Explore
Search and filter entries by category, kind, and maturity.
156 results
. Xray-core
. Xray-core is a platform/stack used to build and manage circumvention configurations.
platformproduction
Adaptive MTU Manipulation
Adaptive MTU Manipulation is a technique used to evade filtering and fingerprinting.
techniqueproduction
AmneziaWG
AmneziaWG is a technique used to evade filtering and fingerprinting.
techniqueproduction
Android VpnService
Android VpnService is an infrastructure approach used to relay or hide traffic at scale.
infrastructureproduction
AnyTLS
AnyTLS is a platform/stack used to build and manage circumvention configurations.
platformproduction
Apple Network Extension
Apple Network Extension is an infrastructure approach used to relay or hide traffic at scale.
infrastructureproduction
AWS CloudFront
AWS CloudFront is an infrastructure approach used to relay or hide traffic at scale.
infrastructureproduction
Azure Front Door
Azure Front Door is an infrastructure approach used to relay or hide traffic at scale.
infrastructureproduction
Begzar
Begzar is an end-user application used for censorship circumvention.
appconsumer
Bridgefy
Bridgefy is a platform/stack used to build and manage circumvention configurations.
platformproduction
Ceno Browser
Ceno Browser is a platform/stack used to build and manage circumvention configurations.
platformproduction
Cirripede
Cirripede: Tor bridge distribution with client registration to resist active probing.
techniqueproduction
Clients
Clients is an end-user application used for censorship circumvention.
appconsumer
Cloak
Cloak is a technique used to evade filtering and fingerprinting.
techniqueproduction
Cloudflare WARP
Cloudflare WARP is an end-user application used for censorship circumvention.
appconsumer
Cloudflare Workers
Cloudflare Workers is an infrastructure approach used to relay or hide traffic at scale.
infrastructureproduction
Conjure
Conjure is a transport/encapsulation method used to carry or disguise traffic.
transportproduction
Connection Coalescing
Connection Coalescing is a technique used to evade filtering and fingerprinting.
techniqueproduction
CovertCast
CovertCast: Tunnels website content into live video streams, mimicking streaming services.
techniqueresearch
Defyx VPN
Defyx VPN is an end-user application used for censorship circumvention.
appconsumer
DeltaShaper
DeltaShaper: Synthesizes video streams to carry hidden data, evading DPI by looking like legitimate media.
techniqueresearch
dns2tcp
dns2tcp: TCP over DNS, with emphasis on multiplexing for better throughput in hidden mode.
protocolproduction
DNSCat2
DNSCat2 is a protocol commonly used for VPN/proxy and censorship circumvention deployments.
protocolproduction
DNSCrypt
DNSCrypt is a protocol commonly used for VPN/proxy and censorship circumvention deployments.
protocolproduction
DNSTT
DNSTT is a protocol commonly used for VPN/proxy and censorship circumvention deployments.
protocolproduction
DoH
DoH is a protocol commonly used for VPN/proxy and censorship circumvention deployments.
protocolproduction
Domain Fronting
Domain Fronting is a technique used to evade filtering and fingerprinting.
techniqueproduction
DoT
DoT is a protocol commonly used for VPN/proxy and censorship circumvention deployments.
protocolproduction
DPI Fragmentation
DPI Fragmentation is a technique used to evade filtering and fingerprinting.
techniqueproduction
Dust
Dust: Polymorphic protocol engine that randomizes traffic to evade signature-based detection.
platformproduction
Dynamic Cloudflare IP Rotation
Dynamic Cloudflare IP Rotation is an infrastructure approach used to relay or hide traffic at scale.
infrastructureproduction
eBPF
eBPF: Extended Berkeley Packet Filter for kernel-level traffic morphing without full VPN overhead.
infrastructureproduction
ESNI
ESNI is a technique used to evade filtering and fingerprinting.
techniqueproduction
Fastly Compute@Edge
Fastly Compute@Edge is an infrastructure approach used to relay or hide traffic at scale.
infrastructureproduction
Flashproxy
Flashproxy: JavaScript-based proxies using WebSockets in browsers, now deprecated but clever for ad-hoc use.
transportdeprecated
Flow Camouflage
Flow Camouflage: Blending traffic into background noise, e.g., mimicking VoIP jitter.
techniqueproduction
Flow Multiplexing
Flow Multiplexing is a technique used to evade filtering and fingerprinting.
