https://github.com/mikewang000000/fakehttp
Obfuscate all your TCP connections into HTTP protocol.
https://github.com/mikewang000000/fakehttp
iptables netfilter-queue nfqueue obfuscation
Last synced: 7 months ago
JSON representation
Obfuscate all your TCP connections into HTTP protocol.
- Host: GitHub
- URL: https://github.com/mikewang000000/fakehttp
- Owner: MikeWang000000
- License: gpl-3.0
- Created: 2025-05-31T20:25:18.000Z (8 months ago)
- Default Branch: master
- Last Pushed: 2025-06-27T08:03:52.000Z (7 months ago)
- Last Synced: 2025-06-27T09:19:53.844Z (7 months ago)
- Topics: iptables, netfilter-queue, nfqueue, obfuscation
- Language: C
- Homepage:
- Size: 149 KB
- Stars: 540
- Watchers: 7
- Forks: 54
- Open Issues: 5
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# FakeHTTP
Obfuscate all your TCP connections into HTTP protocol, using Netfilter Queue (NFQUEUE).
[[ 中文文档 ]](https://github.com/MikeWang000000/FakeHTTP/wiki)
## Quick Start
```
fakehttp -h www.example.com -i eth0
```
## Usage
```
Usage: fakehttp [options]
Interface Options:
-a work on all network interfaces (ignores -i)
-i work on specified network interface
Payload Options:
-b use TCP payload from binary file
-e hostname for HTTPS obfuscation
-h hostname for HTTP obfuscation
General Options:
-0 process inbound connections
-1 process outbound connections
-4 process IPv4 connections
-6 process IPv6 connections
-d run as a daemon
-k kill the running process
-s enable silent mode
-w write log to instead of stderr
Advanced Options:
-f skip firewall rules
-g disable hop count estimation
-m fwmark for bypassing the queue
-n netfilter queue number
-r duplicate generated packets for times
-t TTL for generated packets
-x set the mask for fwmark
-y raise TTL dynamically to % of estimated hops
-z use iptables commands instead of nft
```
## License
GNU General Public License v3.0