Hey guys, on OPNsense there another one:
http://pgl.yoyo.org/adservers/serverlist.php?hostformat=nohtml
I don't know if the format can be used as is or if it needs to be converted. It also parses categories so I assume it has all the fields needed to work and should be n't be too hard toeverything in there to work and shouldn't be that hard in a Bash script, or from what I hear trivial in Python. I don't know Python myself so…yeah.
I already checked, it looks like the categories are nothing but lists in folders:
Remote Desktop Picture October 8, 2022 at 1.05.46 PM GMT-6.png
Knowing that you can easily use one of the many lists there are, e.g;
Screen Shot 2022-10-08 at 1.24.57 PM.png
Many with their own classifications, for example; Steven Black's. grep or awk or whatever is the easiest to remove the bad IP address-per-entry these come with put 'em in category folders, tar it, rsync it into a local web server, point pfSense to it. Maybe even add to the script to trigger the Squidguard update, there are some examples in the ACME package if I remember correctly. :) They should serve at least as hints to places in the filesystem.
Another option that comes to mind, is transforming the already-in-pfSense lists from pfBlockerNG but, I've never found it easy dealing with any native package-related thing on pfSense. They have some sort of obfuscation or inexplicably obvious oversight, I can't tell exactly what, but will make you miserable. 🔪
The file from l'Université Toulouse 1 appears to have additional files for heuristics or something (somebody will correct me, I hope), but the domain lists are on every category/folder whereas the others aren't, so I think it's a safe bet you'll be fine without them. Good luck!