2020-07-05 10:46:19 +00:00
|
|
|
#!/bin/sh
|
|
|
|
|
|
|
|
set -efux -o pipefail
|
|
|
|
|
|
|
|
## Detect Musl C library
|
|
|
|
LIBC="$(ldd /bin/ls | grep 'musl' || [ $? = 1 ])"
|
|
|
|
if [ -z "$LIBC" ]; then
|
|
|
|
rm -f "/tmp/musl.log"
|
|
|
|
# Not Musl
|
|
|
|
CSVQUOTE="../utils/csvquote-bin-glibc"
|
|
|
|
else
|
|
|
|
# Musl
|
|
|
|
CSVQUOTE="../utils/csvquote-bin-musl"
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
|
|
## Create a temporary working folder
|
|
|
|
mkdir -p "tmp/"
|
|
|
|
cd "tmp/"
|
|
|
|
|
|
|
|
## Prepare datasets
|
2021-03-18 18:51:43 +00:00
|
|
|
curl -L "https://data.phishtank.com/data/$PHISHTANK_API/online-valid.csv.bz2" -o "phishtank.bz2"
|
|
|
|
curl -L "https://openphish.com/feed.txt" -o "openphish-raw.txt"
|
|
|
|
curl -L "https://s3-us-west-1.amazonaws.com/umbrella-static/top-1m.csv.zip" -o "top-1m-umbrella.zip"
|
|
|
|
curl -L "https://tranco-list.eu/top-1m.csv.zip" -o "top-1m-tranco.zip"
|
2021-05-04 08:04:37 +00:00
|
|
|
curl -L "https://oisd.nl/excludes.php" -o "oisd-exclude.html"
|
2020-07-05 10:46:19 +00:00
|
|
|
|
2021-03-18 18:51:43 +00:00
|
|
|
bunzip2 -kc "phishtank.bz2" > "phishtank.csv"
|
2020-07-05 10:46:19 +00:00
|
|
|
|
|
|
|
|
|
|
|
## Parse URLs
|
|
|
|
cat "phishtank.csv" | \
|
2021-03-18 17:44:15 +00:00
|
|
|
tr "[:upper:]" "[:lower:]" | \
|
2020-07-05 10:46:19 +00:00
|
|
|
## Workaround for column with double quotes
|
|
|
|
"./$CSVQUOTE" | \
|
|
|
|
cut -f 2 -d "," | \
|
|
|
|
"./$CSVQUOTE" -u | \
|
2020-07-07 10:06:18 +00:00
|
|
|
sed 's/"//g' | \
|
2020-07-05 10:46:19 +00:00
|
|
|
cut -f 3- -d "/" | \
|
|
|
|
# Domain must have at least a 'dot'
|
|
|
|
grep -F "." | \
|
2020-07-12 07:16:27 +00:00
|
|
|
sed "s/^www\.//g" > "phishtank.txt"
|
|
|
|
|
|
|
|
cat "openphish-raw.txt" | \
|
|
|
|
dos2unix | \
|
2021-03-18 17:44:15 +00:00
|
|
|
tr "[:upper:]" "[:lower:]" | \
|
2020-07-12 07:16:27 +00:00
|
|
|
cut -f 3- -d "/" | \
|
|
|
|
grep -F "." | \
|
|
|
|
sed "s/^www\.//g" > "openphish.txt"
|
|
|
|
|
|
|
|
## Combine PhishTank and OpenPhish
|
|
|
|
cat "phishtank.txt" "openphish.txt" | \
|
|
|
|
sort -u > "phishing.txt"
|
2020-07-05 10:46:19 +00:00
|
|
|
|
|
|
|
## Parse domain and IP address only
|
2020-07-12 07:16:27 +00:00
|
|
|
cat "phishing.txt" | \
|
2020-07-05 10:46:19 +00:00
|
|
|
cut -f 1 -d "/" | \
|
|
|
|
cut -f 1 -d ":" | \
|
2020-10-08 05:04:32 +00:00
|
|
|
# #2
|
|
|
|
cut -f 1 -d "?" | \
|
2020-07-12 07:16:27 +00:00
|
|
|
sort -u > "phishing-domains.txt"
|
2020-07-05 10:46:19 +00:00
|
|
|
|
|
|
|
|
|
|
|
cp "../src/exclude.txt" "."
