Files
paqctl/windows/GFK-Client.bat
SamNet-dev 975acc4cf5 paqctl v1.0.0 - Unified proxy manager for bypassing firewalls
Features:
- Dual backend support: paqet (KCP) and GFW-knocker (violated TCP + QUIC)
- Both backends can run simultaneously when both are installed
- Automatic config.yaml generation for paqet backend
- Windows client support with PowerShell script
- Telegram monitoring integration
- Systemd service management

Backends:
- paqet: Single Go binary with built-in SOCKS5 (port 1080)
- GFW-knocker: Python-based with violated TCP tunneling (port 14000)
2026-02-04 04:25:33 -06:00

43 lines
1.2 KiB
Batchfile

@echo off
:: GFW-knocker Client Launcher
:: Double-click to run
:: Check for admin rights
net session >nul 2>&1
if %errorlevel% neq 0 (
echo Requesting Administrator privileges...
powershell -Command "Start-Process '%~f0' -Verb RunAs"
exit /b
)
echo.
echo ===============================================
echo GFW-KNOCKER CLIENT (Python/QUIC Proxy)
echo ===============================================
echo.
echo Requirements:
echo - Npcap (will prompt to install)
echo - Python 3.x (will prompt to install)
echo.
echo Once connected, configure your browser:
echo.
echo FIREFOX:
echo Settings ^> Network Settings ^> Settings
echo Select "Manual proxy configuration"
echo SOCKS Host: 127.0.0.1 Port: 1080
echo Select SOCKS v5
echo Check "Proxy DNS when using SOCKS v5"
echo.
echo CHROME (launch with proxy):
echo chrome.exe --proxy-server="socks5://127.0.0.1:1080"
echo.
echo To verify: Visit https://ifconfig.me
echo (Should show your server IP, not your home IP)
echo.
echo Press Ctrl+C to disconnect
echo ===============================================
echo.
:: Run the PowerShell script with gfk backend
powershell -ExecutionPolicy Bypass -NoExit -File "%~dp0paqet-client.ps1" -Backend gfk