Example Usage
https://raw.githubusercontent.com/Tempest-Solutions-Company/pihole_blocklists/main/phishing.txt https://raw.githubusercontent.com/Tempest-Solutions-Company/pihole_blocklists/main/malware.txt https://raw.githubusercontent.com/Tempest-Solutions-Company/pihole_blocklists/main/c2_servers.txt https://raw.githubusercontent.com/Tempest-Solutions-Company/pihole_blocklists/main/banking_trojan.txt https://raw.githubusercontent.com/Tempest-Solutions-Company/pihole_blocklists/main/all_malicious.txt