uBlock Origin
github.com/gorhill/uBlock BrowserLight-weight, fast browser extension for Firefox and Chromium (Chrome, Edge, Brave Opera etc), that blocks tracking, ads and known malware. uBlock is easy-to-use out-of-the-box, but also has a highly customisable advanced mode, with a point-and-click firewall which can be configured on a per-site basis.
- Homepage: github.com/gorhill/uBlock
- GitHub: github.com/gorhill/uBlock
- Web info: web-check.xyz/results/github.com
uBlock Origin Source Code
Author
Description
uBlock Origin - An efficient blocker for Chromium and Firefox. Fast and lean.
Homepage
License
GPL-3.0
Created
01 Apr 15
Last Updated
14 Sept 24
Latest version
Primary Language
JavaScript
Size
144,969 KB
Stars
45,859
Forks
3,070
Watchers
45,859
Language Usage
Star History
Top Contributors
- @gorhill (11778)
- @Deathamns (184)
- @chrisaljoudi (100)
- @mjethani (64)
- @AlexVallat (35)
- @ialexsilva (31)
- @tailHey (15)
- @ryanbr (12)
- @jspenguin2017 (10)
- @macabro (9)
- @gwarser (8)
- @Mikey1993 (7)
- @DandelionSprout (6)
- @Baegus (5)
- @anewuser (4)
- @b3rnd (4)
- @WyohKnott (3)
- @xupefei (3)
- @curbengh (3)
- @mikhaelkh (3)
- @rlex (3)
- @JustOff (3)
- @jeeger (3)
- @kzar (3)
- @xPoison (3)
- @emilio (2)
- @anvakl (2)
- @faye925 (2)
- @hotdogman (2)
- @okiehsch (2)
Recent Commits
- Raymond Hill (14 Sept 24)
Make Firefox dev build auto-update
- Raymond Hill (14 Sept 24)
New revision for dev build
- Raymond Hill (14 Sept 24)
Fix regression re. `mp4` filter option Related issue: https://github.com/uBlockOrigin/uBlock-issues/issues/3375
- Raymond Hill (13 Sept 24)
Use dummy dns API when it's not present
- Raymond Hill (13 Sept 24)
Make Firefox dev build auto-update
- Raymond Hill (13 Sept 24)
New revision for dev build
- Raymond Hill (13 Sept 24)
Code review of DNS-related code Related commit: https://github.com/gorhill/uBlock/commit/6acf97bf5143543c036c38a82160e5f8efe8b3f1
- Raymond Hill (12 Sept 24)
Import translation work from https://crowdin.com/project/ublock
- Raymond Hill (12 Sept 24)
Make Firefox dev build auto-update
- Raymond Hill (12 Sept 24)
New revision for dev build
- Raymond Hill (12 Sept 24)
Update changelog
- Raymond Hill (12 Sept 24)
Rewrite cname uncloaking code to account for new `ipaddress=` option This commit makes the DNS resolution code better suited for both filtering on cname and ip address. The change allows early availability of ip address so that `ipaddress=` option can be matched at onBeforeRequest time. As a result, it is now possible to block root document using `ipaddress=` option -- so long as an ip address can be extracted before first onBeforeRequest() call. Related issue: https://github.com/uBlockOrigin/uBlock-issues/issues/2792 Caveat ------ the ip address used is the first one among the list of ip addresses returned by dns.resolve() method. There is no way for uBO to know which exact ip address will be used by the browser when sending the request, so this is at most a best guess. The exact IP address used by the browser is available at onHeadersReceived time, and uBO will also filter according to this value, but by then the network request has already been sent to the remote server. Possibly a future improvement would make available the whole list of ip addresses to the filtering engine, but even then it's impossible to know with certainty which ip address will ultimately be used by the browser -- it is entirely possible that the ip address used by the browser might not be in the list received through dns.resolve().
- Raymond Hill (11 Sept 24)
Make Firefox dev build auto-update
- Raymond Hill (11 Sept 24)
New revision for dev build
- Raymond Hill (11 Sept 24)
Code review for `ipaddress=` filter option If an IP address can be extracted from the hostname portion of a URL, the IP address matching will be performed at onBeforeRequest() time. Regardless, IP address matching will subsequently always be performed at onHeadersReceived() time as the request details at that point contain a reliable IP address value on supported platforms (Firefox- only as of now). The `cap_ipaddress` now evaluates to `true` in Chromium-based browsers. Even though these browsers are unable to provide reliable IP address value at onHeadersReceived() time, they can still perform IP address matching for IP address extracted from hostname portion of a URL.
- Raymond Hill (10 Sept 24)
Update changelog
- Raymond Hill (10 Sept 24)
Avoid using dns.resolve() for proxied DNS resolution Related issue: https://github.com/uBlockOrigin/uBlock-issues/issues/1743
- Raymond Hill (10 Sept 24)
Make Firefox dev build auto-update
- Raymond Hill (10 Sept 24)
New revision for dev build
- Raymond Hill (10 Sept 24)
Update changelog
- Raymond Hill (10 Sept 24)
[mv3] Mind unsupported `header=`/`ipaddress` options in DNR API Properly report unsupported `header=` and `ipaddress=` option in log file. `header=` support may become possible soon with Chromium 128 introducing blocking according to response headers content.
