All Projects → CHEF-KOCH → Nsablocklist

CHEF-KOCH / Nsablocklist

Licence: other
HOSTS file and research project to block all known NSA / GCHQ / C.I.A. / F.B.I. spying server

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Nsablocklist

Raccoon
A high performance offensive security tool for reconnaissance and vulnerability scanning
Stars: ✭ 2,312 (+266.98%)
Mutual labels:  hacking, information-gathering
Webkiller
Tool Information Gathering Write By Python.
Stars: ✭ 300 (-52.38%)
Mutual labels:  hacking, information-gathering
Thechoice
The linux choice collection tools
Stars: ✭ 245 (-61.11%)
Mutual labels:  hacking, information-gathering
Scilla
🏴‍☠️ Information Gathering tool 🏴‍☠️ DNS / Subdomains / Ports / Directories enumeration
Stars: ✭ 116 (-81.59%)
Mutual labels:  hacking, information-gathering
Vault
swiss army knife for hackers
Stars: ✭ 346 (-45.08%)
Mutual labels:  hacking, information-gathering
Intelspy
Perform automated network reconnaissance scans
Stars: ✭ 134 (-78.73%)
Mutual labels:  hacking, information-gathering
Osmedeus
Fully automated offensive security framework for reconnaissance and vulnerability scanning
Stars: ✭ 3,391 (+438.25%)
Mutual labels:  hacking, information-gathering
Pentesting Bible
Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+1325.56%)
Mutual labels:  hacking, information-gathering
Billcipher
Information Gathering tool for a Website or IP address
Stars: ✭ 332 (-47.3%)
Mutual labels:  hacking, information-gathering
Vajra
Vajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for multiple target during web applications penetration testing.
Stars: ✭ 269 (-57.3%)
Mutual labels:  hacking, information-gathering
Ctfr
Abusing Certificate Transparency logs for getting HTTPS websites subdomains.
Stars: ✭ 1,535 (+143.65%)
Mutual labels:  hacking, information-gathering
Favfreak
Making Favicon.ico based Recon Great again !
Stars: ✭ 564 (-10.48%)
Mutual labels:  hacking, information-gathering
Deadtrap
An OSINT tool to gather information about the real owner of a phone number
Stars: ✭ 73 (-88.41%)
Mutual labels:  hacking, information-gathering
Zeebsploit
web scanner - exploitation - information gathering
Stars: ✭ 159 (-74.76%)
Mutual labels:  hacking, information-gathering
Sandmap
Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.
Stars: ✭ 1,180 (+87.3%)
Mutual labels:  hacking, information-gathering
Crips
IP Tools To quickly get information about IP Address's, Web Pages and DNS records.
Stars: ✭ 272 (-56.83%)
Mutual labels:  hacking, information-gathering
Dracnmap
Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes with lots of options that can make the utility more robust and difficult to follow for new users. Hence Dracnmap is designed to perform fast scaning with the utilizing script engine of nmap and nmap can perform various automatic scanning techniques with the advanced commands.
Stars: ✭ 861 (+36.67%)
Mutual labels:  hacking, information-gathering
Vulnx
vulnx 🕷️ is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of cms { `wordpress , joomla , drupal , prestashop .. `}
Stars: ✭ 1,009 (+60.16%)
Mutual labels:  hacking, information-gathering
Osintgram
Osintgram is a OSINT tool on Instagram. It offers an interactive shell to perform analysis on Instagram account of any users by its nickname
Stars: ✭ 312 (-50.48%)
Mutual labels:  hacking, information-gathering
Badkarma
network reconnaissance toolkit
Stars: ✭ 353 (-43.97%)
Mutual labels:  hacking, information-gathering

NSABlocklist© project original created under the ISC license 2015 - present by CHEF-KOCH.

Matrix Twitter Follow Discord

Project Overview

This isn't yet another hosts file or DNSBL that claims to secure the web, it's specially designed to stop known NSA / GCHQ / C.I.A. or F.B.I. servers from being connecting to you without permission, of course the IPs also can be used for Bot Revolt or other tools. The list is not designed to block common malware, spyware/ads or anything that is already available on the net via a proper designed hosts for such special case. This hosts or the super ranges lists could block some of your sites/servers you may need, so you'll be warned!

My list is original based on 2007 published Wikileaks + Cryptome documents and includes my own modifications from 2008, 2012, 2014, 2015, 2019 & 2020.

Current Status: 2,45 Mio files (not everything upload [yet]). I need to wait for GitHub approval in order to bulk upload bigger file set (100MB+ files).

Mass surveillance is official illegal

According to EGMR mass surveillance is now official against human rights.

You still can help keep the fight up against any surveillance programs!