|
|
|
|
|
|
|
|
## Parse the Umbrella 1 Million
|
|
|
|
unzip -p "top-1m-umbrella.zip" | \
|
|
|
|
dos2unix | \
|
2021-03-18 17:44:15 +00:00
|
|
|
tr "[:upper:]" "[:lower:]" | \
|
2020-07-05 10:46:19 +00:00
|
|
|
# Parse domains only
|
|
|
|
cut -f 2 -d "," | \
|
|
|
|
grep -F "." | \
|
|
|
|
# Remove www.
|
|
|
|
sed "s/^www\.//g" | \
|
|
|
|
sort -u > "top-1m-umbrella.txt"
|
|
|
|
|
|
|
|
## Parse the Tranco 1 Million
|
|
|
|
unzip -p "top-1m-tranco.zip" | \
|
|
|
|
dos2unix | \
|
2021-03-18 17:44:15 +00:00
|
|
|
tr "[:upper:]" "[:lower:]" | \
|
2020-07-05 10:46:19 +00:00
|
|
|
# Parse domains only
|
|
|
|
cut -f 2 -d "," | \
|
|
|
|
grep -F "." | \
|
|
|
|
# Remove www.
|
|
|
|
sed "s/^www\.//g" | \
|
|
|
|
sort -u > "top-1m-tranco.txt"
|
|
|
|
|
2021-05-04 08:04:37 +00:00
|
|
|
## Parse oisd exclusion list
|
|
|
|
cat "oisd-exclude.html" | \
|
|
|
|
# https://stackoverflow.com/a/47600828
|
|
|
|
xmlstarlet format --recover --html 2>/dev/null | \
|
|
|
|
xmlstarlet select --html --template --value-of '//a' | \
|
|
|
|
## Append new line https://unix.stackexchange.com/a/31955
|
|
|
|
sed '$a\' > "oisd-exclude.txt"
|
|
|
|
|
2020-07-05 10:46:19 +00:00
|
|
|
# Merge Umbrella, Traco and self-maintained top domains
|
2021-05-04 08:04:37 +00:00
|
|
|
cat "top-1m-umbrella.txt" "top-1m-tranco.txt" "exclude.txt" "oisd-exclude.txt" | \
|
2020-07-05 10:46:19 +00:00
|
|
|
sort -u > "top-1m-well-known.txt"
|
|
|
|
|
|
|
|
|
2020-07-12 07:16:27 +00:00
|
|
|
## Parse popular domains
|
|
|
|
cat "phishing-domains.txt" | \
|
2020-07-05 10:46:19 +00:00
|
|
|
# grep match whole line
|
2020-07-12 07:16:27 +00:00
|
|
|
grep -Fx -f "top-1m-well-known.txt" > "phishing-top-domains.txt"
|
2020-07-05 10:46:19 +00:00
|
|
|
|
|
|
|
|
2020-07-12 07:16:27 +00:00
|
|
|
## Exclude popular domains
|
|
|
|
cat "phishing-domains.txt" | \
|
2021-06-20 07:38:55 +00:00
|
|
|
grep -F -vf "phishing-top-domains.txt" > "phishing-notop-domains-temp.txt"
|
2020-07-05 10:46:19 +00:00
|
|
|
|
2020-07-12 07:16:27 +00:00
|
|
|
cat "phishing.txt" | \
|
2021-03-18 17:44:15 +00:00
|
|
|
grep -F -f "phishing-top-domains.txt" > "phishing-url-top-domains-temp.txt"
|
|
|
|
|
|
|
|
rm -f "phishing-url-top-domains.txt" "phishing-url-top-domains-raw.txt"
|
|
|
|
|
|
|
|
## Temporarily disable command print
|
|
|
|
set +x
|
|
|
|
|
|
|
|
while read URL; do
|
|
|
|
HOST=$(echo "$URL" | cut -d"/" -f1)
|
|
|
|
URI=$(echo "$URL" | sed "s/^$HOST//")
|
|
|
|
|
|
|
|
## Separate host-only URL
|
|
|
|
if [ -z "$URI" ] || [ "$URI" = "/" ]; then
|
2021-06-20 07:38:55 +00:00
|
|
|
echo "$HOST" | \
|
|
|
|
cut -f 1 -d ":" >> "phishing-notop-domains-temp.txt"
|
2021-03-18 17:44:15 +00:00
|
|
|
else
|
|
|
|
## Parse phishing URLs from popular domains
|
