https://github.com/amirali104/v2ray
A simple program to extract v2ray and mtproto proxies from multiple telegram channels
https://github.com/amirali104/v2ray
Last synced: 3 months ago
JSON representation
A simple program to extract v2ray and mtproto proxies from multiple telegram channels
- Host: GitHub
- URL: https://github.com/amirali104/v2ray
- Owner: AmirAli104
- License: mit
- Created: 2025-06-30T12:51:36.000Z (3 months ago)
- Default Branch: main
- Last Pushed: 2025-06-30T13:57:08.000Z (3 months ago)
- Last Synced: 2025-06-30T14:47:09.827Z (3 months ago)
- Language: Python
- Size: 5.86 KB
- Stars: 2
- Watchers: 0
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# v2ray
This Python script connects to multiple Telegram channels and scrapes their recent messages to extract proxy configurations, including **V2Ray** and **MTProto** links.
To use it first install `telethon` package using this command:
```
pip install telethon
# or
python -m pip install telethon
```In the file `channels.json` you can see the list of telegram channels and the `api_hash` and `api_id`. In the channels section the numbers in front of the links is the number of recent messages to read. You add or remove channels to the list and change the message limit numbers.
You need `api_hash` and `api_id` for connecting to telegram using this app. By default it uses telegram desktop API keys and you can use them without any problem. But you can change them in `channels.json` file if you want.
Now you are ready to run `src/v2ray.py`.
Command Line Options
---
|option|description|
------|------|
|`-v,--v2ray`|Extract v2ray proxies|
|`-m,--mtproto`|Extract mtproto proxies|⚠️ Disclaimer
---I do **not** support any use of this tool for censorship, surveillance, or any form of human rights violation.
By using this code, you agree to take full responsibility for how it is used.