Skip to content

A stealth URL toolkit optimized for bypassing censorship filters and/or dropping malware

License

Notifications You must be signed in to change notification settings

oftn-oswg/zerodrop

Folders and files

NameName
Last commit message
Last commit date

Latest commit

fe9e0ac · Sep 8, 2024

History

85 Commits
May 21, 2018
May 27, 2018
May 19, 2018
May 27, 2018
May 23, 2018
May 20, 2018
May 21, 2018
Mar 17, 2018
May 23, 2018
Sep 8, 2024
May 11, 2018
May 27, 2018
May 23, 2018
May 11, 2018
May 11, 2018
Sep 8, 2024
Sep 8, 2024
May 21, 2018
May 4, 2018
May 21, 2018
May 23, 2018
May 23, 2018
May 17, 2018
May 17, 2018
May 21, 2018
May 21, 2018
May 27, 2018

Repository files navigation

Zerodrop 🕵️

A utility for private redirects and proxies that disappear after certain conditions are met.

Live demo

A live demo is available at this dangerous.link.

Features

  • Web interface for creating resources
  • Create proxies and redirections for a given URL
  • Upload files or manually enter content in a textarea
  • Access control
  • Expire access to a resource after number of downloads
  • Block or allow access based on IP address
  • Block or allow access based on IP network
  • Block or allow access based on GeoIP location
  • Block or allow access based on hostname matching (w/ regex)
  • Publish "secret" pages with UUID generation
  • Self-destruct action which removes and kills running binary; configurable.

Blacklist

The blacklist syntax is similar to that of gitignore. An optional prefix ! which negates the pattern can be used for whitelisting.

Categories

  1. Match All [*] (Useful for creating a whitelist)
  2. Match IP [e.g. 203.0.113.6 or 2001:db8::68]
  3. Match IP Network [e.g.: 192.0.2.0/24 or ::1/128]
  4. Match Hostname [e.g. crawl-66-249-66-1.googlebot.com]
  5. Match Hostname RegExp [e.g.: ~ .*\.cox\.net]
  6. Match Geofence [e.g.: @ 39.377297 -74.451082 (7km)]
  7. Match database [e.g. db datacenters or db tor]

Whitelist

For example to only allow from local:

# This strange blacklist only allows access from localhost and google bots
*
! ::1  # Allow localhost
! ~ .*\.google(bot)?\.com$

Geofencing

A @ prefix is for targeted geofencing, i.e., @ lat lng (optional radius). The default radius is 25m. For example to block Atlantic City:

@ 39.377297 -74.451082 (7km)
Unit Symbol
meter m
kilometer km
mile mi
feet ft

Regular Expression

A ~ prefix indicates a hostname regular expression match.

shady.com
~ (.*)\.shady\.com # Block subdomains of shady

Databases

A rule that begins with "db " will be matched with a database by name, e.g., !db tor to whitelist Tor exit nodes. The database file must be specified in the config.

ipcat:
    cloudflare: cloudflare.csv
    datacenters: datacenters.csv
    tor: torexitnodes.csv

The format of the CSV file is specified by ipcat rules.