A curated list of awesome Censorship Circumvention resources (research, protocols, libraries, tools and events.)
A survey of protocols being used in the wild.
Circumvention solutions, or tools that incorporate some form of circumvention.
- Outline Server An Outline server runs instances of Shadowsocks proxies and provides an API used by the Outline Manager application.
- AmneziaVPN Amnezia is an open-source VPN client, with a key feature that enables you to deploy your own VPN server. It uses the OpenVPN, WireGuard, Shadowsocks, IKev2 and Cloak protocols.
- psiphon
- warp-plus Warp-Plus is an open-source implementation of Cloudflare's Warp, enhanced with Psiphon integration for circumventing censorship.
Libraries and toolkits to build your own tools.
- bepass Bepass is an advanced tool designed to bypass Iran's Deep Packet Inspection (DPI) system using a TLS client hello splitting attack. It also enables the deployment of a VLESS-like proxy on Cloudflare Workers.
- cloak A pluggable transport.
- dnstt Userspace DNS tunnel with support for DoH and DoT
- gluetun vpn client Dockerized, multi-provider VPN.
- gost Go Simple Tunnel is a polyglot multi-purpose proxy that speaks differen obfuscation protocols. Has cool features like dynamic service configuration.
- outline SDK A library to add network-level interference protection to existing apps.
- snowflake Pluggable Transport using WebRTC, inspired by Flashproxy.
- swgp-go 🐉 Simple WireGuard proxy with minimal overhead for WireGuard traffic.
- v2ray-core
- water W.A.T.E.R.: WebAssembly Transport Executables Runtime
- DPYProxy A python proxy that implements DPI evasion mechanisms. Currently, TLS record fragmentation and TCP Fragmentation are implemented.
- geneva automated censorship evasion for the client-side and server-side.
- arti Tor, in rust.
- proteus Programmable Protocols for Censorship Circumvention.
- wstunnel Tunnel all your traffic over Websockets or HTTP2
- hoogmoon-testing Preconfigured operating system image for reliable remote access to the Linux shell inside the image over the Internet in general, for long-running network interference/censorship tests in particular.
- Measuring and circumventing Internet censorship Phillipp Winter (2014).
- Towards more Effective Censorship Resistance Systems Tariq Elahi (2015).
- Threat modeling and circumvention of Internet censorship David Fifield (2017).
- Recipes for Resistance: A Censorship Circumvention Cookbook Cecylia Bocovich (2018).
- Censored Planet
- CensorFail
- Project X Home of XTLS, Xray, V2Ray
- Roskomsvoboda
- OONI
- FOCI Free and Open Coomunications on the Internet
- Great Firewall Report
- DPI detector VPN Protocols Availability Monitoring in Russia
Contributions welcome! Read the contribution guidelines first.