A RetroSearch Logo

Home - News ( United States | United Kingdom | Italy | Germany ) - Football scores

Search Query:

Showing content from https://github.com/gorhill/uBlock/wiki/Resources-Library below:

Resources Library · gorhill/uBlock Wiki · GitHub

Available general purpose scriptlets Available defuser scriptlets Available empty redirect resources Available URL-specific sanitized redirect resources (surrogates) General purpose scriptlets abort-current-script.js abort-current-inline-script.js /

Aborts execution of inline script (throws ReferenceError) when attempts to access specified property when text content or src attribute value (new in 1.37.0) of <script> element matches specified text or regular expression.

Note that acis.js and abort-current-inline-script.js aliases are deprecated and can be removed in the future.

Parameters:

Examples:

Starting with 1.48.5b4, you can use the logging abilites. (deprecated)
(read about the new method of logging scriptlets)

Tokens:

Also see:

abort-on-property-read.js

Aborts execution of script (throws ReferenceError) when attempts to read specified property. Writes are ignored.

Parameters:

Examples:

Also see:

abort-on-property-write.js

Aborts execution of script (throws ReferenceError) when attempts to write specified property.

Parameters:

Examples:

Also see:

abort-on-stack-trace.js Experimental, under development

New in 1.29.3rc9

Aborts execution of script (throws ReferenceError) when attempts to access specified property when stack trace matches specified text or regular expression. Internal discussion

Parameters:

The scriptlet logs when there is a match. If verbose mode is enabled, it will log both matches/no matches.

Stack trace is normalized, but there still can be differences (Chromium vs Firefox) because of different format of stack trace.

There is a special string which can be used to match inline script context - inlineScript.

Though the stack trace is rendered in the console using new line to separate the stack trace lines, internally \t is used. The reason is to be more easily be able to create regex-based needle when using regex . character class.

The stack trace is prepended with stackDepth:... in order to allow to filter on stack depth, however higher depth values can likely differ between Chromium and Firefox.

Firefox often reports injectedScript, attempt has been made to convert entries in Chromium which seems to correspond to this, so that both browser families will report injectedScript.

The column value is normalized to 1, however there is too much discrepancy between browser families for that value to be of any use.

Filtering according to reported line numbers (...:1234:1), will not be reliable for inline scripts, since the line at which those inline scripts are located will vary from one page to another. It should be reliable for when the stack trace entry is for code in a JS file.

Also see:

addEventListener-defuser.js prevent-addEventListener.js

Prevents attaching event listeners.

Parameters (when using positional arguments):

Examples:

Tokens:

● "log": (deprecated)

▬▬► SPOILER START ◄▬▬

Examples:

The first filter will log calls to addEventListener() which have the pattern "mouse" in the event type (so "mouseover", "mouseout", etc.) without defusing any of them (because pattern can't match anything).

The second filter will log all calls without defusing any of them (because type can't match anything).

The third filter will log and defuse all calls to addEventListener()

The fourth filter will log all calls to addEventListener() without defusing any of them

▬▬► SPOILER END ◄▬▬

(read about the new method of logging scriptlets)

Examples:

The third filter will log all calls to addEventListener() without defusing any of them

Also see:

addEventListener-logger.js

Removed in 1.48.1b3.

Logs to the console event listeners created on page.

The logging or debugging of addEventListener() calls can now be done with the addEventListenerDefuser scriptlet, which now supports named arguments.

Also see:

Removes current page cookies specified by name. For current domain, wildcard (dot) subdomain(s), after 1.28.0 also for domain one level above www, current and / path, script accessible (HttpOnly=false), on load and before unload.

Caveats: cookies set for higher level domain will not be removed. For example, if current page domain is page.example.com, cookies set for example.com will not be removed. One exception is www subdomain, which will work after 1.28.0.

