docs: fix paqet description and add Android client
- Correct description: KCP over raw TCP packets with custom flags (not UDP) - Add paqetNG Android client link to README and TUI About section - Thanks to paqet creator for the correction
This commit is contained in:
13
README.md
13
README.md
@@ -77,8 +77,8 @@ YOUR COMPUTER YOUR VPS INTERNET
|
|||||||
```
|
```
|
||||||
|
|
||||||
**How Paqet bypasses firewalls:**
|
**How Paqet bypasses firewalls:**
|
||||||
1. Uses KCP protocol (reliable UDP) instead of TCP
|
1. Uses KCP protocol over raw TCP packets with custom TCP flags
|
||||||
2. Sends packets via raw sockets, making them look like random UDP traffic
|
2. Sends packets via raw sockets, making them hard to fingerprint
|
||||||
3. DPI systems can't easily identify it as proxy traffic
|
3. DPI systems can't easily identify it as proxy traffic
|
||||||
|
|
||||||
---
|
---
|
||||||
@@ -1030,7 +1030,8 @@ MIT License - See [LICENSE](LICENSE) file.
|
|||||||
|
|
||||||
## Acknowledgments
|
## Acknowledgments
|
||||||
|
|
||||||
- [paqet](https://github.com/hanselime/paqet) - KCP-based proxy with built-in SOCKS5 (original source)
|
- [paqet](https://github.com/hanselime/paqet) - KCP over raw TCP packets with custom flags (original source)
|
||||||
|
- [paqetNG](https://github.com/AliRezaBeigy/paqetNG) - Android client for paqet
|
||||||
- [GFW-knocker](https://github.com/GFW-knocker/gfw_resist_tcp_proxy) - Violated TCP technique
|
- [GFW-knocker](https://github.com/GFW-knocker/gfw_resist_tcp_proxy) - Violated TCP technique
|
||||||
- [aioquic](https://github.com/aiortc/aioquic) - QUIC protocol implementation
|
- [aioquic](https://github.com/aiortc/aioquic) - QUIC protocol implementation
|
||||||
- [scapy](https://scapy.net/) - Packet manipulation library
|
- [scapy](https://scapy.net/) - Packet manipulation library
|
||||||
@@ -1076,13 +1077,13 @@ MIT License - See [LICENSE](LICENSE) file.
|
|||||||
### Paqet (ساده)
|
### Paqet (ساده)
|
||||||
|
|
||||||
```
|
```
|
||||||
[Browser] --> [Paqet Client] --KCP/UDP--> [Paqet Server] --SOCKS5--> [Internet]
|
[Browser] --> [Paqet Client] --KCP/Raw TCP--> [Paqet Server] --SOCKS5--> [Internet]
|
||||||
127.0.0.1:1080 your.vps.ip
|
127.0.0.1:1080 your.vps.ip
|
||||||
```
|
```
|
||||||
|
|
||||||
**نحوه دور زدن فایروال:**
|
**نحوه دور زدن فایروال:**
|
||||||
1. از پروتکل KCP (UDP قابل اطمینان) به جای TCP استفاده میکند
|
1. از پروتکل KCP روی پکتهای TCP خام با فلگهای سفارشی استفاده میکند
|
||||||
2. بستهها را از طریق raw socket ارسال میکند که شبیه ترافیک UDP تصادفی به نظر میرسند
|
2. بستهها را از طریق raw socket ارسال میکند که شناسایی آنها سخت است
|
||||||
3. سیستمهای DPI نمیتوانند به راحتی آن را شناسایی کنند
|
3. سیستمهای DPI نمیتوانند به راحتی آن را شناسایی کنند
|
||||||
|
|
||||||
### GFW-Knocker (پیشرفته)
|
### GFW-Knocker (پیشرفته)
|
||||||
|
|||||||
@@ -4607,7 +4607,7 @@ Designed for heavy DPI environments like the Great Firewall.
|
|||||||
tech_desc="🔗 *What is Paqet?*
|
tech_desc="🔗 *What is Paqet?*
|
||||||
A raw-socket encrypted proxy using KCP protocol.
|
A raw-socket encrypted proxy using KCP protocol.
|
||||||
Simple all-in-one solution with built-in SOCKS5 proxy.
|
Simple all-in-one solution with built-in SOCKS5 proxy.
|
||||||
• KCP over raw sockets bypasses DPI
|
• KCP over raw TCP packets with custom flags bypasses DPI
|
||||||
• Built-in SOCKS5 proxy (no extra software needed)
|
• Built-in SOCKS5 proxy (no extra software needed)
|
||||||
• Easy setup with just IP, port, and key"
|
• Easy setup with just IP, port, and key"
|
||||||
fi
|
fi
|
||||||
@@ -6040,9 +6040,9 @@ show_info_menu() {
|
|||||||
echo -e " ${BOLD}Contact:${NC} Signal @hanselime.11"
|
echo -e " ${BOLD}Contact:${NC} Signal @hanselime.11"
|
||||||
echo ""
|
echo ""
|
||||||
echo " Paqet is a bidirectional packet-level proxy that uses"
|
echo " Paqet is a bidirectional packet-level proxy that uses"
|
||||||
echo " raw sockets (gopacket + libpcap) with KCP encrypted"
|
echo " KCP over raw TCP packets with custom TCP flags."
|
||||||
echo " transport. It operates below the OS TCP/IP stack to"
|
echo " It operates below the OS TCP/IP stack to bypass"
|
||||||
echo " bypass firewalls and deep packet inspection."
|
echo " firewalls and deep packet inspection."
|
||||||
echo ""
|
echo ""
|
||||||
echo " Features:"
|
echo " Features:"
|
||||||
echo " - Raw TCP packet crafting via gopacket"
|
echo " - Raw TCP packet crafting via gopacket"
|
||||||
@@ -6050,6 +6050,7 @@ show_info_menu() {
|
|||||||
echo " - SOCKS5 proxy for dynamic connections"
|
echo " - SOCKS5 proxy for dynamic connections"
|
||||||
echo " - Connection multiplexing via smux"
|
echo " - Connection multiplexing via smux"
|
||||||
echo " - Cross-platform (Linux, macOS, Windows)"
|
echo " - Cross-platform (Linux, macOS, Windows)"
|
||||||
|
echo " - Android client: github.com/AliRezaBeigy/paqetNG"
|
||||||
echo ""
|
echo ""
|
||||||
echo -e " ${CYAN}── paqctl Management Tool ──${NC}"
|
echo -e " ${CYAN}── paqctl Management Tool ──${NC}"
|
||||||
echo ""
|
echo ""
|
||||||
|
|||||||
Reference in New Issue
Block a user