A stealth URL toolkit optimized for bypassing censorship filters and/or dropping malware
A utility for private redirects and proxies that disappear after certain conditions are met.
A live demo is available at this dangerous.link.
The blacklist syntax is similar to that of gitignore. An optional prefix !
which negates the pattern can be used for whitelisting.
*
] (Useful for creating a whitelist)203.0.113.6
or 2001:db8::68
]192.0.2.0/24
or ::1/128
]crawl-66-249-66-1.googlebot.com
]~ .*\.cox\.net
]@ 39.377297 -74.451082 (7km)
]db datacenters
or db tor
]For example to only allow from local:
# This strange blacklist only allows access from localhost and google bots
*
! ::1 # Allow localhost
! ~ .*\.google(bot)?\.com$
A @
prefix is for targeted geofencing, i.e., @ lat lng (optional radius)
. The default radius is 25m. For example to block Atlantic City:
@ 39.377297 -74.451082 (7km)
Unit | Symbol |
---|---|
meter | m |
kilometer | km |
mile | mi |
feet | ft |
A ~
prefix indicates a hostname regular expression match.
shady.com
~ (.*)\.shady\.com # Block subdomains of shady
A rule that begins with "db
" will be matched with a database by name, e.g.,
!db tor
to whitelist Tor exit nodes. The database file must be specified in
the config.
ipcat:
cloudflare: cloudflare.csv
datacenters: datacenters.csv
tor: torexitnodes.csv
The format of the CSV file is specified by ipcat rules.