-
Notifications
You must be signed in to change notification settings - Fork 1k
Public blocklist
These lists can be used as filters.
The dnscrypt-proxy
source code includes a tool to fetch lists from remote locations, aggregate and optimise them, to finally build a clean blocklist that can be used with dnscrypt-proxy
.
See Combining Blocklists for more information.
https://download.dnscrypt.info/blacklists/domains/
A domain-based blocklist made by aggregating multiple public feeds. Blocks trackers, ads and malware.
Made using the above generate-domains-blacklist.py
script with the default configuration.
Updated daily and maintained by Frank Denis.
A blocklist of domains that host potentially unwanted programs (PUP) based on the malware-discoverer. Blocklist is updated twice a day.
https://gitlab.com/malware-filter/pup-filter#dnscrypt-proxy
https://github.com/CNMan/dnscrypt-proxy-config
An extensive and constantly updated set of blacklists, forwarding and cloaking rules for Chinese users.
Maintained by CNMan.
https://github.com/crazy-max/WindowsSpyBlocker/tree/master/data/dnscrypt
A set of blacklist rules to block Windows telemetry.
Updated monthly and maintained by crazy-max.
https://github.com/jfoboss/dnscrypt-domain-blacklists
Default domains-blacklist.conf with enabled RU AdList.
https://github.com/notracking/hosts-blocklists/tree/master/dnscrypt-proxy
Blocklist from actively maintained sources and automatically updated, cleaned, optimised and moderated on a daily basis.
https://github.com/StevenBlack/hosts#list-of-all-hosts-file-variants
Consolidating and extending hosts files from several well-curated sources.
A list of lists.
Designed to be set-it-and-forget-it. You should not find any false positives.
In somecases if you want to run dnscrypt-proxy as a non-root user you'll get the error "[FATAL] listen udp 0.0.0.0:53: bind: permission denied"
to solve this problem you can run the following command and allow dnscrypt to have access to a low level port :
sudo setcap cap_net_bind_service=+ep $(which dnscrypt-proxy)
- Home
- Installation
- Configuration
- Checking that your DNS traffic is encrypted
- Automatic Updates
- Server sources
- Combining blocklists
- Public Blocklist and other configuration files
- Building from source
- Run your own DNSCrypt server in under 10 minutes
- DNS stamps specifications
- Windows Tips
- dnscrypt-proxy in the media
- Planned Features