Parameters:

Tokens:

Examples:

Also see:

Removed. Deprecated by $csp network filter option.
Applies content security policy by inserting <meta http-equiv=Content-Security-Policy content="*directive*"> tag to html <head> element. Read more at https://www.w3.org/TR/CSP2/#delivery-html-meta-element
Content Security Policy Quick Reference Guide

Parameters:

New in 1.48.1b0.

Prevents a call to an existing function from throwing an exception. It encloses existing functions in this block and ignores the exception:

try {
 [existing function]
}
catch() {
 [ignore when throws]
}

It will return undefined because returning variable is never set.

The exception will be caught by the scriptlet and neutralized. The first argument must be a reference to a function call. At the moment, the function call must exist at the time the scriptlet is called.

Parameters:

Examples:

Also see:

disable-newtab-links.js

Prevents creating new tabs/windows by deactivating links with target attribute.

Parameters:

Examples:

To prevent new tabs/windows by specifying the location URL, see: window-close-if.js

Also see:

New in 1.49.3rc15

Intercepts calls to eval() and will work only if what is passed to eval can be parsed as JSON.

For parameters, see: json-prune

When no "prune paths" argument (first parameter) is provided, the scriptlet is used for logging purpose and the "needle paths" argument (second parameter) is used to filter logging output.

Examples:

Also see:

New in 1.51.1b14 * (fn)

[Documentation to be completed]

trusted-prune-inbound-object.js

New in 1.52.3rc0

To perform object pruning for any given call which has an object as argument (hence "inbound").

Parameters:

Varargs:

Examples:

  1. Remove title and name properties before passing the object to JSON.stringify call:

    example.org##+js(trusted-prune-inbound-object, JSON.stringify, 1, title name)
  2. Remove status property before passing the object to Object.keys call but do not modify caller's instance of the object:

    example.org##+js(trusted-prune-inbound-object, Object.keys, 1, status, , dontOverwrite, 1)

Also see:

trusted-prune-outbound-object.js

New in 1.52.3rc3

Essentially a complement of trusted-prune-inbound-object added in 1.52.3rc0

To perform object pruning on any object returned synchronously by any given call.

Parameters:

The scriptlets json-prune and evaldata-prune essentially perform the same function, and will eventually be rewritten to internally delegate to generic trusted-prune-outbound-object.

New in 1.23.0

Intercepts calls to JSON.parse() and Response.json()New in 1.31.0. If the result of the parsing is an Object, remove specified properties from the result before returning to the caller.

Parameters:

A property in a list of properties can be a chain of properties, example: adpath.url.first.

After 1.28.0, two special "wildcard tokens" have been added:

Version 1.57.0 extend syntax with two special token properties:

When used without parameters, will log current hostname + json payload to the logger.
New in 1.27.0 - second parameter can be used to limit logging to JSON payloads which stringified content match specified string or regular expression.

Tokens:

Examples:

If the site uses eval in lieu of JSON.parse, see: evaldata-prune

Also see:

json-prune-fetch-response.js

New in 1.51.1rc1

Removes specified properties from the JSON response of a fetch call.

Syntax:

...##+js(json-prune-fetch-response, prune paths [, needle paths [, ...varargs ]])

For parameters, see: json-prune

Except that the stack parameter is treated as a vararg.

Tokens:

Examples:

tumblr.com##+js(json-prune-fetch-response, response.timeline.elements.[-].advertiserId, , propsToMatch, url:/api/v2/tabs/for_you)
nbc.com##+js(json-prune-fetch-response, avails, , propsToMatch, amazonaws.com)

Also see:

json-prune-xhr-response.js

New in 1.51.1rc3

Removes specified properties from the JSON response of a XMLHttpRequest call.

For usage, see: json-prune-fetch-response

Example:

www.facebook.com##+js(json-prune-xhr-response, data.viewer.instream_video_ads data.scrubber, , propsToMatch, /api/graphql)

Also see:

Removes an element from the specified XML retrieved using fetch, xhr support was added in 1.49.3rc6.

New in 1.44.5b3

After 1.49.3rc16, it can also remove attributes.