techniqueproduction
Fly.io
Fly.io is an infrastructure approach used to relay or hide traffic at scale.
infrastructureproduction
Freedom Guard
Freedom Guard is an end-user application used for censorship circumvention.
appconsumer
Freegate
Freegate: Dynamic Internet Technology’s proxy tool, similar to DynaWeb, using peer-to-peer elements.
appconsumer
Freenet
Freenet: Peer-to-peer platform for censored content storage with plausible deniability.
platformproduction
FTE
FTE is a transport/encapsulation method used to carry or disguise traffic.
transportproduction
Garden Networks
Garden Networks: Decentralized proxy chaining system from the early 2000s.
appconsumer
Geneva
Geneva is a technique used to evade filtering and fingerprinting.
techniqueproduction
Geneve
Geneve: Generic Network Virtualization Encapsulation, adaptable for tunneling over UDP with low visibility.
transportproduction
Geph
Geph is an end-user application used for censorship circumvention.
appconsumer
GFW Knocker
GFW Knocker is a technique used to evade filtering and fingerprinting.
techniqueproduction
Google Cloud Run
Google Cloud Run is an infrastructure approach used to relay or hide traffic at scale.
infrastructureproduction
Gotapdance
Gotapdance is a transport/encapsulation method used to carry or disguise traffic.
transportproduction
Gpass
Gpass: Encrypted tunneling tool with server rotation, less common now.
appconsumer
GRE
GRE is a technique used to evade filtering and fingerprinting.
techniqueresearch
HTTP/2
HTTP/2 is a transport/encapsulation method used to carry or disguise traffic.
transportproduction
Hysteria
Hysteria is a protocol commonly used for VPN/proxy and censorship circumvention deployments.
protocolproduction
Hysteria 2
Hysteria 2 is a protocol commonly used for VPN/proxy and censorship circumvention deployments.
protocolproduction
I2P
I2P: Invisible Internet Project, overlay network for anonymous hosting and browsing.
platformproduction
ICMP Tunnelling
ICMP Tunnelling is a technique used to evade filtering and fingerprinting.
techniqueresearch
IKEv2
IKEv2 is a protocol commonly used for VPN/proxy and censorship circumvention deployments.
protocolproduction
Infranet
Infranet: Encodes censored content in images or web pages via steganography over HTTP.
techniqueresearch
Iodine
Iodine is a protocol commonly used for VPN/proxy and censorship circumvention deployments.
protocolproduction
IPFS
IPFS: InterPlanetary File System, for mirroring content via content-addressable hashes.
platformproduction
JA3
JA3 is a technique used to evade filtering and fingerprinting.
techniqueproduction
JA4+ Evasion
JA4+ Evasion: Next-gen fingerprint spoofing beyond JA3/JA4.
techniqueproduction
JAP
JAP: Java Anon Proxy, early anonymization with multi-hop mixing.
platformproduction
Juicity
Juicity is a protocol commonly used for VPN/proxy and censorship circumvention deployments.
protocolproduction
KCP
KCP is a transport/encapsulation method used to carry or disguise traffic.
transportproduction
L2TP
L2TP is a protocol commonly used for VPN/proxy and censorship circumvention deployments.
protocolproduction
Lantern
Lantern is an end-user application used for censorship circumvention.
appconsumer
Lyrebird
Lyrebird: Meek variant with enhanced domain fronting.
transportproduction
MahsaNG
MahsaNG is an end-user application used for censorship circumvention.
appconsumer
Management Panels
Management Panels is a platform/stack used to build and manage circumvention configurations.
platformproduction
Marionette
Marionette is a transport/encapsulation method used to carry or disguise traffic.
transportproduction
MASQUE
MASQUE is a transport/encapsulation method used to carry or disguise traffic.
transportproduction
meek
meek is a transport/encapsulation method used to carry or disguise traffic.
transportproduction
Meshtastic
Meshtastic is a platform/stack used to build and manage circumvention configurations.
platformproduction
Mieru
Mieru is a protocol commonly used for VPN/proxy and censorship circumvention deployments.
protocolproduction
NaiveProxy
NaiveProxy is a platform/stack used to build and manage circumvention configurations.
platformproduction
Nostr
Nostr is a platform/stack used to build and manage circumvention configurations.
platformproduction
NymVPN
NymVPN is a technique used to evade filtering and fingerprinting.