|
|
|
echo "$URL" | \
|
|
|
|
sed -e "s/^/||/g" -e "s/$/\$all/g" >> "phishing-url-top-domains.txt"
|
|
|
|
echo "$URL" >> "phishing-url-top-domains-raw.txt"
|
|
|
|
fi
|
|
|
|
done < "phishing-url-top-domains-temp.txt"
|
|
|
|
|
|
|
|
## Re-enable command print
|
|
|
|
set -x
|
2020-07-05 10:46:19 +00:00
|
|
|
|
2021-06-20 07:38:55 +00:00
|
|
|
## "phishing-url-top-domains-temp.txt" may add duplicate entries
|
|
|
|
sort -u "phishing-notop-domains-temp.txt" > "phishing-notop-domains.txt"
|
|
|
|
|
2020-07-05 10:46:19 +00:00
|
|
|
|
|
|
|
## Merge malware domains and URLs
|
|
|
|
CURRENT_TIME="$(date -R -u)"
|
|
|
|
FIRST_LINE="! Title: Phishing URL Blocklist"
|
|
|
|
SECOND_LINE="! Updated: $CURRENT_TIME"
|
|
|
|
THIRD_LINE="! Expires: 1 day (update frequency)"
|
2020-12-30 23:37:26 +00:00
|
|
|
FOURTH_LINE="! Homepage: https://gitlab.com/curben/phishing-filter"
|
2021-03-18 22:04:01 +00:00
|
|
|
FIFTH_LINE="! License: https://gitlab.com/curben/phishing-filter#license"
|
2020-07-13 02:30:06 +00:00
|
|
|
SIXTH_LINE="! Source: https://www.phishtank.com/ & https://openphish.com/"
|
2021-04-02 03:43:28 +00:00
|
|
|
NOTICE="\n! Notice: https://curben.gitlab.io/phishing-filter-mirror is moved to https://curben.gitlab.io/malware-filter\n"
|
|
|
|
COMMENT_UBO="$FIRST_LINE\n$SECOND_LINE\n$THIRD_LINE\n$FOURTH_LINE\n$FIFTH_LINE\n$SIXTH_LINE\n$NOTICE"
|
2020-07-05 10:46:19 +00:00
|
|
|
|
2020-10-04 02:38:14 +00:00
|
|
|
|
|
|
|
cat "phishing-notop-domains.txt" "phishing-url-top-domains.txt" | \
|
|
|
|
sort | \
|
|
|
|
sed '1 i\'"$COMMENT_UBO"'' > "../dist/phishing-filter.txt"
|
|
|
|
|
|
|
|
|
2020-09-15 08:48:44 +00:00
|
|
|
# Adguard Home
|
2020-07-12 07:16:27 +00:00
|
|
|
cat "phishing-notop-domains.txt" | \
|
2020-07-08 10:28:35 +00:00
|
|
|
sed "s/^/||/g" | \
|
2020-09-03 01:59:03 +00:00
|
|
|
sed "s/$/^/g" > "phishing-domains-adguard-home.txt"
|
2020-07-08 10:28:35 +00:00
|
|
|
|
2020-09-03 01:59:03 +00:00
|
|
|
cat "phishing-domains-adguard-home.txt" | \
|
2020-09-01 06:36:05 +00:00
|
|
|
sort | \
|
|
|
|
sed '1 i\'"$COMMENT_UBO"'' | \
|
|
|
|
sed "1s/Blocklist/Blocklist (AdGuard Home)/" > "../dist/phishing-filter-agh.txt"
|
|
|
|
|
2020-07-05 10:46:19 +00:00
|
|
|
|
2020-09-15 08:48:44 +00:00
|
|
|
# Adguard browser extension
|
2020-09-03 01:59:03 +00:00
|
|
|
cat "phishing-notop-domains.txt" | \
|
|
|
|
sed "s/^/||/g" | \
|
|
|
|
sed "s/$/\$all/g" > "phishing-domains-adguard.txt"
|
|
|
|
|
|
|
|
cat "phishing-domains-adguard.txt" "phishing-url-top-domains.txt" | \
|
|
|
|
sort | \
|
|
|
|
sed '1 i\'"$COMMENT_UBO"'' | \
|
|
|
|
sed "1s/Blocklist/Blocklist (AdGuard)/" > "../dist/phishing-filter-ag.txt"
|
|
|
|
|
|
|
|
|
2020-09-15 08:48:44 +00:00
|
|
|
# Vivaldi
|
|
|
|