Parameters:

Tokens:

Examples:

Also see:

New in 1.44.5b6

Sometimes sites serve real video content and video ads all in one place inside .m3u8 files. You can use m3u-prune to remove those ad segments.

Examples:

If the first argument is a regex with multine flag set, the scriptlet will execute the regex against the whole text, and remove matching text from the whole text (New in 1.47.5b10).

If the matching text does not contain whole lines, the text won't be removed, i.e. it is not allowed to remove only part of a line.

Also see:

Prevent web pages from using eval(), and report attempts to the logger. This should not be used as a generic filter due to the fact that it breaks many websites, including those using Cloudflare's DDoS protection.

Examples:

Also see:

Prevent web pages from using eval().

Prevent web pages from using eval() on specific matching payloads.

Parameters:

When used without parameters, will log calls to eval() to the logger.

Examples:

Obsolete: FLoC ended its experiment in July of 2021.

New in 1.35.0.

Defuses Google FLoC ("Federated Learning of Cohorts") tracking. Read more on https://amifloced.org/

uBlock Origin (uBO) ensures FLoC is opt-in. The generic filter *##+js(no-floc) in "uBlock filters -- Privacy" ensures the feature is disabled when using default settings/lists.

Users can opt-in to FLoC by adding a generic exception filter to their custom filters, #@#+js(no-floc); or they can opt-in only for a specific set of websites through a more specific exception filter:

example.com,shopping.example#@#+js(no-floc)

Solves uBlockOrigin/uBlock-issues#1553.

New in 1.31.3b9.

Defuses calls to fetch() by returning a promise which always resolve to an empty response.

Parameters:

When used without parameters, the parameters passed to no-fetch-if will be logged to the logger.

Examples:

example.com##+js(no-fetch-if, method:HEAD)
example.com##+js(no-fetch-if, adsbygoogle.js)
example.com##+js(no-fetch-if, !negatedValue)
example.com##+js(no-fetch-if, adsbygoogle.js method:HEAD)
example.com##+js(no-fetch-if, /adsbygoogle.js$/ method:/HEAD|POST/)
example.com##+js(no-fetch-if, adsbygoogle.js, length:11000)
example.com##+js(no-fetch-if, adsbygoogle.js, war:googlesyndication_adsbygoogle.js)
example.com##+js(no-fetch-if, doubleclick, , '{"type": "opaque"}')

See also:

trusted-replace-xhr-response.js

New in 1.51.1rc3

Replaces response text content of xhr requests if all given parameters match.

For usage, see: trusted-replace-fetch-response

Example:

Also see:

trusted-replace-fetch-response.js

New in 1.51.1b8.

Replaces response text content of fetch requests if all given parameters match.

Parameters:

Tokens:

Scriptlet does nothing if response body can't be converted to text.

Solves uBlockOrigin/uBlock-issues#2742.

Examples:

Also see:

trusted-replace-argument.js

New in 1.55.1b18

Replace an argument passed to a method.

Syntax:

Parameters:

If argposRaw parameter is not declared, the scriptlet will log all calls to propChain along with the arguments passed and will not replace the argument passed to the trapped method.

Tokens:

Examples of usage:

prevent-requestAnimationFrame.js no-requestAnimationFrame-if.js /

New in 1.27.0.

Defuses calls to requestAnimationFrame() function when parameter:

Parameters:

Use with /^/ parameter to defuse all calls unconditionally.

When used without parameters, will log calls to requestAnimationFrame() to the logger.

Examples:

Also see:

New in 1.23.0

Defuses calls to setInterval() function when parameters:

Parameters:

Use with /^/ parameter to defuse all calls unconditionally.

When used without parameters, will log calls to setInterval() to the logger.

Examples:

Also see:

New in 1.23.0

Defuses calls to setTimeout() function when parameters:

Parameters:

Use with /^/ parameter to defuse all calls unconditionally.

When used without parameters, will log calls to setTimeout() to the logger.

