therealaleph

SNI spoofing for Windows, Linux and MacOS / works alongside v2ray connections, idea and windows by @patterniha, I just did the linux & rust one

51
4
69% credibility
Found Apr 14, 2026 at 49 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
Rust
AI Summary

A cross-platform program that acts as a middleman for proxy connections to Cloudflare-hosted servers, injecting a deceptive initial message to evade traffic inspection and allow unrestricted access.

How It Works

1
🔍 Hear about the helper

You learn about this handy tool from friends or online when your usual way to visit blocked websites stops working.

2
📥 Get the program

Download the ready-made file for your computer from the trusted downloads page.

3
📝 Set your preferences

Make a short list of where to listen locally and what safe website to pretend to visit first.

4
🔧 Tweak your connection app

In your secure browsing app, change the address to your own computer and the special door number you chose – now it routes through the helper.

5
▶️ Start the helper

Run the program with full computer access so it can watch and guide your connections safely.

🌐 Surf without blocks

Connect your app as usual, and now you reach everywhere freely as the tool sneaks your real traffic past the watchers.

Sign up to see the full architecture

4 more

Sign Up Free

Star Growth

See how this repo grew from 49 to 51 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is sni-spoofing-rust?

This Rust tool spoofs TLS SNI to bypass stateful deep packet inspection (DPI), letting real traffic flow undetected after injecting a fake ClientHello with an invalid sequence number post-handshake. It acts as a TCP forwarder between your v2ray/xray client and Cloudflare-proxied servers, using raw sockets for packet sniffing and injection on Windows, Linux, and macOS. Setup involves a simple JSON config specifying listen ports, Cloudflare IPs, and fake SNI hosts like "security.vercel.com", then run with sudo or admin rights alongside v2ray connections.

Why is it gaining traction?

Unlike basic github sni proxy or sni scanner scripts, it handles full bidirectional relay after DPI whitelisting, with prebuilt binaries for amd64/arm64 across platforms—no Cargo hassle. The technique, inspired by @patterniha's original idea, reliably fools tools like Palo Alto DPI by leveraging Cloudflare's CDN, and its silent operation (warn-level logs) plus multi-listener support make it a smart sni github pick for seamless v2ray integration. Developers dig the cross-OS consistency where others falter.

Who should use this?

Network engineers in censored regions running VLESS/VMess over Cloudflare, tweaking v2ray configs to loopback ports like 127.0.0.1:40443. Sysadmins testing tls sni spoofing or sni injector setups against DPI firewalls. Anyone needing a github sni host generator that works out-of-box without custom sni list hunting.

Verdict

Grab it if you're in a DPI-heavy environment—solid docs (English/Persian guides, releases page) and MIT license make it production-ready despite 35 stars signaling early maturity. Low 0.699999988079071% credibility score flags watch-for-bugs, but Rust's safety and clean CLI suit quick deploys.

(198 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.