paqctl v1.0.0 - Unified proxy manager for bypassing firewalls

Features:
- Dual backend support: paqet (KCP) and GFW-knocker (violated TCP + QUIC)
- Both backends can run simultaneously when both are installed
- Automatic config.yaml generation for paqet backend
- Windows client support with PowerShell script
- Telegram monitoring integration
- Systemd service management

Backends:
- paqet: Single Go binary with built-in SOCKS5 (port 1080)
- GFW-knocker: Python-based with violated TCP tunneling (port 14000)
This commit is contained in:
SamNet-dev
2026-02-04 00:05:04 -06:00
commit 975acc4cf5
13 changed files with 10042 additions and 0 deletions

38
windows/Paqet-Client.bat Normal file
View File

@@ -0,0 +1,38 @@
@echo off
:: Paqet Client Launcher
:: Double-click to run
:: Check for admin rights
net session >nul 2>&1
if %errorlevel% neq 0 (
echo Requesting Administrator privileges...
powershell -Command "Start-Process '%~f0' -Verb RunAs"
exit /b
)
echo.
echo ===============================================
echo PAQET CLIENT (KCP Raw Socket Proxy)
echo ===============================================
echo.
echo Once connected, configure your browser:
echo.
echo FIREFOX:
echo Settings ^> Network Settings ^> Settings
echo Select "Manual proxy configuration"
echo SOCKS Host: 127.0.0.1 Port: 1080
echo Select SOCKS v5
echo Check "Proxy DNS when using SOCKS v5"
echo.
echo CHROME (launch with proxy):
echo chrome.exe --proxy-server="socks5://127.0.0.1:1080"
echo.
echo To verify: Visit https://ifconfig.me
echo (Should show your server IP, not your home IP)
echo.
echo Press Ctrl+C to disconnect
echo ===============================================
echo.
:: Run the PowerShell script with paqet backend
powershell -ExecutionPolicy Bypass -NoExit -File "%~dp0paqet-client.ps1" -Backend paqet