Test page: https://gorhill.github.io/uBlock/tests/scriptlet-injection-filters-1.html

Examples:

In 1.31.3b11 aliased as setTimeout-defuser.js for backward compatibility.

Also see:

Disables WebRTC by preventing web pages from using RTCPeerConnection(). Report attempts in console.

Examples:

Also see:

New in 1.63.1b0.

Conditionally prevent assignment to innerHTML property.

Parameters:

When verbose mode is enabled, the scriptlet will log the assigned value of the element.

Example:

example.com##+js(prevent-innerHTML, body, adblock)

New in 1.38.0.

Defuses XMLHttpRequest network requests by returning empty response. Based on no-fetch-if.js.

Parameters:

When used without parameters, the parameters passed to no-xhr-if will be logged to the logger.

Examples:

example.com##+js(no-xhr-if, method:HEAD)
example.com##+js(no-xhr-if, adsbygoogle.js)
example.com##+js(no-xhr-if, adsbygoogle.js method:HEAD)
example.com##+js(no-xhr-if, /adsbygoogle.js$/ method:/HEAD|POST/)
example.com##+js(no-xhr-if, adsbygoogle.js, length:11000)
example.com##+js(no-xhr-if, doubleclick.net/instream/ad_status.js, war:doubleclick_instream_ad_status.js)

Also see:

New in 1.60.1b3

Essentially the same as no-xhr-if except that if the directive argument is not a known token, it will be used as is as the response text of the xhr request, whereas prevent-xhr returns an empty string when the directive is unknown.

Examples:

anitube.vip##+js(trusted-prevent-xhr, outbrain.com, outbrain)
koramaup.com##+js(trusted-prevent-xhr, googlesyndication, 'a.getAttribute("data-ad-client")||""')

New in 1.50.1b16.

Sets the specified attribute on the specified elements. This scriptlet runs once when the page loads then afterward on DOM mutations.

Parameters:

Examples:

example.com##+js(set-attr, div.class > a.class, test-attribute, 0)
example.com##+js(set-attr, a > img, src, [data-src])

Solves uBlockOrigin/uBlock-issues#2347.

Also see:

New in 1.60.1b17

Sets the specified attribute on the specified elements. This scriptlet runs once when the page loads then afterward on DOM mutations.

Parameters:

Examples:

  1. Adds a class attribute to the body element with the value some-class.

    example.com##+js(trusted-set-attr, body, class, some-class)
  2. Adds a test-attribute attribute to the body element with the value [true, true].

    example.com##+js(trusted-set-attr, body, test-attribute, '[true, true]')

Also see:

Deprecated by :remove-attr()

Filter authors must use the new operator instead of the +js() counterpart.

Removes attribute(s) from DOM tree node(s). By default will run only once when the initial HTML document has been completely loaded and parsed but sub-resources such as scripts, images, stylesheets and frames are still loading.

Parameters:

Examples:

Also see:

Deprecated by :remove-class()

Filter authors must use the new operator instead of the +js() counterpart.

New in 1.26.0.

Removes classes from DOM tree node(s). By default will run only once after page load. Syntax based on remove-attr.js

Parameters:

Examples:

Also see:

trusted-replace-node-text.js

New in 1.49.3b16

Replace text instance(s) with another text instance inside specific DOM nodes.

By default, the scriptlet will bail out when the document itself has been fully loaded, i.e. when DOMContentLoaded event is fired.

The mutation observer of this scriptlet can be a significant overhead for pages with dynamically updated DOM, and in most cases the scriptlet is useful only for DOM changes occurring before the DOMContentLoaded event, so the default is to quit out when that event is received ("quit out" means discarding the mutation observer and having the scriptlet garbage-collected by the JS engine).

Parameters:

Tokens:

Examples:

Related discussions:

Also see:

New in 1.49.3rc15

Remove the whole text of a DOM node.

By default, the scriptlet will bail out when the document itself has been fully loaded, i.e. when DOMContentLoaded event is fired.

