selfishblackberry177

Go port of @patterniha's SNI spoofing / DPI bypass TCP forwarder (Linux)

43
7
69% credibility
Found Apr 14, 2026 at 42 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
Go
AI Summary

A Linux tool that acts as a local forwarder for secure connections, disguising the initial greeting to evade network filters.

How It Works

1
đź‘‚ Discover the helper

You hear from a friend about a special tool that disguises your web connections to slip past internet blocks.

2
đź’» Get the program ready

You download the files to your Linux computer and prepare the simple app.

3
📝 Set your preferences

You create a short list noting the destination site, your local entry point, and a harmless fake name to show first.

4
🚀 Launch the protector

You start the protector app with full computer permissions, and it begins watching your connections.

5
đź”— Redirect your traffic

You update your VPN or secure browser to send requests through the new local doorway instead of directly.

âś… Connections flow freely

Your real web visits happen safely hidden, while blocks think it's something allowed.

Sign up to see the full architecture

4 more

Sign Up Free

Star Growth

See how this repo grew from 42 to 43 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is sni-spoof?

sni-spoof is a Linux TCP forwarder in Go that bypasses stateful DPI by spoofing SNI during TLS handshakes—it's a direct port of @patterniha's original Windows tool. You configure a local listen port (like 40443), target upstream IP/port (say github port 443), and a fake SNI host such as security.vercel.com; clients like curl spoof sni or xray point there instead of the real endpoint. It injects the fake ClientHello post-handshake to whitelist the flow, letting real traffic (including github port 22 or 443) sail through undetected, dodging connection refused or timed out errors.

Why is it gaining traction?

Unlike generic proxies, this SNI spoofer targets DPI precisely by tricking inspectors before your real SNI hits—perfect for curl spoof sni tricks or spoof sni iran setups where broad blocks kill github port 443 access. The dead-simple config.json and sudo-run model beats fiddly port github integration or port scanners, with logs confirming fake injection and server ACKs. Devs grab it for quick DPI bypass on Linux without WinDivert hacks.

Who should use this?

Proxy users in censored regions fighting DPI on github port 22 connection refused or port 443 timeouts. DevOps needing sni spoofing это for xray/V2Ray to spoof sni host reliably. Anyone tired of github port checker tools failing—run it as a forwarder for seamless bypass.

Verdict

Grab it if DPI blocks your workflow—39 stars and solid README make setup straightforward, but the 0.699999988079071% credibility score flags its niche youth; test on non-prod first as a single-file forwarder with no tests. Promising sni spoofer for Linux DPI wars.

(198 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.