Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
16 changes: 8 additions & 8 deletions docs/Client Side/Clients.ru.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,14 +2,14 @@

## Для ПК

* ⭐ [v2rayN](https://github.com/2dust/v2rayN) — Windows / Mac / Linux
* [Hiddify](https://hiddify.com/) — Windows / Mac / Linux
* ⭐ [Sing-Box](https://github.com/SagerNet/sing-box) — Windows / Mac / Linux
- ⭐ [v2rayN](https://github.com/2dust/v2rayN) — Windows / Mac / Linux
- [Hiddify](https://hiddify.com/) — Windows / Mac / Linux
- ⭐ [Sing-Box](https://github.com/SagerNet/sing-box) — Windows / Mac / Linux

## Для мобильных устройств

* ⭐ [NekoBoxForAndroid](https://github.com/MatsuriDayo/NekoBoxForAndroid) — Android
* ⭐ [Sing-Box](https://github.com/SagerNet/sing-box) — iOS / Android
* [Hiddify](https://hiddify.com/) — Android / iOS
* [V2RayNG](https://github.com/2dust/v2rayNG) — Android
* [Matsuri](https://matsuridayo.github.io/) — Android
- ⭐ [NekoBoxForAndroid](https://github.com/MatsuriDayo/NekoBoxForAndroid) — Android
- ⭐ [Sing-Box](https://github.com/SagerNet/sing-box) — iOS / Android
- [Hiddify](https://hiddify.com/) — Android / iOS
- [V2RayNG](https://github.com/2dust/v2rayNG) — Android
- [Matsuri](https://matsuridayo.github.io/) — Android
2 changes: 1 addition & 1 deletion docs/Client Side/Networking.en.md
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ Let me walk you through each method one by one.

### Direct Connection

Pretty easy to understand—it uses **NaiveProxy** or the **V2Ray suite** to connect directly to the proxy server. The upside is that it’s very simple to run and the cheapest option. The downside is that it can be very, *very* slow during peak hours (like 10 p.m. in China), and it’s also very easy to block if detected as a proxy server.
Pretty easy to understand—it uses **NaiveProxy** or the **V2Ray suite** to connect directly to the proxy server. The upside is that it’s very simple to run and the cheapest option. The downside is that it can be very, _very_ slow during peak hours (like 10 p.m. in China), and it’s also very easy to block if detected as a proxy server.

---

Expand Down
2 changes: 1 addition & 1 deletion docs/Client Side/Networking.ru.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@

Довольно просто для понимания — используется **NaiveProxy** или набор инструментов **V2Ray** для прямого подключения к прокси-серверу.
Плюс: очень легко настроить и это самый дешёвый вариант.
Минус: может быть *очень* медленным в часы пик (например, в 22:00 по Китаю), и его легко заблокировать, если сервер будет распознан как прокси.
Минус: может быть _очень_ медленным в часы пик (например, в 22:00 по Китаю), и его легко заблокировать, если сервер будет распознан как прокси.

---

Expand Down
2 changes: 0 additions & 2 deletions docs/Misc/safety.en.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,3 @@


# Safety Guide

Using a VPN or proxy always carries risks. Depending on your location, it could even be illegal. Take precautions to protect yourself.
Expand Down
4 changes: 4 additions & 0 deletions docs/Server/Doge.en.md
Original file line number Diff line number Diff line change
@@ -1,8 +1,11 @@
# Doge Unblocker

## **What is Doge Unblocker?**

Doge Unblocker is an advanced and neatly implemented web proxy using Ultraviolent technology. Among the many web proxies, this is standing out in design as well as usability.



### **What is a Web Proxy?**

The web proxy will enable you to visit various websites indirectly by redirecting your connection through a third-party server. While these web proxies are great to bypass restrictions in controlled environments, they support only web traffic.
Expand All @@ -18,6 +21,7 @@ Downsides of Doge Unblocker
2. **Performance Issues**: Speed may be slow based on the server load and quality of connection.

---

How to Set Up Doge Unblocker

1. First, visit the repository of the Doge Unblocker in GitHub: [Doge Unblocker GitHub Repository](https://github.com/DogeNetwork/v4).
Expand Down
87 changes: 87 additions & 0 deletions docs/Server/HolyUB.en.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,87 @@
# Holy Unblocker LTS

## **What is Holy Unblocker LTS?**

Holy Unblocker LTS, an experimental web proxy service, can bypass web filters or "blockers" regardless of whether the method of censorship is client-side or network-based. This includes the potential ability to bypass content blockers from governments, chrome extensions, localized client firewalls, and network-related filters. The project even allows the ability to browse Tor/Onion sites in any browser (even Chromium) all through a website

Out of all web proxies it is the most maintained, available (restocks) and advanced due to it focusing on bypassing filters. The source is randomized and features other techniques such as shadow DOM to be difficult to source block. A good use case of this project would be if you ever needed a clientless solution to use Tor or leave minimal traces of device activity.

