⚠ WARNING: This is an EXPERIMENTAL Project, use it at your own risk!
This is a simple tool that utilizes tls client hello splitting attack in order to bypass the iran's dpi system. It won't work if the target machine's ip is blocked(Yet ?!)
- Supports all Iran's network careers with some tweaks in tls hello packet length
- DOH spport
- SDNS support
- Cross platform
Just install go 1.19+ and run:
go build .
It should give you an executable file, or you can simply run it in place.
go run . -c config.json
In order to deploy this project, you should first find a "DOH" or "SDNS" link that works on your ISP, then edit config.json and fill the "RemoteDNSAddr" field with the dns link that you found!
For example, the following configuration will most likely work on IR-MCI:
{
"TLSHeaderLength": 5,
"RemoteDNSAddr": "https://1.1.1.1/dns-query",
"DnsCacheTTL": 30,
"BindAddress": "127.0.0.1:8085",
"ChunksLengthBeforeSni": [1, 5],
"SniChunksLength": [1, 5],
"ChunksLengthAfterSni": [1, 5],
"DelayBetweenChunks": [1, 10]
}
-
An android version
-
Finding a way to bypass the blocked ips
MIT go nuts!