cat "phishing-notop-domains.txt" | \
|
|
|
|
sed "s/^/||/g" | \
|
|
|
|
sed "s/$/\$document/g" > "phishing-domains-vivaldi.txt"
|
|
|
|
|
|
|
|
cat "phishing-domains-vivaldi.txt" "phishing-url-top-domains.txt" | \
|
|
|
|
sed "s/\$all$/\$document/g" | \
|
|
|
|
sort | \
|
|
|
|
sed '1 i\'"$COMMENT_UBO"'' | \
|
|
|
|
sed "1s/Blocklist/Blocklist (Vivaldi)/" > "../dist/phishing-filter-vivaldi.txt"
|
|
|
|
|
|
|
|
|
2020-07-05 10:46:19 +00:00
|
|
|
## Domains-only blocklist
|
|
|
|
# awk + head is a workaround for sed prepend
|
|
|
|
COMMENT=$(printf "$COMMENT_UBO" | sed "s/^!/#/g" | sed "1s/URL/Domains/" | awk '{printf "%s\\n", $0}' | head -c -2)
|
|
|
|
|
2020-07-12 07:16:27 +00:00
|
|
|
cat "phishing-notop-domains.txt" | \
|
2020-07-05 10:46:19 +00:00
|
|
|
sort | \
|
|
|
|
sed '1 i\'"$COMMENT"'' > "../dist/phishing-filter-domains.txt"
|
|
|
|
|
2021-04-01 04:50:49 +00:00
|
|
|
cat "phishing-notop-domains.txt" | \
|
2021-07-18 09:59:09 +00:00
|
|
|
grep -vE "^([0-9]{1,3}[\.]){3}[0-9]{1,3}$" > "phishing-notop-hosts.txt"
|
2020-07-05 10:46:19 +00:00
|
|
|
|
|
|
|
## Hosts file blocklist
|
2021-04-01 04:50:49 +00:00
|
|
|
cat "phishing-notop-hosts.txt" | \
|
2020-07-05 10:46:19 +00:00
|
|
|
sed "s/^/0.0.0.0 /g" | \
|
|
|
|
# Re-insert comment
|
|
|
|
sed '1 i\'"$COMMENT"'' | \
|
|
|
|
sed "1s/Domains/Hosts/" > "../dist/phishing-filter-hosts.txt"
|
|
|
|
|
|
|
|
|
|
|
|
## Dnsmasq-compatible blocklist
|
2021-04-01 04:50:49 +00:00
|
|
|
cat "phishing-notop-hosts.txt" | \
|
|
|
|
sed "s/^/address=\//g" | \
|
2020-07-05 10:46:19 +00:00
|
|
|
sed "s/$/\/0.0.0.0/g" | \
|
|
|
|
sed '1 i\'"$COMMENT"'' | \
|
|
|
|
sed "1s/Blocklist/dnsmasq Blocklist/" > "../dist/phishing-filter-dnsmasq.conf"
|
|
|
|
|
|
|
|
|
|
|
|
## BIND-compatible blocklist
|
2021-04-01 04:50:49 +00:00
|
|
|
cat "phishing-notop-hosts.txt" | \
|
|
|
|
sed 's/^/zone "/g' | \
|
2020-07-05 10:46:19 +00:00
|
|
|
sed 's/$/" { type master; notify no; file "null.zone.file"; };/g' | \
|
|
|
|
sed '1 i\'"$COMMENT"'' | \
|
|
|
|
sed "1s/Blocklist/BIND Blocklist/" > "../dist/phishing-filter-bind.conf"
|
|
|
|
|
|
|
|
|
2021-04-02 03:37:21 +00:00
|
|
|
## DNS Response Policy Zone (RPZ)
|
|
|
|
CURRENT_UNIX_TIME="$(date +%s)"
|
|
|
|
RPZ_SYNTAX="\n\$TTL 30\n@ IN SOA rpz.curben.gitlab.io. hostmaster.rpz.curben.gitlab.io. $CURRENT_UNIX_TIME 86400 3600 604800 30\n NS localhost.\n"
|
|
|
|
|
|
|
|
cat "phishing-notop-hosts.txt" | \
|
|
|
|
sed "s/$/ CNAME ./g" | \
|
|
|
|
sed '1 i\'"$RPZ_SYNTAX"'' | \
|
|
|
|
sed '1 i\'"$COMMENT"'' | \
|
|
|
|
sed "s/^#/;/g" | \
|
|
|
|
sed "1s/Blocklist/RPZ Blocklist/" > "../dist/phishing-filter-rpz.conf"
|
|
|
|
|
|
|
|
|
2020-07-05 10:46:19 +00:00
|
|
|
## Unbound-compatible blocklist
|
2021-04-01 04:50:49 +00:00
|