The mutation observer of this scriptlet can be a significant overhead for pages with dynamically updated DOM, and in most cases the scriptlet is useful only for DOM changes occurring before the DOMContentLoaded event, so the default is to quit out when that event is received ("quit out" means discarding the mutation observer and having the scriptlet garbage-collected by the JS engine).

Parameters:

Optionally, extra pairs of parameters (tokens) can be used to modify the behavior of the scriptlet.

Tokens:

Examples:

Also see:

trusted-replace-outbound-text.js

New in 1.57.1b1

(currently alias trusted-rpot is unsupported yet)

Replace the text in the outbound function call.

Parameters:

Tokens:

Examples:

When the replacement starts with json:, it will be first decoded using JSON.parse() (since 1.59.1b8), example:

The doublequotes are required since this is what JSON.parse() expects as a valid JSON string.

Solves related issues / discussions:

Also see:

New in 1.47.5b4

Set the href attribute to a value found in the DOM at, or below the targeted a element, and optionally with transformation steps.

Parameters:

Examples:

Solves Anti-redirect scriptlet for vk.com (href-sanitizer).

Also see:

New in 1.38.7b3

Attempts to defuse reloading of a document through a meta "refresh" tag. Will stop navigation (call window.stop()) at specified delay.

Parameters:

Also see:

trusted-click-element.js

New in 1.53.5rc13

Clicks elements on webpages. Can target single or multiple elements in a sequence. The scriptlet will abort after 10s timeout or after all the elements have been clicked. Also hidden elements can be targeted.

Parameters:

Tokens:

log, 1: This will cause the scriptlet to output information at the console, useful as a debugging tool for filter authors
(deprecated, read about the new method of logging scriptlets)

Examples:

Also see:

Creates property and initializes it with a value from a predefined set.

Scriptlet will succeed only when:

Value set by scriptlet can be overwritten by page script when:

Parameters:

● optional (deprecated in favor of "runAt" token)

▬▬► SPOILER START ◄▬▬

▬▬► SPOILER END ◄▬▬

Tokens:

Examples:

Also see:

trusted-set-constant.js

Behaves exactly like set-constant, except that any arbitrary JSON-compatible value can be set.

By default the value is treated as a string, which can be anything.

If the value starts with { and ends with }, the value will be JSON-parsed, and the value property of the resulting object will be used. Since 1.59.1b9, { "value": ... } can be replaced with json:.

Solves: https://github.com/uBlockOrigin/uAssets/discussions/18185#discussioncomment-5977456

Examples:

Also see:

trusted-suppress-native-method.js

New in 1.58.1rc0

This is a first draft version with current limitations:

Syntax:

Parameters:

To ignore specific argument, explicitly use whitespace as a matcher, e.g ' | |{"prop":"val"}' to skip matching first and second arguments.

If signatureStr parameter is not declared, the scriptlet will log all calls to methodPath along with the arguments passed and will not prevent the trapped method.

Tokens:

The scriptlet will log stack trace in uBO's logger when verbose mode is enabled.

Examples:

example.org##+js(trusted-suppress-native-method, localStorage.setItem, '/key/|"value"', prevent)
example.org##+js(trusted-suppress-native-method, Object.prototype.hasOwnProperty, '"test"')
example.org##+js(trusted-suppress-native-method, Node.prototype.appendChild, '{"id":"str"}', prevent)
example.org##+js(trusted-suppress-native-method, Document.prototype.querySelectorAll, '"div"')
example.org##+js(trusted-suppress-native-method, Array.prototype.concat, '[1, "str", true]')
example.org##+js(trusted-suppress-native-method, sessionStorage.setItem, ' |"item-value"', abort, someFuncName)
  1. Prevent localStorage.setItem('test-key', 'test-value') call matching first argument by regexp pattern and the second one by substring.
  2. Abort obj.hasOwnProperty('test') call matching the first argument.
  3. Prevent Node.prototype.appendChild call on element with the id test-id by object matcher.
  4. Abort all document.querySelectorAll calls with div as the first argument.
  5. Abort Array.prototype.concat([1, 'str', true, null]) calls by matching array argument contents.
  6. Use stack argument to match by the call, while also matching the second argument.

