therealaleph

Rust port of @masterking32's MasterHttpRelayVPN — all credit to @masterking32 for the original idea and Python implementation. Free DPI bypass via a Google Apps Script relay with TLS SNI concealment. CLI + cross-platform desktop UI, HTTP + SOCKS5 proxy, no runtime deps.

85
2
100% credibility
Found Apr 22, 2026 at 85 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
Rust
AI Summary

A desktop proxy application that circumvents internet censorship by disguising user traffic as connections to Google services via a user-deployed Apps Script relay.

How It Works

1
🔍 Hear about a free bypass tool

You learn about this simple app that lets you access blocked websites by hiding your traffic as normal Google visits.

2
📝 Set up your personal relay

Log into your Google account and create a quick free script that acts as your private traffic forwarder.

3
💻 Download and launch the app

Grab the tiny ready-to-run program for your computer and start it up with a single click.

4
🔒 Trust the safety helper

Give permission once to let the app securely handle your web connections, like approving a trusted friend.

5
⚙️ Add your relay details

Fill in a short form with your Google script info so the app knows where to send your traffic.

6
🌐 Connect your browser

Tell your web browser to route through the app, just like choosing a safe path.

🚀 Surf without limits!

Now you can visit any website freely, with blocks bypassed and everything loading smoothly.

Sign up to see the full architecture

5 more

Sign Up Free

Star Growth

See how this repo grew from 85 to 85 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is MasterHttpRelayVPN-RUST?

This Rust port of @masterking32's MasterHttpRelayVPN turns your machine into a local HTTP/SOCKS5 proxy that evades ISP DPI censorship by fronting traffic as TLS to www.google.com, then relaying via a free Google Apps Script you deploy. Browsers and apps like Telegram point to localhost:8085 (HTTP) or :8086 (SOCKS5); it handles MITM TLS termination, caching, and direct tunnels for Google/YouTube domains. Single ~2.5MB portable atomic Rust binaries—no runtime deps—run on Linux/macOS/Windows, with CLI tools (test, scan-ips) and cross-platform desktop UI for config/stats/logs.

Why is it gaining traction?

Stands out as a zero-install drop-in where Python proxies fail: no pip, cryptography deps, or blocked PyPI in hostile nets. Rust GitHub Actions deliver static musl builds for OpenWRT routers (rust port forwarding at its finest), plus upstream SOCKS5 chaining for non-HTTP like Telegram MTProto. Built-in scanners probe Google IPs/SNIs, round-robin quotas across scripts, and live per-site stats beat fiddly alternatives.

Who should use this?

Network engineers in censored regions (Iran, etc.) bypassing DPI for daily browsing/Telegram without paid VPS. Router admins deploying on OpenWRT for LAN proxies. Devs testing rust github workflow integrations or needing rust ports to forward traffic in air-gapped setups.

Verdict

Grab it if DPI blocks your workflow—docs are thorough, setup takes minutes, credits @masterking32 for the core idea. 85 stars and 1.0% credibility score flag early maturity (watch rust github trending), but prebuilts and UI make it production-ready for niches now.

(198 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.