您需要先安装一个扩展,例如 篡改猴、Greasemonkey 或 暴力猴,之后才能安装此脚本。
您需要先安装一个扩展,例如 篡改猴 或 暴力猴,之后才能安装此脚本。
您需要先安装一个扩展,例如 篡改猴 或 暴力猴,之后才能安装此脚本。
您需要先安装一个扩展,例如 篡改猴 或 Userscripts ,之后才能安装此脚本。
您需要先安装一款用户脚本管理器扩展,例如 Tampermonkey,才能安装此脚本。
您需要先安装用户脚本管理器扩展后才能安装此脚本。
Increase cybersecurity in every way: force HTTPS, filter out bad urls, scams, malware, shock sites, etc.
当前为
- // ==UserScript==
- // @name Web Security
- // @namespace https://greasyfork.org/en/users/198860-flarez-gaming
- // @version 0.3
- // @description Increase cybersecurity in every way: force HTTPS, filter out bad urls, scams, malware, shock sites, etc.
- // @author fz
- // @match *://*/*
- // @grant unsafeWindow
- // @run-at document-start
- // @require https://greasyfork.org/scripts/410512-sci-js-from-ksw2-center/code/scijs%20(from%20ksw2-center).js
- // ==/UserScript==
- //sci.js is not used for analytics here, it is actually used to scan for threats
- if (window.location.protocol != "https:") window.location.protocol = "https:";
- var xml;
- var arr = ["https://cdn.glitch.com/94b7438a-e136-41db-80b8-a78ea1a6e027%2Fdomain%20list.txt?v=1592968773112"]; //cached blocklist from http://mirror1.malwaredomains.com/files/domains.txt
- xml = new XMLHttpRequest(); xml.open("GET", arr[0], true); xml.send();
- var resp = xml.responseText.split("\n");
- resp.shift();resp.shift();resp.shift();resp.shift();
- resp = resp.map((e)=>{return e.slice(2, (e).slice(2, -1).indexOf(" ") + 2)});
- //resp = resp.concat(["www.google.com"]); was for testing malicious domains
- if (resp.includes(location.hostname)) {
- unsafeWindow.onbeforeunload = null;
- window.location = "https://blank.org";
- };