### **What is a Web Proxy?**

The web proxy will enable you to visit various websites indirectly by redirecting your connection through a mix of client-side and server-side scripts. While these web proxies are great to bypass restrictions in controlled environments, they support only web traffic.

For more general use cases, for example, accessing desktop applications or creating virtual workspaces, consider using more general-purpose tools such as **Kasm Workspaces**. For simpler needs, a web proxy like Holy Unblocker LTS will do the job.

---

Downsides of Holy Unblocker LTS

1. **Limited Functionality**: Supports only accessing websites over this proxy server which in itself can be limited depending on the site.

2. **Extension Based Filters**: Although this project is equipped with techniques to remain unblocked more difficult extensions can sometimes still target the actual proxy frame. The site itself will be unblocked but the actual browsing frame can be caught due to how assets are rewritten (source cannot exactly be obfuscated even when all leaks are prevented from highly invasive and possibly illegal extensions)

3. **Tor Exit Node:** Even though Holy Unblocker LTS supports Tor you will need to utilize a personal VPS or locally set it up to use it. OR use one of the official links that are restocked frequently in their respective discord server.

---

How to Set Up Holy Unblocker LTS

1. First, visit the repository of the Holy Unblocker in GitHub: [Holy Unblocker GitHub Repository](https://github.com/QuiteAFancyEmerald/Holy-Unblocker).

2. You can then choose to be hosted by any of the deployment providers. Koyeb is considered the best one. Or you can set this project up locally

3. Follow the instructions regarding the chosen hosting provider.

4. Once the setup is complete, click on the given link and start using your proxy!

5. If you wish to self-host below are the commands for setup. You will need Node.js and Git installed.

```bash
git clone https://github.com/titaniumnetwork-dev/Holy-Unblocker.git

cd Holy-Unblocker

# Using the configuration file you can automatically use pm2 if you are hosting on a VPS!
npm run fresh-install
npm start

# Or on subsequent uses...
npm restart

# If you encounter any build errors...
npm run build

# If you encounter any service errors...
npm run proxy-validator
```

For Debian/Ubuntu:

```bash
sudo apt update
sudo apt upgrade
sudo apt install curl git nginx

curl -o- https://raw.githubusercontent.com/nvm-sh/nvm/v0.39.7/install.sh | bash

export NVM_DIR="$HOME/.nvm"
[ -s "$NVM_DIR/nvm.sh" ] && \. "$NVM_DIR/nvm.sh"

nvm install 20
nvm use 20

git clone https://github.com/QuiteAFancyEmerald/Holy-Unblocker.git
cd Holy-Unblocker

npm run fresh-install

# Then edit config.json to change production to true to automatically use pm2

npm start

# Then setup a reverse proxy using NGINX; use the link below for the NGINX guide. You can edit the file in /etc/nginx

sudo systemctl restart nginx

# For Tor look it up for basic setup if you need it depending on the OS. No GUI needed but once it is setup once you start the Tor service it will automatically work with HU LTS
```
30 changes: 19 additions & 11 deletions docs/Server/Hysteria.en.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,17 +10,17 @@

## Key Concepts

| Term | Description |
|--------------------------|-------------------------------------------------------------------------------------------------|
| **Hysteria 2** | A fast, secure proxy designed for reliable internet access, even in restricted environments. |
| **QUIC** | A next-generation transport protocol that improves speed and reliability over UDP. |
| **Bypassing Censorship** | Lets users access restricted content by avoiding traditional detection methods. |
| **UDP Acceleration** | Speeds up data transfers using the faster, connectionless UDP protocol. |
| **Flexible Encryption** | Offers adjustable security settings to fit different needs. |
| **Low Latency** | Ideal for real-time use cases like gaming and live streaming. |
| **High Performance** | Handles demanding tasks such as large file transfers and HD media streaming. |
| **Lightweight** | Runs efficiently with minimal system resource usage. |
| **Easy Setup** | Simple installation process, even for users with limited experience. |
| Term | Description |
| ------------------------ | -------------------------------------------------------------------------------------------- |
| **Hysteria 2** | A fast, secure proxy designed for reliable internet access, even in restricted environments. |
| **QUIC** | A next-generation transport protocol that improves speed and reliability over UDP. |
| **Bypassing Censorship** | Lets users access restricted content by avoiding traditional detection methods. |
| **UDP Acceleration** | Speeds up data transfers using the faster, connectionless UDP protocol. |
| **Flexible Encryption** | Offers adjustable security settings to fit different needs. |
| **Low Latency** | Ideal for real-time use cases like gaming and live streaming. |
| **High Performance** | Handles demanding tasks such as large file transfers and HD media streaming. |
| **Lightweight** | Runs efficiently with minimal system resource usage. |
| **Easy Setup** | Simple installation process, even for users with limited experience. |