This project includes

  • A 'HOSTS' file that includes all Servers/DNS domains that are known to be involved in spying. The confirmation is given within the Research link(s) at the bottom and with my own tests.
  • An 'Super Ranges.txt' file which includes a list of known IP ranges that are compromised (be careful with that!).
  • An 'LICENSE' File to shows the MIT license.
  • The 'README' (this) file that includes the latest news, updates and explanations,...
  • An 'problematic.txt' file which includes DNS/PTRs that are possible problematic for you.
  • The 'Mail.txt' file in case you want to speak with me over encrypted email.
  • An 'test' folder for IPv6 only domains. It also contains an 'html' folder for html formatted entries, an 'onion' folder for suspect or faked .onions and an 'Tor' folder for a quick guide how to run an non-exit relay in around 10 minutes.
  • The 'References.txt' which contains relevant information about spying or additional topics which may related to reveal surveillance.
  • Under the release page you will find complete collections/dumps.
  • Information on hardware based attacks.

Any problems, questions or something wrong?

  • Feel free to open an issue ticket and I will look at it asap. I will reject all requests/discussions without any evidence.

Pull requests or ideas are in general always welcome!

Important Project Notice

  • I do not accept donations in this project, I'm not doing this because I want money, I'm doing this because I didn't found a proper list on the entire Internet and of course I want to share my knowledge with everyone for free. I always think that such information should be available for everyone on the world.
  • The project has no political orientation, there will be no political leaks/information since this is not the main mission here.
  • Please keep in mind that updates/encryption/knowledge is our only real weapon against NSA and other agencies. The more you know the better you can build strategies and new systems to defeat mass surveillance.
  • Please keep in mind that links to e.g. videos aren't valid because there (in most cases) doesn't include a source, date or author. Any information without proper research in it will automatically rejected and labeled as 'invalid' since it's impossible to verify if it's a legimate leak or not.

Do you hate the NSA or other agencies?

  • I do not hate the NSA or other agencies but I really don't like that everyone is automatically under the microscope (mass surveillance) and of course that there is no 'opt-out' or transparency except lies and more lies (and some excuses ...yeah, we are doing this because terrorism, go f$ck yourself with such statements!)
  • Everyone have something to hide, passwords, private data, accounts, other meta-data, [...]

Known Project / HOST problems

  • An HOSTS file is no guarantee that if the NSA is already 'in your system/network' - to protect you - it's just too late.
  • HOSTS files are no guarantee that NSA or any other attacker/organization could simply bypass it via 0day or other vulnerabilities on your system/router.
  • HOSTS files can't protect against attacks directly in hardware, e.g. if the router is already compromised or comes with backdoors this list will be easily bypassed anyway.
  • Due the complex of the entire file I can't explain every single IP/Domain/PTR record. If something was changed, feel free to open a pull request or send me an eMail.
  • The HOSTS file may present an attack vector for malicious software because the file could be modified to redirect the entire traffic e.g. adware/trojans can do this. Ensure that the file was marked as read-only and you're not logged in as administrator.
  • Trace-route analysis especially on IPv4 networks are sometimes outdated (due the mass of requests).
  • Be careful when blocking IP addresses, as IP addresses change frequently and can block people you don't intend to block.
  • NSA and other agencies can spy on traffic directly from supercomputers like infamous Echelon connected directly to some backbone without revealing any IP. This is an common problem, only strong and proper implemented encryption helps.

Programs + Websites to inspect monitoring & capture data traffic

Anti-DPI (Deep packet inspection (DPI)) tools & projects

NSA Resources and public program(s)

Project History

  • [x] 07.05.2020 IPfilter & VPN suggestion updated
  • [x] 01.07.2019 Added some Anti-DPI programs.
  • [x] 27.11.2018 NordVPN audit leaked.
  • [x] 04.06.2018 Add Anti-NSA project list.
  • [x] 03.06.2018 Ipfilter update, Amazon list finally fully merged.
  • [x] 06.05.2018 Readme updates, pdf section sorted, new PDF files updated. Project Status added, several other minor changes.
  • [x] 05.05.2018 Ipfilter update.
  • [x] 22.03.2018 Bitcoing (Blockchain) tracking documents (revealed by E.S.) added
  • [x] 21.01.2018 Intel, AMD, Trusted Computing papers added among Vault 8 (Hive) source and documentation
  • [x] 30.01.2016 Video section added, official guidance from nsa.gov added + an section for future tips
  • [x] 15.09.2015 Separate the into his own References.txt file (list was also updated)
  • [x] 04.09.2015 Added Ipv6 list, sort the test lists in his own cat.
  • [x] 02.09.2015 Added 'Snowden documents compilations'
  • [x] 19.08.2015 Added Backbone Providers and other involved services
  • [x] 18.08.2015 More domains added 7821 in total
  • [x] 16.08.2015 Removed some duplicates and added new domains, small Readme.md changes
  • [x] 15.08.2015 Created a new start page chef-koch.github.io/NSABlocklist
  • [x] 14.08.2015 Initial upload of the entire project and small Readme.md corrections

Edward Snowden documents compilations

Edward Snowden never leaked all documents! I demand that he release all of the files.

