Skip to content

Compare website blocking effectiveness of popular public DNS servers

License

Notifications You must be signed in to change notification settings

abeaudin/dingoes

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

20 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

DiNgoeS

Compare website blocking effectiveness of popular public DNS servers

This tool downloads the latest feed of malicious and deceptive websites from hpHosts and looks up whether these websites are blocked on popular third-party malware-blocking and anti-phishing DNS services.

Read the full blog article and see the initial report on the CryptoAUSTRALIA Blog

DNS Services Supported

hpHosts Feeds Supported

  • PSH : Sites engaged in Phishing (default)
  • EMD : Sites engaged in malware distribution
  • EXP : Sites engaged in hosting, development or distribution of exploits

Install

  • Require python3

  • Install requirements with pip:

    $ pip install -r requirements.txt

Usage

  • Run DiNgoeS with the following command:

    $ python dingoes.py

The CSV format report will be available in the same directory. Open in Excel or similar for further processing.

Switches

  • -o : CSV report file name
  • -c : hpHosts feed: PSH (default), EMD or EXP
  • -n : Number of websites from the hpHosts feed to test (default: 500)
  • -s : Shell type - if spinner exceptions occur, set to 1 (default: 0)

Support

Contact us on Twitter at @CryptoAUSTRALIA

About

Compare website blocking effectiveness of popular public DNS servers

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 100.0%