Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/oalee/connect-without-vpn
connect directly to a country(ip range) and use vpn for outside of that country
https://github.com/oalee/connect-without-vpn
Last synced: about 1 month ago
JSON representation
connect directly to a country(ip range) and use vpn for outside of that country
- Host: GitHub
- URL: https://github.com/oalee/connect-without-vpn
- Owner: oalee
- Created: 2016-10-11T13:59:47.000Z (about 8 years ago)
- Default Branch: master
- Last Pushed: 2016-10-12T08:28:24.000Z (about 8 years ago)
- Last Synced: 2024-10-02T12:11:22.898Z (about 2 months ago)
- Language: Python
- Size: 9.77 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# connect-without-vpn
connect directly to a country(ip range) and use tunnel for outside of that country(ip range).
for example we want to use internet directly for iran. and vpn for outside of iran(probably filtered). works with python2 in linux## Usage
```
python2.7 director.py [--interface INTERFACE] [-i [I]]
[-gw [GW]]
```
## Arguments
* `-h, --help` show this help message and exit
* `--version` show program's version number and exit
* `--interface INTERFACE` your desired interface that ip/masks should route in
* `-i [I]` input file, each line should consist of ip/netmask , lines with # will be ignored
* `-gw [GW]` default gateway of your interface## Example
my interface name is enp6s0 (find out with `ifconfig`) and default gateway of that interface is 192.168.1.1 (find out with `route -n`).```python2.7 directory.py --interface enp6s0 -i ~/temp/iran.txt -gw 192.168.1.1```
## TODO
* crawl ip range of a country and add a argument for selecting a country instead of a local file
* finding default interface
* finding default gateway
* adding a self learning system to route filtered ip's to tunnel and not filters ip's directly## Self learning
`sniffer.py` is a basic implementation of self learning patterns. which takes a different approach rather than `director.py` which is:
* route every packet in default censored interface and sniff all packets, if there is a censored ip then route that in tunnel interface.
* route dns through tunnel which solve dns censored ssl websites.### self learning pattern's :
* `403 Forbidden` in socket's data.
* no answer. but the site might be down. should find a better approach