Also see:

trusted-override-element-method.js

New in 1.60.1b5

Override the behavior of a method on matching elements.

Parameters:

Example:

streamsilk.com##+js(trusted-override-element-method, HTMLAnchorElement.prototype.click, a[target="_blank"][style])
trusted-prevent-dom-bypass.js

New in 1.60.1b4

Prevent the bypassing of uBO scriptlets through anonymous embedded context.

Ensure that a target method in the embedded context is using the corresponding parent context's method (which is assumed to be properly patched), or to replace the embedded context with that of the parent context.

Root issue: https://issues.chromium.org/issues/40202434

Parameters:

Examples:

New in 1.50.1b0.

Sets a cookie with the specified name, value, and path. Double quotes surrouding the cookie value are allowed.

Parameters:

1. 1.52.3b17
2. 1.52.3rc12
3. 1.53.1b8
4. 1.53.5rc5
5. 1.57.3rc1
6. 1.58.1b7
7. 1.58.1rc0
8. 1.59.1b5
9. 1.60.1b12 10. 1.61.3b10 11. 1.62 12. 1.62.1b1 13. 1.62.1b2

The scriptlet encodes cookie names and values, e.g value "{ test: 'value'}" becomes %7B%20test%3A%20'value'%7D.

Tokens:

; Secure will be automatically used when cookie names starts with __Secure- or __Host- (since 1.58.1b8).

Examples:

Also see:

Sets a cookie with arbitrary name and value, and with optional ability to offset cookie attribute 'expires' and set path.

New in 1.50.1b1.

Parameters:

Variadic parameters (must appears after required and optional parameters):

; Secure will be automatically used when cookie names starts with __Secure- or __Host-.

Examples:

The second and third filters will set a cookie with new Date().getTime() value.

The forth and fifth filters will set a cookie which will expire in 3 days or 1 year.

The sixth filter sets a cookie with no path.

Also see:

set-local-storage-item.js set-session-storage-item.js

New in 1.50.1b4 and 1.50.1b12.

Set a local/session storage entry to a specific, allowed value. Scriptlet won't set item if storage is full. Double quotes surrouding the key value are allowed.

Examples:

Solves uBlockOrigin/uBlock-issues#2697.

Also see:

trusted-set-local-storage-item.js trusted-set-session-storage-item.js

New in 1.50.1b4 and 1.53.5rc7.

Parameters:

Examples:

Also see:

remove-cache-storage-item.js

New in 1.55.1b23

Removes cache storage item.

Syntax: ...##+js(remove-cache-storage-item, cacheNamePattern[, urlPattern])

Parameters:

Reference: https://developer.mozilla.org/en-US/docs/Web/API/CacheStorage

nano-setInterval-booster.js /

Adjusts interval for specified setInterval() callbacks.

Parameters:

Examples:

Also see:

Spoof the CSS property value when getComputedStyle() or getBoundingClientRect() are used.

Parameters:

Examples:

There can be any number of selectors, grouped inside single quotes:

There can be any number of property-name/property-value pairs, all separated by commas:

Special properties: 1.61.1b4

If both _rectw and width are present in the list of properties to spoof, _rectw will have precedence over width in the spoofing of getBoundingClientRect() output. Same for _recth.

Solves uBlockOrigin/uBlock-issues#2618.

Also see:

New in 1.52.3b2

Prevent usage of specific or all (default) canvas APIs.

Syntax:

Parameters:

Examples:

References: https://developer.mozilla.org/en-US/docs/Web/API/HTMLCanvasElement/getContext

nano-setTimeout-booster.js /

Adjusts delay for specified setTimeout() callbacks.