---

Expand Down Expand Up @@ -48,6 +48,7 @@
### Step 1: Become Root

Switch to the root user:

```bash
sudo -s
```
Expand All @@ -57,6 +58,7 @@ sudo -s
### Step 2: Install Hysteria 2

Use the official script to install:

```bash
bash <(curl -fsSL https://get.hy2.sh/)
```
Expand All @@ -66,6 +68,7 @@ bash <(curl -fsSL https://get.hy2.sh/)
### Step 3: Generate a Self-Signed SSL Certificate

Run the following to create the certificate:

```bash
openssl req -x509 -nodes -newkey ec:<(openssl ecparam -name prime256v1) \
-keyout /etc/hysteria/server.key \
Expand All @@ -74,6 +77,7 @@ openssl req -x509 -nodes -newkey ec:<(openssl ecparam -name prime256v1) \
```

Adjust file permissions:

```bash
sudo chown hysteria /etc/hysteria/server.key
sudo chown hysteria /etc/hysteria/server.crt
Expand All @@ -86,11 +90,13 @@ sudo chown hysteria /etc/hysteria/server.crt
### Step 4: Start the Server

Start the Hysteria service:

```bash
systemctl start hysteria-server.service
```

And enable it to start at boot:

```bash
systemctl enable hysteria-server.service
```
Expand All @@ -100,6 +106,7 @@ systemctl enable hysteria-server.service
### Step 5: Configure Hysteria 2

Create the configuration file:

```bash
cat << EOF > /etc/hysteria/config.yaml
listen: :443
Expand All @@ -124,6 +131,7 @@ EOF
### Step 6: Apply the Configuration

Restart the server to load the new settings:

```bash
systemctl restart hysteria-server.service
```
Expand Down
12 changes: 6 additions & 6 deletions docs/Server/Hysteria.ru.md
Original file line number Diff line number Diff line change
Expand Up @@ -38,10 +38,10 @@

### Требования

* Linux VPS с открытым портом **443**
* Root-доступ
* Базовые навыки работы с терминалом
* Текстовый редактор (`nano`, `vim`)
- Linux VPS с открытым портом **443**
- Root-доступ
- Базовые навыки работы с терминалом
- Текстовый редактор (`nano`, `vim`)