- Raymond Hill (10 Sept 24)
Add support for `lan`/`loopback` values to `ipaddress=` option Related issue: https://github.com/uBlockOrigin/uBlock-issues/issues/1070
- Raymond Hill (09 Sept 24)
Make Firefox dev build auto-update
- Raymond Hill (09 Sept 24)
New revision for dev build
- Raymond Hill (09 Sept 24)
Properly reflect whether `ipaddress=` is supported
- Raymond Hill (09 Sept 24)
Make Firefox dev build auto-update
- Raymond Hill (09 Sept 24)
New revision for dev build
- Raymond Hill (09 Sept 24)
Update changelog
- Raymond Hill (09 Sept 24)
New static network filter option `ipaddress=` The purpose is to block according to the ip address of a network request. In the current implementation, the filter option can only be enforced at onHeadersReceived time. The new filter option cannot be enforced in Chromium-based browsers since the ip address of network requests is available only at onResponseStarted time, which is not blocking. The value assigned to `ipaddress` can either be a plain string which must match exactly a given ip address, or a regex which will be matched against the ip address. The `ipaddress` option can only be enforced when the extension framework does provide a valid ip address in a onHeadersReceived listener. For instance, cached resources do not have a valid ip address and thus can't be a match to `ipaddress` option. Example: *$script,ipaddress=93.184.215.14
- Raymond Hill (08 Sept 24)
Add ability to quote static network option values For the sake of convenience for filter list maintainers, this commit add ability to quote static network option values, so as to avoid the need to escape commas when parser ambiguity arises. The quotes can be `"`, `'`, or backticks. Example, the following filter requires escaping commas: example.com$xhr,replace=/"loremIpsum.*?([A-Z]"\}|"\}{2\,4})\}\]\,//,1p Can be now rewritten with no need to escape when using quotes: example.com$xhr,replace='/"loremIpsum.*?([A-Z]"\}|"\}{2,4})\}\],//',1p
uBlock Origin Website
Website
GitHub: Letβs build from here Β· GitHub
GitHub is where over 100 million developers shape the future of software, together. Contribute to the open source community, manage your Git repositories, review code like a pro, track bugs and features, power your CI/CD and DevOps workflows, and secure code before you commit it.
Redirects
Does not redirect
Security Checks
All 66 security checks passed
Server Details
- IP Address 140.82.112.4
- Hostname lb-140-82-112-4-iad.github.com
- Location San Francisco, California, United States of America, NA
- ISP GitHub Inc.
- ASN AS36459
Associated Countries
- US
Saftey Score
Website marked as safe
100%
Blacklist Check
github.com was found on 0 blacklists
- ThreatLog
- OpenPhish
- PhishTank
- Phishing.Database
- PhishStats
- URLhaus
- RPiList Not Serious
- AntiSocial Blacklist
- PhishFeed
- NABP Not Recommended Sites
- Spam404
- CRDF
- Artists Against 419
- CERT Polska
- PetScams
- Suspicious Hosting IP
- Phishunt
- CoinBlockerLists
- MetaMask EthPhishing
- EtherScamDB
- EtherAddressLookup
- ViriBack C2 Tracker
- Bambenek Consulting
- Badbitcoin
- SecureReload Phishing List
- Fake Website Buster
- TweetFeed
- CryptoScamDB
- StopGunScams
- ThreatFox
- PhishFort
Website Preview
uBlock Origin Reviews
More Ad Blockers
-
Incredibly powerful, network-wide ad-blocker. Works out-of-the-box, light-weight with an intuitive web interface, but still allows for a lot of advanced configuration for power users. As well as blocking ads and trackers, Pi-Hole speeds up your network speeds quite significantly. The dashboard has detailed statistics, and makes it easy to pause/ resume Pi-Hole if needed.
-
A shell script application to manage ad-blocking, Dnsmasq logging, Entware and pixelserv-tls installations and more on supported routers running Asuswrt-Merlin firmware, including its forks.
-
DNS-based host and ad blocker for Android. Easy to configure, but the default config uses several widely-respected host files aimed at stopping ads, malware, and other weird stuff.
-
Native Apple (Swift) apps, for system-wide ad-blocking. Can be customized with custom host lists, primarily aimed for just ad-blocking.
-
A POSIX-compliant shell script, designed for Unix-like systems, that gets a list of domains that serve ads, tracking scripts and malware from multiple sources and creates a hosts file (alternative formats are also supported) that prevents your system from connecting to them. Aimed at improving security and privacy through blocking advert, tracking and malware associated domains.
-
Open source mobile ad-blocker that acts like a firewall. Since it's device-wide, once connected all apps will have ads/ trackers blocked, and the blacklist can be edited. The app is free, but there is a premium option, which has a built-in VPN.
-
Free and open source ad-blocker and a firewall for Android 6+ (no root required).
-
Python script that uses machine learning to block adverts in live audio streams, such as Radio, Podcasts, Audio Books, and music platforms such as Spotify. See live demo.
About the Data: uBlock Origin
API
You can access uBlock Origin's data programmatically via our API.
Simply make a GET
request to:
https://api.awesome-privacy.xyz/networking/ad-blockers/ublock-origin
The REST API is free, no-auth and CORS-enabled. To learn more, view the Swagger Docs or read the API Usage Guide.
About the Data
Beyond the user-submitted YAML you see above, we also augment each listing with additional data dynamically fetched from several sources. To learn more about where the rest of data included in this page comes from, and how it is computed, see the About the Data section of our About page.
Share uBlock Origin
Help your friends compare Ad Blockers, and pick privacy-respecting software and services.
Share uBlock Origin and Awesome Privacy with your network!