-generated, and thus updates to them must be made to the original list or the Python script which generates them.
Everything not listed above, like the filters in the Personal folder, is either completely forgotten by me, or is likely to break websites due to its purpose or lack of regulation.
- HOSTs format - https://raw.githubusercontent.com/iam-py-test/my_filters_001/main/Alternative%20list%20formats/antimalware_hosts.txt
- Domains only - https://raw.githubusercontent.com/iam-py-test/my_filters_001/main/Alternative%20list%20formats/antimalware_domains.txt
- IP Addresses only - https://raw.githubusercontent.com/iam-py-test/my_filters_001/main/Alternative%20list%20formats/antimalware_ips.txt
- AdGuard Windows/MacOS (beta) - https://raw.githubusercontent.com/iam-py-test/my_filters_001/main/Alternative%20list%20formats/antimalware_adguard_app.txt
- AdGuard Home (untested) - https://raw.githubusercontent.com/iam-py-test/my_filters_001/main/Alternative%20list%20formats/antimalware_adguard_home.txt
- dnsmasq (untested) - https://raw.githubusercontent.com/iam-py-test/my_filters_001/main/Alternative%20list%20formats/antimalware_dnsmasq.txt
- JSON - https://raw.githubusercontent.com/iam-py-test/my_filters_001/main/Alternative%20list%20formats/antimalware_json.json
- HOSTs format (no comments) - https://raw.githubusercontent.com/iam-py-test/my_filters_001/main/Alternative%20list%20formats/antimalware_pure_hosts.txt
- AdBlock Plus format (not recommended) - https://raw.githubusercontent.com/iam-py-test/my_filters_001/main/Alternative%20list%20formats/antimalware_abp.txt
- AdBlock Plus format - https://raw.githubusercontent.com/iam-py-test/my_filters_001/main/Alternative%20list%20formats/clickbait_abp.txt
- Domains only - https://raw.githubusercontent.com/iam-py-test/my_filters_001/main/Alternative%20list%20formats/clickbait_domains.txt
- HOSTs format - https://github.com/iam-py-test/my_filters_001/blob/main/Alternative%20list%20formats/porn_hosts.txt
- AdBlock Plus format - https://github.com/iam-py-test/my_filters_001/blob/main/Alternative%20list%20formats/porn_abp.txt
- Domains only (i.e., PiHole) - https://github.com/iam-py-test/my_filters_001/blob/main/Alternative%20list%20formats/porn_domains.txt
- Pure (no comments) HOSTs format - https://github.com/iam-py-test/my_filters_001/blob/main/Alternative%20list%20formats/porn_pure_hosts.txt
- pallebone's PersonalPiholeListsPAllebone uses the domains version of the malicious website blocklist
- eded333's TheF*ckingList uses the uBlock Origin version of the malicious website blocklist and the Anti-Norton Tracking list
- hagezi's DNS Blocklists use the domains version of the malicious website blocklist
- The oisd blocklist includes my antitypo list in their full list, and my Porn blocklist in their NSFW list
These are not endorsements.
- The DuckDuckGo Clean Up list is auto-generated from duckduckgo-clean-up.template and the domains/ips versions of The malicious website blocklist. Changes in Pull Requests should be made to The malicious website blocklist or to the Python script.
- Like above, The Brave Search Clean Up list is auto-generated from brave-clean-up.template and the domains/ips versions of The malicious website blocklist. Changes in Pull Requests should be made to The malicious website blocklist or the Python script.
- Google Safe Browsing reverse engineered and Microsoft Smartscreen reverse engineered are not intended as lists of known malware domains, instead they are lists of domains/urls which are blocked by those services in an attempt to understand them and provide some of their protection to users of other browsers. They are also rarely updated
- All the up-to-date HOSTs versions use 0.0.0.0 instead of 127.0.0.1, as per #87
- The domains_lite and hosts_lite versions are unmaintained as they took too much time to create and the script(s) which made them have been lost to history, however, the antimalware_lite is not.
- The malicious website blocklist - uBlock Origin extension should not be installed on its own as it is designed only to be included in The malicious website blocklist.