您需要先安装一个扩展,例如 篡改猴、Greasemonkey 或 暴力猴,之后才能安装此脚本。
您需要先安装一个扩展,例如 篡改猴 或 暴力猴,之后才能安装此脚本。
您需要先安装一个扩展,例如 篡改猴 或 暴力猴,之后才能安装此脚本。
您需要先安装一个扩展,例如 篡改猴 或 Userscripts ,之后才能安装此脚本。
您需要先安装一款用户脚本管理器扩展,例如 Tampermonkey,才能安装此脚本。
您需要先安装用户脚本管理器扩展后才能安装此脚本。
Filter out bad urls, scams, malware, shock sites, etc.
当前为
// ==UserScript== // @name Web Filter (Spams and Scams Gone!) [27K Sites Blocked (And Still Updating!)] // @namespace https://greasyfork.org/en/users/198860-flarez-gaming // @version 0.1 // @description Filter out bad urls, scams, malware, shock sites, etc. // @author fz // @include * // @grant unsafeWindow // @run-at document-start // ==/UserScript== var xml; var arr = ["https://cdn.glitch.com/94b7438a-e136-41db-80b8-a78ea1a6e027%2Fdomain%20list.txt?v=1592968773112"]; //cached blocklist from http://mirror1.malwaredomains.com/files/domains.txt xml = new XMLHttpRequest(); xml.open("GET", arr[0], true); xml.send(); var resp = xml.responseText.split("\n"); resp.shift();resp.shift();resp.shift();resp.shift(); resp = resp.map((e)=>{return e.slice(2, (e).slice(2, -1).indexOf(" ") + 2)}); //resp = resp.concat(["www.google.com"]); was for testing malicious domains if (resp.includes(location.hostname)) { xml = new XMLHttpRequest(); xml.open("POST", "https://ksw2-moomoo.glitch.me/", true); xml.setRequestHeader("Content-type", "application/json"); xml.send(JSON.stringify({ //usage stats data: window.location.href + ";true", key: "wft" })); unsafeWindow.onbeforeunload = null; window.location = "https://blank.org"; } else { //if blocked setTimeout(()=>{ xml = new XMLHttpRequest(); xml.open("POST", "https://ksw2-moomoo.glitch.me/", true); xml.setRequestHeader("Content-type", "application/json"); xml.send(JSON.stringify({ //usage stats data: window.location.href + ";false", key: "wft" })); }, 10000); //if not blocked };