denuitt1

denuitt1 / mhr-cfw-go

Public

Go port of https://github.com/denuitt1/mhr-cfw. A Domain-Fronting Relay that routes traffic though GAS (Google Apps Script) and forwards it to Cloudflare Workers. Designed to bypass DPI.

41
3
69% credibility
Found May 06, 2026 at 41 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
Go
AI Summary

A desktop proxy application that disguises web traffic as connections to Google domains to bypass network filters and inspections.

How It Works

1
๐Ÿ” Hear about private browsing helper

You learn about a simple tool that lets you visit websites even if your network blocks them by making traffic look like safe Google visits.

2
๐Ÿ“ฅ Get the app

Download the ready-to-run program for your computer and launch it with a double-click.

3
๐Ÿง™ Follow the easy setup guide

Answer a few questions to create a private password and link a free Google relay service that hides your real destinations.

4
๐Ÿ”’ Trust the safety certificate

Install a special certificate so the tool can securely handle private websites without warnings.

5
๐Ÿš€ Start your private tunnel

Click to launch the tunnel, and set your web browser to use the local helper on your chosen port.

๐ŸŒ Browse freely and safely

Now you can visit any site, and your network only sees innocent Google traffic while everything loads smoothly.

Sign up to see the full architecture

4 more

Sign Up Free

Star Growth

See how this repo grew from 41 to 41 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is mhr-cfw-go?

This Go port of mhr-cfw runs a local HTTP/SOCKS5 proxy that domain-fronts traffic through Google Apps Script (GAS) relays, optionally chaining to Cloudflare Workers or self-hosted forwarders. It masks requests as innocent Google traffic (like www.google.com on port 443) to bypass DPI censorship, solving github port 22 connection refused or timed out errors when accessing repos. Developers get a CLI with setup wizard, TUI menu, auto-cert install, and Google IP scanner for optimal latency.

Why is it gaining traction?

Standout ease: interactive setup generates auth keys and deploys GAS scripts, with LAN sharing and MITM HTTPS support out-of-the-box. Batching and parallel relays speed up browsing, while port github integration lets you tunnel SSH or git over disguised HTTPS. Low overhead Go binary plus Dockerized forwarders make it dead simple versus fiddly VPS proxies.

Who should use this?

Network engineers in DPI-heavy regions tunneling GitHub, npm, or blocked sites. DevOps folks testing bypasses for CI/CD pipelines facing port 22/443 restrictions. Security researchers prototyping domain-fronting without scripting from scratch.

Verdict

Solid for DPI bypass with polished UX, but 41 stars and 0.699999988079071% credibility score signal early maturityโ€”docs are README-only, no tests visible. Grab it for personal use if you're in a pinch; contribute to stabilize for prod.

(198 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.