paqctl v1.0.0 - Unified proxy manager for bypassing firewalls
Features: - Dual backend support: paqet (KCP) and GFW-knocker (violated TCP + QUIC) - Both backends can run simultaneously when both are installed - Automatic config.yaml generation for paqet backend - Windows client support with PowerShell script - Telegram monitoring integration - Systemd service management Backends: - paqet: Single Go binary with built-in SOCKS5 (port 1080) - GFW-knocker: Python-based with violated TCP tunneling (port 14000)
This commit is contained in:
38
windows/Paqet-Client.bat
Normal file
38
windows/Paqet-Client.bat
Normal file
@@ -0,0 +1,38 @@
|
||||
@echo off
|
||||
:: Paqet Client Launcher
|
||||
:: Double-click to run
|
||||
|
||||
:: Check for admin rights
|
||||
net session >nul 2>&1
|
||||
if %errorlevel% neq 0 (
|
||||
echo Requesting Administrator privileges...
|
||||
powershell -Command "Start-Process '%~f0' -Verb RunAs"
|
||||
exit /b
|
||||
)
|
||||
|
||||
echo.
|
||||
echo ===============================================
|
||||
echo PAQET CLIENT (KCP Raw Socket Proxy)
|
||||
echo ===============================================
|
||||
echo.
|
||||
echo Once connected, configure your browser:
|
||||
echo.
|
||||
echo FIREFOX:
|
||||
echo Settings ^> Network Settings ^> Settings
|
||||
echo Select "Manual proxy configuration"
|
||||
echo SOCKS Host: 127.0.0.1 Port: 1080
|
||||
echo Select SOCKS v5
|
||||
echo Check "Proxy DNS when using SOCKS v5"
|
||||
echo.
|
||||
echo CHROME (launch with proxy):
|
||||
echo chrome.exe --proxy-server="socks5://127.0.0.1:1080"
|
||||
echo.
|
||||
echo To verify: Visit https://ifconfig.me
|
||||
echo (Should show your server IP, not your home IP)
|
||||
echo.
|
||||
echo Press Ctrl+C to disconnect
|
||||
echo ===============================================
|
||||
echo.
|
||||
|
||||
:: Run the PowerShell script with paqet backend
|
||||
powershell -ExecutionPolicy Bypass -NoExit -File "%~dp0paqet-client.ps1" -Backend paqet
|
||||
Reference in New Issue
Block a user