Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Blocklist Suggestion: invisiblethreat openphish-pihole #223

Open
KnightmareVIIVIIXC opened this issue Feb 26, 2025 · 0 comments
Open

Blocklist Suggestion: invisiblethreat openphish-pihole #223

KnightmareVIIVIIXC opened this issue Feb 26, 2025 · 0 comments

Comments

@KnightmareVIIVIIXC
Copy link

KnightmareVIIVIIXC commented Feb 26, 2025

Developer Lists Homepage
invisiblethreat openphish https://github.com/invisiblethreat/openphish-pihole

openphish-pihole

Details

Using the feed at https://openphish.com/phishing_feeds.html to generate a Pihole compatible blocklist that is updated twice-daily. This matches the update cadence of the upstream feed.

Processing

The upstream list is URLs, and upon examination, regardless of the path, there is value in blocking the entire domain. The one known class of false-positive that is created when extracting the domain from the URL is URL shorteners, like bit.ly. This is acceptable for the conferred protection and is not corrected for at this time. Permitting URL shorteners explicitly will overcome this.

Expiry

The feed is currently configured to retain all domains for 180 days. metadata.json is useful for understanding the age and last observation of the domain in question.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant