Skip to content

Application to bypass blocking sites and applications

License

Notifications You must be signed in to change notification settings

Yoniqueeml/yt_ds_Fix_ZapretGBD

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

A bit of information about the project

This software designed to bypass Deep Packet Inspection systems found in many Internet Service Providers which block access to certain websites.

It handles DPI connected using optical splitter or port mirroring (Passive DPI) which do not block any data but just replying faster than requested destination, and Active DPI connected in sequence.

Windows 7, 8, 8.1, 10 or 11 with administrator privileges required.

Quick start

Download the latest version and unzip it to any folder. Create a shortcut for the main.exe file and place it on your desktop for easy usage. You need to use main.exe to start the program in the tray, and then you can select the desired .cmd to run it. You can learn about how to run it in the service from the repo fork. You don't need config.json anymore, just throw the cmd you need in the folder with main.exe, if you need to change some flag in some cmd - just change it inside cmd. Added working version after 22.09

Tray icon when the application is off: Off
Tray icon when the application is on: On

Usage:
Run the exe file in the folder to run the program (do not rename it=).
Then in the OS tray select the desired mode and run, if you need to change some flag, go to confs.txt and change it.

To check if your ISP's DPI could be circumvented, first make sure that your provider does not poison DNS answers by enabling "Secure DNS (DNS over HTTPS)" option in your browser.

  • Chrome: Settings → Privacy and security → Use secure DNS → With: NextDNS
  • Firefox: Settings → Network Settings → Enable DNS over HTTPS → Use provider: NextDNS

Then run the goodbyedpi.exe executable without any options. If it works — congratulations! You can use it as-is or configure further, for example by using --blacklist option if the list of blocked websites is known and available for your country.

If your provider intercepts DNS requests, you may want to use --dns-addr option to a public DNS resolver running on non-standard port (such as Yandex DNS 77.88.8.8:1253) or configure DNS over HTTPS/TLS using third-party applications.

Check the .cmd scripts and modify it according to your preference and network conditions.

Links

About

Application to bypass blocking sites and applications

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages

  • C 92.6%
  • Batchfile 3.5%
  • Python 2.7%
  • Other 1.2%