|
|
cat "phishing-notop-hosts.txt" | \
|
|
|
|
sed 's/^/local-zone: "/g' | \
|
2020-07-05 10:46:19 +00:00
|
|
|
sed 's/$/" always_nxdomain/g' | \
|
|
|
|
sed '1 i\'"$COMMENT"'' | \
|
|
|
|
sed "1s/Blocklist/Unbound Blocklist/" > "../dist/phishing-filter-unbound.conf"
|
|
|
|
|
|
|
|
|
2021-07-18 09:55:58 +00:00
|
|
|
## dnscrypt-proxy blocklists
|
|
|
|
# name-based
|
|
|
|
cat "phishing-notop-hosts.txt" | \
|
|
|
|
sed '1 i\'"$COMMENT"'' | \
|
|
|
|
sed "1s/Domains/Names/" > "../dist/phishing-filter-dnscrypt-blocked-names.txt"
|
|
|
|
|
|
|
|
# IPv4-based
|
|
|
|
cat "phishing-notop-domains.txt" | \
|
|
|
|
sort | \
|
|
|
|
grep -E "^([0-9]{1,3}[\.]){3}[0-9]{1,3}$" | \
|
|
|
|
sed '1 i\'"$COMMENT"'' | \
|
|
|
|
sed "1s/Domains/IPs/" > "../dist/phishing-filter-dnscrypt-blocked-ips.txt"
|
|
|
|
|
|
|
|
|
2021-03-18 17:44:15 +00:00
|
|
|
set +x
|
|
|
|
|
|
|
|
## Snort & Suricata rulesets
|
2021-03-19 19:03:25 +00:00
|
|
|
rm -f "../dist/phishing-filter-snort2.rules" \
|
|
|
|
"../dist/phishing-filter-snort3.rules" \
|
|
|
|
"../dist/phishing-filter-suricata.rules"
|
2021-03-18 17:44:15 +00:00
|
|
|
|
2021-03-20 00:56:59 +00:00
|
|
|
SID="200000001"
|
2021-03-18 17:44:15 +00:00
|
|
|
while read DOMAIN; do
|
|
|
|
SN_RULE="alert tcp \$HOME_NET any -> \$EXTERNAL_NET [80,443] (msg:\"phishing-filter phishing website detected\"; flow:established,from_client; content:\"GET\"; http_method; content:\"$DOMAIN\"; content:\"Host\"; http_header; classtype:attempted-recon; sid:$SID; rev:1;)"
|
|
|
|
|
2021-03-19 19:03:25 +00:00
|
|
|
SN3_RULE="alert http \$HOME_NET any -> \$EXTERNAL_NET any (msg:\"phishing-filter phishing website detected\"; http_header:field host; content:\"$DOMAIN\",nocase; classtype:attempted-recon; sid:$SID; rev:1;)"
|
|
|
|
|
2021-03-18 17:44:15 +00:00
|
|
|
SR_RULE="alert http \$HOME_NET any -> \$EXTERNAL_NET any (msg:\"phishing-filter phishing website detected\"; flow:established,from_client; http.method; content:\"GET\"; http.host; content:\"$DOMAIN\"; classtype:attempted-recon; sid:$SID; rev:1;)"
|
|
|
|
|
|
|
|
echo "$SN_RULE" >> "../dist/phishing-filter-snort2.rules"
|
2021-03-19 19:03:25 +00:00
|
|
|
echo "$SN3_RULE" >> "../dist/phishing-filter-snort3.rules"
|
2021-03-18 17:44:15 +00:00
|
|
|
echo "$SR_RULE" >> "../dist/phishing-filter-suricata.rules"
|
|
|
|
|
|
|
|
SID=$(( $SID + 1 ))
|
|
|
|
done < "phishing-notop-domains.txt"
|
|
|
|
|
|
|
|
while read URL; do
|
|
|
|
HOST=$(echo "$URL" | cut -d"/" -f1)
|
2021-03-18 18:49:50 +00:00
|
|
|
URI=$(echo "$URL" | sed -e "s/^$HOST//" -e "s/;/\\\;/g")
|
2021-03-18 17:44:15 +00:00
|
|
|
|
2021-03-20 00:57:45 +00:00
|
|
|
# Snort2 only supports <=2047 characters of `content`
|
2021-03-18 18:49:50 +00:00
|
|
|