Parameters:

Examples:

Also see:

sharedWorker-defuser.js

Removed. Deprecated by $csp filter option.
Defuses sharedWorker by passing empty worker file (Blob URL) for specified worker URLs

Parameters:

Allows opening RTC connections to matching RTCIceServer only.

Parameters:

New in 1.39.3b10.

Closes fresh browser tabs of the specified page. Can also be used to close tabs which have been opened from other applications. Can be narrowed down to specific path by parameter. Whole browser window will be closed if it's the last/only tab (depends on browser configuration).

Improvements:

Parameters:

Examples:

Also see:

Prevent opening new windows by window.open() when URL positively or negatively matches to specific string.

Improvements:

If the first argument is set to the special value debug and the logger is opened, the scriptlet will trigger a debugger statement and the prevention will not occur.

When used without parameters, will log calls to window.open() to the logger.

Parameters:

Tokens:

Examples:

Also see:

Clears window.name property which can be misused for tracking purposes.

Parameters:

Experimental, gets rid of overlay dialogs, works for ~30s after page load. Preferred way to handle overlays is to use standard cosmetic filters and optionally style injection.

Disables alert() dialog boxes by redirecting messages to console.

Removes animation (artificial 8s delay) added to desktop pages supporting AMP, when ampproject.org scripts are blocked.

Fingerprintjs2 shim.

Also see: AdGuard fingerprintjs2

FingerprintJS v3 shim.

Also see: AdGuard fingerprintjs3

Defuses BlockAdblock. Prevents executing of eval() on sets of predefined payloads.

Also see: AdGuard prevent-bab

Redirect resource. Defuses BAB 4.2b.

Also see: AdGuard prevent-bab2

Convenience, Sanitize FuckAdBlock, BlockAdBlock, SniffAdBlock, fuckAdBlock, blockAdBlock, sniffAdBlock properties. Often used as redirect in network filters. TODO: copy to redirect?

Also see: AdGuard prevent-fab-3.2.0

Convenience, sets static properties (PopAds, popns)

Also see: AdGuard set-popads-dummy

Convenience, abort-on-property-write.js (PopAds, popns), throws "magic"

Also see: AdGuard prevent-popads-net

New in 1.41.0

Prebid-ads shim. canRunAds/isAdBlockActive?

Also see: AdGuard prebid-ads

These are smallest/shortest/fastest to execute files. Should be used in network filters as a parameter to $redirect option. They purpose is to mislead page to think that real files have been served.

Example rules:

URL-specific sanitized redirect resources (surrogates) amazon-adsystem.com/aax2/amzn_ads.js

New in 1.27.0.

doubleclick_instream_ad_status.js / doubleclick.net/instream/ad_status.js google-analytics.com/ga.js google-analytics_analytics.js / google-analytics.com/analytics.js google-analytics_inpage_linkid.js / google-analytics.com/inpage_linkid.js google-analytics_cx_api.js / google-analytics.com/cx/api.js googletagservices_gpt.js / googletagservices.com/gpt.js googletagmanager_gtm.js / googletagmanager.com/gtm.js googlesyndication_adsbygoogle.js / googlesyndication.com/adsbygoogle.js scorecardresearch_beacon.js / scorecardresearch.com/beacon.js widgets.outbrain.com/outbrain.js disqus_forums_embed.js AND disqus_embed.js / disqus.com/forums/*/embed.js AND disqus.com/embed.js

Removed in 1.29.0.

Deprecated by general purpose scriptlets / outdated (please move to proper section if still used).

Deprecated, addEventListener-defuser

static.chartbeat.com/chartbeat.js

Deprecated, sets static properties (pSUPERFLY.activity, pSUPERFLY.virtualPage)

ligatus.com/*/angular-tag.js

Deprecated, sets static properties (adProtect, uabpdl, uabDetect)

addthis.com/addthis_widget.js d3pkae9owd2lcf.cloudfront.net/mb105.js

RetroSearch is an open source project built by @garambo | Open a GitHub Issue

Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo

HTML: 3.2 | Encoding: UTF-8 | Version: 0.7.4