wstunnel
udptunnel
wstunnel | udptunnel | |
---|---|---|
16 | 1 | |
4,907 | 692 | |
2.4% | 0.3% | |
9.2 | 0.0 | |
3 days ago | almost 3 years ago | |
Rust | C | |
BSD 3-clause "New" or "Revised" License | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
wstunnel
-
WsTunnel – Tunnel Your Traffic over WebSocket or HTTP2 – Bypass Firewalls/DPI
- Complete rewrite fron Haskell to Rust
Hope you enjoy and find it useful :-)
https://github.com/erebe/wstunnel?tab=readme-ov-file#underst...
-
List of ngrok/Cloudflare Tunnel alternatives and other tunneling software and services. Focus on self-hosting.
wstunnel - Proxies over WebSockets. Focus on proxying from behind networks that block certain protocols. Written in Rust with executables provided.
-
Russia has started indiscriminately blocking all OpenVPN/WireGuard connections
Shameless plug, there is also wstunnel (i am its author) https://github.com/erebe/wstunnel/, hope you enjoy.
- Tunnel all your traffic over WebSocket protocol
-
SSH3: SSH using HTTP/3 and QUIC
If you want to tunnel UDP (WireGuard) or TCP (SSH) over WebSocket protocol, check out https://github.com/erebe/wstunnel
-
Russia starts blocking VPN at the protocol (WireGuard, OpenVPN) level
While working in an environment where VPN connections were pretty much all blocked⁰ a friend of mine had success using https://guacamole.apache.org/ to access a remote machine¹. Not quite the same as a direct VPN connection but worth a try if nothing else functions, it looks enough like normal HTTPS traffic that he got away with it.
To keep your wireguard setup more as-is, you could try https://kirill888.github.io/notes/wireguard-via-websocket/ to tunnel that via a web server. In fact https://github.com/erebe/wstunnel which that uses could be used just as well with any other UDP based VPN.
I once tinkered with https://github.com/yarrick/iodine and successfully connected to resources over the wireless on a train, bypassing its traffic capture and sign-up requirement, so that might be an option, though I think fully blocking external DNS is more common now so this is less likely to work²³.
--
[0] practically only HTTP(S) permitted, not even SSH, DPI in use that detected just using SSH or OpenVPN over port 443
[1] NOTE: be careful breaching restrictions like this, you are at risk of an insta-sacking if discovered, or worse if operating in some securiry environments!
[2] and the latency when it does work is significant!
[3] and that much traffic over port 53 might get noticed by the heuristics of data exfiltration scanner, encouraging sysadmins to notice and implement a way to block it
- Wireguard over WebSocket Tunnel
-
Requesting Help bypassing CGNAT with Wireguard - Connecting Plex to a VPS and then to a domain.
You can try with this project, https://github.com/erebe/wstunnel.
- wstunnel - Tunneling over websocket protocol
- GoodbyeDPI: Deep Packet Inspection circumvention utility
udptunnel
-
Wireguard over TCP - reviewing existing options to date
- udptunnel : seems one of the best implementations to date. Can be installed with Wireguard, and even has a Homebrew package and an OpenWRT package. But it can be specifically detected by Wireshark and some firewalls such as Fortinet/Fortiguard.
What are some alternatives?
udp2raw - A Tunnel which Turns UDP Traffic into Encrypted UDP/FakeTCP/ICMP Traffic by using Raw Socket,helps you Bypass UDP FireWalls(or Unstable UDP Environment)
docker-wireguard
udp2raw-tunnel - A Tunnel which Turns UDP Traffic into Encrypted UDP/FakeTCP/ICMP Traffic by using Raw Socket,helps you Bypass UDP FireWalls(or Unstable UDP Environment) [Moved to: https://github.com/wangyu-/udp2raw]
shadowsocks-rust - A Rust port of shadowsocks
Cloak - A censorship circumvention tool to evade detection by authoritarian state adversaries