timbrs

Переделка GO-реализации на C

11
0
100% credibility
Found Mar 07, 2026 at 11 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
C
AI Summary

A helper program that disguises secure VPN tunnel traffic as ordinary internet data, built specifically for popular home routers.

How It Works

1
🔍 Hear about hidden VPN

You learn about a way to make your router's secure connection look like everyday web browsing to avoid blocks.

2
📥 Grab the ready package

Download the simple file made just for your router type from the shared page.

3
⚙️ Add your connection info

Enter your secure tunnel addresses and special codes into the easy settings.

4
🚀 Turn it on with one go

Start the helper on your router, and it quietly wraps your secure traffic in disguise.

5
📡 Link your devices

Connect your phone, laptop, or anything to the router as usual.

Enjoy private browsing

Your internet flows freely and safely, looking normal to anyone watching.

Sign up to see the full architecture

4 more

Sign Up Free

Star Growth

See how this repo grew from 11 to 11 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is amneziawg-mikrotik-c?

This C-based proxy rewrites WireGuard packets into AmneziaWG format for obfuscation, letting you tunnel traffic past deep packet inspection on restrictive networks. Deploy it as a lightweight UDP client or server via static binaries or Docker containers optimized for MikroTik RouterOS, with multi-arch support for ARM and x86_64. Configure padding sizes, junk bursts, and custom cover packets via env vars like AWG_S1 or AWG_I1 templates.

Why is it gaining traction?

Unlike heavier Go versions, this delivers tiny static builds that run efficiently in RouterOS containers without runtime overhead, perfect for edge routers. Features like variable header ranges, junk flooding on handshakes, and CPS-generated decoy traffic (timestamps, counters, alphanum strings) make obfuscation tunable against real-world DPI. Docker tarballs for RouterOS 7.20 LT simplify amneziawg mikrotik client and container setups.

Who should use this?

MikroTik admins hiding WireGuard VPNs on censored ISPs, or homelabbers proxying amneziawg mikrotik traffic through RouterOS. Ideal for IoT gateway owners needing stealth tunnels, or devs testing custom padding/junk in constrained environments like ARMv5 routers.

Verdict

Grab it if you're on MikroTik and need a lean AmneziaWG proxy—tests cover core transforms, builds are polished for containers. At 11 stars and 1.0% credibility, it's early but functional for prototypes; pair with upstream docs for production.

(187 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.