---

Expand Down Expand Up @@ -103,11 +103,11 @@ tls:
key: /etc/hysteria/server.key
auth:
type: password
password: 123456 # Обязательно смените на сложный пароль!
password: 123456 # Обязательно смените на сложный пароль!
masquerade:
type: proxy
proxy:
url: https://pan.baidu.com # При необходимости замените на другой домен
url: https://pan.baidu.com # При необходимости замените на другой домен
rewriteHost: true
```

Expand Down
8 changes: 4 additions & 4 deletions docs/Server/Kasm.en.md
Original file line number Diff line number Diff line change
Expand Up @@ -35,10 +35,10 @@ Because this is just a website, its fingerprint and everything will match a norm

### Prerequisites:

* A **domain name**
* A **Linux VPS** with port 443 forwarded
* Basic command-line skills
* Root access
- A **domain name**
- A **Linux VPS** with port 443 forwarded
- Basic command-line skills
- Root access

---

Expand Down
8 changes: 4 additions & 4 deletions docs/Server/Kasm.ru.md
Original file line number Diff line number Diff line change
Expand Up @@ -35,10 +35,10 @@ Kasm Workspaces — это высокопроизводительная плат

### Требования:

* Доменное имя
* Linux VPS с пробросом порта 443
* Базовые навыки работы с командной строкой
* Root-доступ
- Доменное имя
- Linux VPS с пробросом порта 443
- Базовые навыки работы с командной строкой
- Root-доступ

---

Expand Down
15 changes: 7 additions & 8 deletions docs/Server/Naïve.en.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,21 +10,20 @@

## Why Choose NaïveProxy?

* **Looks Like Normal Traffic**: Uses Chromium’s TLS stack, so it blends in like any other browser session.
* **Simple to Use**: Easy to set up even if you're not super technical.
- **Looks Like Normal Traffic**: Uses Chromium’s TLS stack, so it blends in like any other browser session.
- **Simple to Use**: Easy to set up even if you're not super technical.

---

## Getting Started with NaïveProxy + Caddy

### What You’ll Need

* A **domain name**, preferably managed through Cloudflare or a similar DNS provider.
* A **Linux VPS** with ports **443** and **80** open.
* **Basic requirements**:

* Some familiarity with the command line
* Root access to your server
- A **domain name**, preferably managed through Cloudflare or a similar DNS provider.
- A **Linux VPS** with ports **443** and **80** open.
- **Basic requirements**:
- Some familiarity with the command line
- Root access to your server

---

Expand Down
15 changes: 7 additions & 8 deletions docs/Server/Naïve.ru.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,21 +10,20 @@

## Почему стоит выбрать NaïveProxy?

* **Выглядит как обычный трафик**: использует TLS-стек Chromium, поэтому сливается с обычным трафиком браузера.
* **Простой в использовании**: легко настроить даже без глубоких технических знаний.
- **Выглядит как обычный трафик**: использует TLS-стек Chromium, поэтому сливается с обычным трафиком браузера.
- **Простой в использовании**: легко настроить даже без глубоких технических знаний.

---

## Начало работы с NaïveProxy + Caddy

### Что вам понадобится

* **Доменное имя**, желательно управляемое через Cloudflare или похожего DNS-провайдера.
* **Linux VPS** с открытыми портами **443** и **80**.
* **Базовые требования**:

* Базовые знания командной строки
* Root-доступ к серверу
- **Доменное имя**, желательно управляемое через Cloudflare или похожего DNS-провайдера.
- **Linux VPS** с открытыми портами **443** и **80**.
- **Базовые требования**:
- Базовые знания командной строки
- Root-доступ к серверу

---

Expand Down
24 changes: 11 additions & 13 deletions docs/Server/Trojan.en.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,3 @@


# Trojan

## **What is Trojan?**
Expand All @@ -10,17 +8,17 @@ Trojan is a powerful proxy tool designed to ensure secure, censorship-resistant

## **Key Terms**

| **Term** | **Definition** |
|--------------------------|-------------------------------------------------------------------------------------------------------------|
| **Trojan** | A proxy tool that provides secure and censorship-resistant communication. |
| **Proxy Tool** | Software that intermediates between a client and a server, often used for anonymity or bypassing restrictions. |
| **Secure Communication**| Methods of exchanging data that prevent unauthorized access or interception. |
| **Censorship-Resistant**| Designed to bypass internet censorship and provide unrestricted access to content. |
| **Mimics HTTPS Traffic**| Imitates secure web traffic to appear as standard HTTPS, avoiding detection by censorship systems. |
| **GFW (Great Firewall)**| A colloquial term referring to China's internet censorship and surveillance system. |
| **Detect and Block** | The process used by systems like the GFW to identify and restrict specific network traffic. |
| **Private Internet Access** | Secure, anonymous browsing that protects user identity and data online. |
| **Unrestricted Internet Access** | The ability to browse and access content online without censorship or limitations. |
| **Term** | **Definition** |
| -------------------------------- | -------------------------------------------------------------------------------------------------------------- |
| **Trojan** | A proxy tool that provides secure and censorship-resistant communication. |
| **Proxy Tool** | Software that intermediates between a client and a server, often used for anonymity or bypassing restrictions. |
| **Secure Communication** | Methods of exchanging data that prevent unauthorized access or interception. |
| **Censorship-Resistant** | Designed to bypass internet censorship and provide unrestricted access to content. |
| **Mimics HTTPS Traffic** | Imitates secure web traffic to appear as standard HTTPS, avoiding detection by censorship systems. |
| **GFW (Great Firewall)** | A colloquial term referring to China's internet censorship and surveillance system. |
| **Detect and Block** | The process used by systems like the GFW to identify and restrict specific network traffic. |
| **Private Internet Access** | Secure, anonymous browsing that protects user identity and data online. |
| **Unrestricted Internet Access** | The ability to browse and access content online without censorship or limitations. |

---

Expand Down
Loading