techniqueresearch
obfsproxy
obfsproxy is a transport/encapsulation method used to carry or disguise traffic.
transportproduction
ODoH
ODoH is a protocol commonly used for VPN/proxy and censorship circumvention deployments.
protocolproduction
OpenVPN
OpenVPN is a protocol commonly used for VPN/proxy and censorship circumvention deployments.
protocolproduction
Ouinet
Ouinet is a platform/stack used to build and manage circumvention configurations.
platformproduction
Outline
Outline: Shadowsocks-based VPN manager, but with emphasis on self-hosted servers for obscurity.
appconsumer
Packet Fragmentation
Packet Fragmentation is a technique used to evade filtering and fingerprinting.
techniqueproduction
Packet Obfuscation
Packet Obfuscation is a technique used to evade filtering and fingerprinting.
techniqueproduction
Packet Size Randomization
Packet Size Randomization is a technique used to evade filtering and fingerprinting.
techniqueproduction
Paquet
Paquet is a technique used to evade filtering and fingerprinting.
techniqueproduction
Peacefire Circumventor
Peacefire Circumventor: Early CGI-based proxy installer for creating personal proxies.
appconsumer
Phantun
Phantun is a technique used to evade filtering and fingerprinting.
techniqueproduction
PPTP
PPTP is a protocol commonly used for VPN/proxy and censorship circumvention deployments.
protocoldeprecated
Protocol Randomization
Protocol Randomization: Dynamic mutation of headers via tools like Dust.
techniqueproduction
ProxyCloud
ProxyCloud is an end-user application used for censorship circumvention.
appconsumer
Psiphon
Psiphon is an end-user application used for censorship circumvention.
appconsumer
Publius
Publius: Deniable publishing system that distributes encrypted fragments across servers.
techniqueresearch
Purlite
Purlite is an end-user application used for censorship circumvention.
appconsumer
QUIC
QUIC is a transport/encapsulation method used to carry or disguise traffic.
transportproduction
Raw Packet Injection
Raw Packet Injection is an infrastructure approach used to relay or hide traffic at scale.
infrastructureproduction
Raw Socket Transport
Raw Socket Transport is an infrastructure approach used to relay or hide traffic at scale.
infrastructureproduction
REALITY
REALITY is a technique used to evade filtering and fingerprinting.
techniqueproduction
RestTLS
RestTLS is a technique used to evade filtering and fingerprinting.
techniqueproduction
Rookery
Rookery: Automated bridge management for hidden relay discovery.
techniqueproduction
Rosenpass
Rosenpass is a technique used to evade filtering and fingerprinting.
techniqueresearch
Salmon
Salmon: Experimental protocol for adaptive obfuscation, rarely implemented.
protocolexperimental
Salty
Salty: QUIC-based with salt-added obfuscation for fingerprint resistance.
protocolproduction
ScrambleSuit
ScrambleSuit is a transport/encapsulation method used to carry or disguise traffic.
transportproduction
Shadowsocks
Shadowsocks is a platform/stack used to build and manage circumvention configurations.
platformproduction
ShadowsocksR
ShadowsocksR is a platform/stack used to build and manage circumvention configurations.
platformproduction
ShadowTLS
ShadowTLS is a technique used to evade filtering and fingerprinting.
techniqueproduction
Sing-box
Sing-box is a platform/stack used to build and manage circumvention configurations.
platformproduction
SingBox
SingBox: Alternative to Xray/V2Ray with modular protocol support.
platformproduction
Slipstream
Slipstream is a technique used to evade filtering and fingerprinting.
techniqueproduction
SlowDNS
SlowDNS: Low-bandwidth DNS tunneling for stealthy, slow data exfiltration.
protocolproduction
SNI Masquerading
SNI Masquerading is a technique used to evade filtering and fingerprinting.
techniqueproduction
Snowflake
Snowflake is a transport/encapsulation method used to carry or disguise traffic.
transportproduction
Snowflake Proxy
Snowflake Proxy is a transport/encapsulation method used to carry or disguise traffic.
transportproduction
Snowstorm
Snowstorm is a technique used to evade filtering and fingerprinting.
techniqueresearch
SoftEther
SoftEther is a protocol commonly used for VPN/proxy and censorship circumvention deployments.
protocolproduction
SRv6
SRv6: Segment Routing over IPv6, for path obfuscation in research setups.
