Rainman69

Rainman69 / SNISPF

Public

SNISPF - Cross-Platform SNI Spoofing & DPI Bypass Tool

46
16
100% credibility
Found Apr 14, 2026 at 46 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
Python
AI Summary

SNISPF is a cross-platform command-line proxy tool designed to bypass internet censorship by altering the initial connection messages that firewalls inspect.

How It Works

1
😩 Facing Blocked Websites

You try to visit your favorite sites but a firewall stops you from seeing them.

2
📥 Get the Helper Tool

You download the simple tool that acts like a smart middleman to sneak past blocks.

3
🚀 Start Your Helper

With one easy command, you launch the helper and tell it a pretend website name that firewalls allow.

4
🌐 Connect Your Browser

You change your browser or app settings to go through your local helper on your computer.

5
🔄 Test the Connection

You visit a blocked site and watch as the helper disguises your request to slip through.

🎉 Browse Freely

Now you can access any website smoothly, like the block never existed.

Sign up to see the full architecture

4 more

Sign Up Free

Star Growth

See how this repo grew from 46 to 46 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is SNISPF?

SNISPF is a lightweight Python CLI tool for cross-platform SNI spoofing and DPI bypass. It runs as a local TCP proxy, intercepting your app's TLS ClientHello messages and either fragmenting them or injecting fake SNI to evade censorship firewalls. Install via pip, run `snispf -l :40443 -c 1.1.1.1:443 -s www.google.com`, then point browsers or V2Ray at localhost:40443 for seamless forwarding.

Why is it gaining traction?

Zero dependencies beyond Python 3.8, no root needed for core fragmentation, and Docker support make it dead simple across Windows, macOS, Linux, even Android Termux. Multiple methods—fragment, fake_sni, combined—let you tweak for stubborn DPI, with config files and `--info` to check platform capabilities. Recent fixes enable raw injection on Linux root for pro-level spoofing without handshake breaks.

Who should use this?

Proxy chainers pairing with V2Ray/Xray for extra SNI layers in censored regions like China or Iran. Network testers probing firewall evasion without WinDivert drivers. Devs accessing blocked CDNs for builds or APIs when standard proxies fail.

Verdict

Try it if DPI bypass is your blocker—excellent docs and quickstart beat most tools, despite 46 stars and 1.0% credibility signaling early maturity. MIT-licensed with tests; monitor issues before production.

(187 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.