We have hosted the application haoel github io in order to run this application in our online workstations with Wine or directly.
Quick description about haoel github io:
This repository is a hands-on, longform guide for building and operating your own �scientific� Internet access setup � i.e., self-hosted proxies, VPNs, and transparent gateways � so you can reach blocked resources, protect privacy, and learn the underlying networking principles. It walks through buying and evaluating VPSes (regions, bandwidth, CN2/GIA lines), enabling kernel/network optimizations (BBR), and applying production practices like TLS certificates with Let�s Encrypt and using Cloudflare safely. The guide provides multiple deployment patterns (Dockerized gost / Shadowsocks / L2TP-IPSec, IKEv2 suggestions, and Cloudflare WARP integration), plus client configuration instructions for desktop and mobile (Clash, SwitchyOmega, Shadowrocket, etc.). Several transparent gateway patterns are explained: router/OpenWRT (Clash on the router), Raspberry Pi gateway, and a data-center NAT/EC2 NAT instance design with Clash for whole-VPC routing.Features:
- Guidance for selecting VPS providers, regions, bandwidth, and CN2/GIA routing considerations
- Step-by-step Docker deployments: gost HTTPS proxy, Shadowsocks, L2TP/IPSec examples and startup scripts
- Client configuration examples for desktop and mobile: Clash (rule sets), SwitchyOmega, Shadowrocket, and Clash for routers
- Transparent gateway designs: OpenWRT router, Raspberry Pi gateway, and AWS VPC/EC2 NAT instance + Clash for private subnets
- Anti-detection and traffic camouflage methods: TLS/HTTP disguise, probe_resist, Cloudflare WARP integration and selective routing
- Operational tasks and tooling: Let�s Encrypt certbot automation, enabling TCP BBR, iptables rules, and handling Cloudflare WARP nuances
Programming Language: Unix Shell.
Categories:
©2024. Winfy. All Rights Reserved.
By OD Group OU – Registry code: 1609791 -VAT number: EE102345621.