Anti-NSA programs, resources & networks

NSA has (officially) stopped collecting location data from US cellphones without a warrant

Intelligence agencies stopped the practice last year.

Known compromised ISP Providers

Compromised ISP's (needs more research and evidence)

  • Easybell
  • L8NT
  • Charter
  • Suddenlink

ISP which are known to fight for privacy and a free internet

  • Bahnhof (Swedish)
  • Sonic (US)

Blockchain monitoring projects

  • OAKSTAR (sub-project MONKEYROCKET)
  • SHIFTINGSHADOW
  • ORANGECRUSH
  • YATCHSHOP
  • ORANGEBLOSSOM
  • SILVERZEPHYR
  • BLUEZEPHYR
  • COBALTFALCON

Video Resources

Tips directly provided by nsa.gov

Compromised Backbone Providers

  • AT&T
  • ATM S.A.
  • Cable & Wireless
  • Global Crossing
  • Comcast
  • Cox Communications
  • Sprint Nextel
  • Level 3 / Level 2 / Level 1
  • NTT Communications
  • SAVVIS Communications
  • Net By Net Holding LLC
  • Verizon Communications
  • ATM-Telekom
  • IBM

VPN providers which aren't secure, logging or selling your data to 3rd-parties

Known to be compromised or spying

  • Hola (might sells data, according to their privacy policy)
  • HotSpotShield
  • Hide My Ass
  • ProXPN
  • PureVPN (proof)
  • EarthVPN
  • Betternet
  • Slickvpn (keeps logs)
  • IPVanish (keeps logs)
  • Opera VPN (might sells data, according to their privacy policy)
  • Psiphon (might sells data, according to their privacy policy)
  • Onavo Protect (might sells data, according to their privacy policy)
  • ZPN (might sells data, according to their privacy policy)
  • HoxxVPN (might sells data, according to their privacy policy)
  • FinchVPN (might sells data, according to their privacy policy)
  • TouchVPN (might sells data, according to their privacy policy)
  • TurboVPN
  • VPN Proxy Master
  • Snap VPN
  • X-VPN 5M
  • VPN 360 1M
  • VPN – Super Unlimited Proxy
  • Free VPN by FreeVPN.org
  • Secure VPN
  • VPN – Master Proxy
  • HotspotVPN
  • SkyVPN
  • VPN Patron
  • VPN for iPhone
  • YogaVPN
  • VPN Guru
  • Hola
  • Hotspot Shield
  • Betternet
  • TouchVPN
  • Shield VPN
  • VPN Wifi Proxy Security Master
  • Victory VPN
  • Storm VPN (unclear)
  • SuperVPN Free VPN Client
  • VPN Private
  • Thunder VPN
  • VPN Melon
  • Super VPN
  • #VPN
  • Psiphon
  • AnchorFree
  • StackPath
  • Avast (owns three brands: HideMyAss, Avast Secureline VPN, AVG Secure VPN, and Zen VPN)
  • Kape and Gaditek
  • NordVPN (compromised)

Controversial

Based on the following review these VPN services are marked as controversial.

  • Opera VPN
  • Hoxx VPN
  • Betternet
  • Hola VPN
  • SecureVPN
  • Ace VPN
  • VPN Unlimited
  • Ra4w VPN
  • Speedify
  • AzireVPN
  • Ivacy
  • BTGuard VPN
  • Zenmate
  • DotVPN
  • VPN.ht
  • F-Secure Freedome
  • Kaspersky VPN
  • Anonymizer VPN
  • Norton Wifi Privacy
  • SurfEasy
  • Encrypt Me
  • TigerVPN
  • AVG VPN
  • PureVPN
  • HideMyAss!
  • Browsec VPN
  • BitDefender VPN
  • Hide All IP
  • ProxPN
  • ZoogVPN
  • VPN ac
  • OneVPN
  • Cactus VPN
  • SaferVPN
  • SpyOFF
  • VPNTunnel
  • SwitchVPN
  • VyprVPN
  • Buffered
  • BolehVPN
  • Avira Phantom
  • PrivateTunnel
  • HotSpot Shield
  • LiquidVPN
  • TunnelBear
  • PrivateVPN
  • StrongVPN
  • SlickVPN
  • Astrill VPN
  • FrootVPN
  • VPNArea
  • Goose VPN
  • Celo VPN
  • PersonalVPN
  • AirVPN
  • AnonymousVPN.org
  • Avast Secureline
  • IVPN
  • TorGuard
  • FastestVPN
  • BlackVPN
  • VPNSecure Me
  • WindScribe
  • ibVPN (almost no servers)
  • Trust Zone
  • CyberGhost
  • Betternet VPN

VPN providers who claim to keep no logs

The claim is made via Interviews & privacy policy inspection, more details are here.