SN_RULE="alert tcp \$HOME_NET any -> \$EXTERNAL_NET [80,443] (msg:\"phishing-filter phishing website detected\"; flow:established,from_client; content:\"GET\"; http_method; content:\"$(echo $URI | cut -c -2047)\"; http_uri; nocase; content:\"$HOST\"; content:\"Host\"; http_header; classtype:attempted-recon; sid:$SID; rev:1;)"
|
2021-03-18 17:44:15 +00:00
|
|
|
|
2021-03-19 19:03:25 +00:00
|
|
|
SN3_RULE="alert http \$HOME_NET any -> \$EXTERNAL_NET any (msg:\"phishing-filter phishing website detected\"; http_header:field host; content:\"$HOST\",nocase; http_uri; content:\"$URI\",nocase; classtype:attempted-recon; sid:$SID; rev:1;)"
|
|
|
|
|
2021-03-18 17:44:15 +00:00
|
|
|
SR_RULE="alert http \$HOME_NET any -> \$EXTERNAL_NET any (msg:\"phishing-filter phishing website detected\"; flow:established,from_client; http.method; content:\"GET\"; http.uri; content:\"$URI\"; endswith; nocase; http.host; content:\"$HOST\"; classtype:attempted-recon; sid:$SID; rev:1;)"
|
|
|
|
|
|
|
|
echo "$SN_RULE" >> "../dist/phishing-filter-snort2.rules"
|
2021-03-19 19:03:25 +00:00
|
|
|
echo "$SN3_RULE" >> "../dist/phishing-filter-snort3.rules"
|
2021-03-18 17:44:15 +00:00
|
|
|
echo "$SR_RULE" >> "../dist/phishing-filter-suricata.rules"
|
|
|
|
|
|
|
|
SID=$(( $SID + 1 ))
|
|
|
|
done < "phishing-url-top-domains-raw.txt"
|
|
|
|
|
|
|
|
set -x
|
|
|
|
|
2021-03-19 22:10:54 +00:00
|
|
|
sed -i '1 i\'"$COMMENT"'' "../dist/phishing-filter-snort2.rules"
|
|
|
|
sed -i "1s/Domains Blocklist/URL Snort2 Ruleset/" "../dist/phishing-filter-snort2.rules"
|
2021-03-18 17:44:15 +00:00
|
|
|
|
2021-03-19 22:10:54 +00:00
|
|
|
sed -i '1 i\'"$COMMENT"'' "../dist/phishing-filter-snort3.rules"
|
|
|
|
sed -i "1s/Domains Blocklist/URL Snort3 Ruleset/" "../dist/phishing-filter-snort3.rules"
|
2021-03-19 19:03:25 +00:00
|
|
|
|
2021-03-19 22:10:54 +00:00
|
|
|
sed -i '1 i\'"$COMMENT"'' "../dist/phishing-filter-suricata.rules"
|
|
|
|
sed -i "1s/Domains Blocklist/URL Suricata Ruleset/" "../dist/phishing-filter-suricata.rules"
|
2021-03-18 17:44:15 +00:00
|
|
|
|
|
|
|
|
2020-12-07 05:11:47 +00:00
|
|
|
## IE blocklist
|
|
|
|
COMMENT_IE="msFilterList\n$COMMENT\n: Expires=1\n#"
|
|
|
|
|
2021-04-01 04:50:49 +00:00
|
|
|
cat "phishing-notop-hosts.txt" | \
|
|
|
|
sed "s/^/-d /g" | \
|
2020-12-07 05:11:47 +00:00
|
|
|
sed '1 i\'"$COMMENT_IE"'' | \
|
|
|
|
sed "2s/Domains Blocklist/Hosts Blocklist (IE)/" > "../dist/phishing-filter.tpl"
|
|
|
|
|
|
|
|
|
2020-07-05 10:46:19 +00:00
|
|
|
## Clean up artifacts
|
2021-05-04 08:09:45 +00:00
|
|
|
rm "phishtank.csv" "top-1m-umbrella.zip" "top-1m-umbrella.txt" "top-1m-tranco.txt" "openphish-raw.txt" "oisd-exclude.html" "oisd-exclude.txt"
|
2020-07-05 10:46:19 +00:00
|
|
|
|
|
|
|
|
|
|
|
cd ../
|