transportresearch
SSTP
SSTP is a protocol commonly used for VPN/proxy and censorship circumvention deployments.
protocolproduction
StegoTorus
StegoTorus: Steganography-enhanced Tor, hiding data in image or audio payloads.
techniqueresearch
Sudoku
Sudoku is a technique used to evade filtering and fingerprinting.
techniqueresearch
Tangler
Tangler: Entangles files with others for deniability and reconstruction.
techniqueresearch
TapDance
TapDance is a transport/encapsulation method used to carry or disguise traffic.
transportproduction
TCP
TCP is a transport/encapsulation method used to carry or disguise traffic.
transportproduction
TCP-over-DNS
TCP-over-DNS is a protocol commonly used for VPN/proxy and censorship circumvention deployments.
protocolproduction
TCP-over-QUIC
TCP-over-QUIC is a protocol commonly used for VPN/proxy and censorship circumvention deployments.
protocolproduction
the Nym Mixnet
the Nym Mixnet is a technique used to evade filtering and fingerprinting.
techniqueresearch
Timing Obfuscation
Timing Obfuscation is a technique used to evade filtering and fingerprinting.
techniqueproduction
TLS
TLS is a transport/encapsulation method used to carry or disguise traffic.
transportproduction
TLS Fingerprint Mimicry
TLS Fingerprint Mimicry is a technique used to evade filtering and fingerprinting.
techniqueproduction
TLS Padding
TLS Padding is a technique used to evade filtering and fingerprinting.
techniqueproduction
Tor Browser
Tor Browser is an end-user application used for censorship circumvention.
appconsumer
Traffic Morphing
Traffic Morphing is a technique used to evade filtering and fingerprinting.
techniqueproduction
Triangle Boy
Triangle Boy: SafeWeb’s randomized proxy network, now defunct but influential.
appdeprecated
Trojan
Trojan is a platform/stack used to build and manage circumvention configurations.
platformproduction
TUIC
TUIC is a protocol commonly used for VPN/proxy and censorship circumvention deployments.
protocolproduction
Tuic v5
Tuic v5 is a protocol commonly used for VPN/proxy and censorship circumvention deployments.
protocolproduction
TUN/TAP Interfaces
TUN/TAP Interfaces is an infrastructure approach used to relay or hide traffic at scale.
infrastructureproduction
UDP Hole Punching
UDP Hole Punching is a technique used to evade filtering and fingerprinting.
techniqueresearch
UDP-over-QUIC
UDP-over-QUIC is a protocol commonly used for VPN/proxy and censorship circumvention deployments.
protocolproduction
UDP2raw
UDP2raw is a technique used to evade filtering and fingerprinting.
techniqueproduction
UltraSurf
UltraSurf: Windows-based proxy with dynamic server discovery and encryption.
appconsumer
Userspace TCP/IP Stacks
Userspace TCP/IP Stacks is an infrastructure approach used to relay or hide traffic at scale.
infrastructureproduction
V2Ray Core
V2Ray Core is a platform/stack used to build and manage circumvention configurations.
platformproduction
Vercel Edge Functions
Vercel Edge Functions is an infrastructure approach used to relay or hide traffic at scale.
infrastructureproduction
VLESS
VLESS is a platform/stack used to build and manage circumvention configurations.
platformproduction
VMess
VMess is a platform/stack used to build and manage circumvention configurations.
platformproduction
VoIP Tunneling
VoIP Tunneling: e.g., via SIP or RTP protocols in tools like OpenSIPS for audio-disguised data.
techniqueresearch
VXLAN
VXLAN is a technique used to evade filtering and fingerprinting.
techniqueresearch
Waterfall
Waterfall: Experimental PT for cascading obfuscation layers.
transportexperimental
WebRTC
WebRTC is a transport/encapsulation method used to carry or disguise traffic.
transportproduction
WebSocket
WebSocket is a transport/encapsulation method used to carry or disguise traffic.
transportproduction
WebTunnel
WebTunnel is a transport/encapsulation method used to carry or disguise traffic.
transportproduction
WireGuard
WireGuard is a protocol commonly used for VPN/proxy and censorship circumvention deployments.
protocolproduction
XHTTP
XHTTP is a technique used to evade filtering and fingerprinting.
techniqueproduction
XTLS-Vision
XTLS-Vision is a technique used to evade filtering and fingerprinting.
techniqueproduction