  • AirVPN
  • Avira
  • AzireVPN
  • BolehVPN
  • CactusVPN
  • CyberGhost
  • ExpressVPN
  • HeadVPN
  • Hide.me
  • HideIPVPN
  • ibVPN
  • IVPN
  • Mullvad
  • NordVPN
  • OVPN
  • Perfect Privacy
  • Private Internet Access
  • PrivateVPN
  • ProtonVPN
  • SlickVPN
  • Surfshark
  • SwitchVPN
  • TorGuard
  • Trust.Zone
  • VPN.ac
  • VPNArea
  • VPNhub
  • WhatTheServer
  • Windscribe

VPN Recommendation:

Worth to read, VPN Guide: Legality, Jurisdictions & Internet Censorship

See here for a more detailed comparison chart - keep in mind that this chart is not 100% correct but since everyone can submit findings it's more or less reliable.

Other services providers + social media platforms

  • Facebook
  • PushTalk / PalTalk
  • Google Inc. alias Alphabet
  • Amazon
  • MySpace
  • Google+
  • Microsoft
  • Apple
  • Wikipedia, well it's for all
  • Automattic, Inc
  • LLC
  • Yahoo
  • Twitter (FBI records)
  • Cookie based tracking - NSA uses advertisers’ cookies to track specific web browsers

Official Government mass surveillance projects & laws

Mass surveillance projects

Surveillance by Law

Known compromised Hardware with Malware or/and Backdoors

(Official) Discontinued surveillance programs projects

  • U.S. Terrorist Surveillance Program
  • Multistate Anti-Terrorism Information Exchange (MATRIX)
  • ThinThread
  • Trailblazer Project
  • Customer Proprietary Network Information / CPNI (metadata) - can be deactivated on Android 5.1+ and e.g. Wifi networks

European Union

  • Data Retention Directive
  • INDECT
  • Schengen Information System

Australia

  • Status: unclear, needs confirmation + evidence

China

  • Golden Shield Project
  • Monitoring Bureau -> Status: unclear, needs confirmation + evidence
  • Public Information Network Security -> Status: unclear, needs confirmation + evidence

Korea

France

  • Frenchelon

Germany

  • Nachrichtendienstliches Informationssystem
  • Project 6
  • RAMPART-A with BND / NSA (needs more evidence)

India

  • Central Monitoring System (CMS)
  • DRDO NETRA
  • NATGRID

Russia

  • SORM
  • Yarovaya Law
  • other systems rumored - Status: unclear, needs confirmation + evidence

Sweden

  • Titan traffic database
  • X-Keyscore

Switzerland

  • Onyx

United Kingdom

  • Impact Nominal Index
  • Interception Modernisation Programme
  • Mastering the Internet (MTI)
  • UK National DNA Database (NDNAD)
  • Tempora
  • Royal Concierge

United States

  • Boundless Informant (needs confirmation)
  • BULLRUN
  • Carnivore
  • Comprehensive National Cybersecurity Initiative
  • DCSNet
  • Fairview
  • Financial Crimes Enforcement Network
  • ICREACH
  • Magic Lantern (needs confirmation)
  • Main Core
  • MAINWAY
  • Media monitoring services
  • MUSCULAR
  • MYSTIC
  • Nationwide Suspicious Activity Reporting Initiative
  • NSA ANT catalog
  • PRISM
  • Room 641A via AT&T
  • Sentry Eagle
  • Special Collection Service
  • Stellar Wind (code name)
  • Tailored Access Operations
  • Terrorist Finance Tracking Program
  • Turbulence (NSA)
  • US Intelligence Community (IC)
  • Utah Data Center
  • X-Keyscore

Possible Iran (unconfirmed + needs more evidence)

  • GhostNet
  • Stuxnet

Spying programs

  • Traceroute "Packaged Goods" / "Treasure Map"
  • VOIP: Hammerchant
  • WEALTHYCLUSTER
  • APEX
  • COMSAT
  • IRRITANT HORN (hijacks Google Play Store contained apps)
  • HACIENDA

Hardware Recommendations

Software Recommendations and defense steps Checklist

THANK YOU!

A special thanks goes to everyone who fights for internet security & privacy!

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].