https://github.com/tholian-network/warps
:telescope: Warping your own Internet everywhere you go :satellite:
https://github.com/tholian-network/warps
dns-exfiltration edr-bypass edr-evasion firewall-bypass http-smuggling peer-to-peer proxy-bypass
Last synced: about 1 month ago
JSON representation
:telescope: Warping your own Internet everywhere you go :satellite:
- Host: GitHub
- URL: https://github.com/tholian-network/warps
- Owner: tholian-network
- Created: 2024-08-28T09:52:09.000Z (9 months ago)
- Default Branch: master
- Last Pushed: 2024-10-17T07:10:19.000Z (7 months ago)
- Last Synced: 2025-03-29T01:34:18.477Z (about 2 months ago)
- Topics: dns-exfiltration, edr-bypass, edr-evasion, firewall-bypass, http-smuggling, peer-to-peer, proxy-bypass
- Language: Go
- Homepage:
- Size: 181 KB
- Stars: 6
- Watchers: 1
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Tholian® Warps
Tholian® Warps is a proactive and adaptive Mesh Network Router.
It tries to automatically detect and bypass censorship and throttling
measurements at all cost. Programmable routing, traffic compression,
traffic scattering, dynamic encryption rotation and other features
are part of this experimental research project.The goal of this project is to find out how feasible common NAT breaking
and firewall bypassing techniques are and whether they can be used to
build a reliable mesh network that's based on a peer-to-peer architecture.# Network Architecture
1. A `tunnel` instance tunnels network traffic through a `forward` or `gateway` instance to access the internet.
2. A `tunnel` uses the initial configured network protocol.
3. A `forward` instance tunnels network traffic through other `forward` or `gateway` instances.
4. All `gateway` instances use `optimizers` to reduce web asset file sizes.
5. All `gateway` instances use `DNS over TLS` to resolve relayed DNS queries.
6. All instances use a local [ProxyCache](./source/structs/ProxyCache.go) and [ResolverCache](./source/structs/ResolverCache.go).
7. All instances can rotate encryption keys and can scatter network traffic on-demand.## How to use Tunnels and Gateways
The easiest way to use Warps is with running a Warps `gateway` on your own VPS that is connected to the internet,
and a locally running Warps `tunnel`.As a defaulted network protocol, it is best to use `dns`, as that usually works to bypass typical firewall setups.
Alternative supported network protocols are documented further down in this document.
```bash
# On your VPS server (1.3.3.7)
tholian-warps gateway "dns://0.0.0.0:1053";# On your local machine
tholian-warps tunnel "any" "dns://1.3.3.7:1053";
curl -x localhost:1080 http://google.com;
```## How to use Proxy Chains
Warps can be chained via multiple proxies, without a limit on how many network hops you want to the public internet.
In this example, we are routing local web traffic through 3 instances before the traffic hits the clearnet.```bash
# On your first VPS server (1.3.3.7)
tholian-warps gateway "dns://0.0.0.0:1337";# On your second VPS server (1.3.3.8)
tholian-warps forward "http://1.3.3.8:1338" "dns://1.3.3.7:1337";# On your third VPS server (1.3.3.9)
tholian-warps forward "dns://1.3.3.9:1339" "http://1.3.3.8:1338";# On your local machine
# local -> dns -> 1.3.3.9 -> http -> 1.3.3.8 -> dns -> 1.3.3.7 -> * -> internet
tholian-warps tunnel "any" "dns://1.3.3.9:1339";
curl -x localhost:1080 http://google.com;
```# Usage
:construction: Highly Experimental at this point - Use at own risk! :construction:
```bash
bash build.sh;
sudo cp ./build/tholian-warps /usr/bin/tholian-warps;# Show CLI usage help
tholian-warps;
```# Data Compressors
These are the data compressors that have been implemented:
- [ ] [compressors/text/css](/source/compressors/text/css)
- [ ] [compressors/text/html](/source/compressors/text/html)
- [ ] [compressors/text/js](/source/compressors/text/js)
- [ ] [compressors/image/jpeg](/source/compressors/image/jpeg)
- [ ] [compressors/image/png](/source/compressors/image/png)# Network Protocols
These are the transport protocols that have been implemented:
- [x] `dns` or [protocols/dns](/source/protocols/dns) implements DNS Exfiltration
- [x] `http` or [protocols/http](/source/protocols/http) implements HTTP Smuggling and DNS over HTTP
- [x] `https` or [protocols/https](/source/protocols/https) implements HTTPS Smuggling and DNS over HTTPS
- [ ] `icmp` or [protocols/icmp](/source/protocols/icmp) implements ICMP Knocking and DNS over ICMP
- [ ] `ssh` or [protocols/ssh](/source/protocols/ssh) implements SSH Tunneling and DNS over SSH
- [ ] `socks` or [protocols/socks](/source/protocols/socks) implements SOCKS Routing (e.g. for TOR/I2P usage)
- [x] [protocols/test](/source/protocols/test) implements the `Spy` testing data structures# Test Coverage
These are the `go test` files that have been implemented:
- [x] [structs/ProxyCache](/source/structs/ProxyCache_test.go)
- [x] [structs/ResolverCache](/source/structs/ResolverCache_test.go)
- [ ] [utils/net/url/IsTrackingParameter](/source/utils/net/url/IsTrackingParameter_test.go)
- [ ] [utils/net/url/IsXSSParameter](/source/utils/net/url/IsXSSParameter_test.go)
- [x] [utils/net/url/ResolveCache](/source/utils/net/url/ResolveCache_test.go)
- [x] [utils/net/url/ToHostAndPort](/source/utils/net/url/ToHostAndPort_test.go)
- [x] [utils/net/url/ToHost](/source/utils/net/url/ToHost_test.go)
- [ ] [utils/protocols/http/IsFilteredHeader](/source/protocols/http/IsFilteredHeader_test.go)
- [x] [protocols/dns/Resolver](/source/protocols/dns/Resolver_test.go)
- [x] [protocols/dns/Proxy](/source/protocols/dns/Proxy_test.go)
- [ ] [protocols/dns/Tunnel](/source/protocols/dns/Tunnel_test.go)
- [x] [protocols/dns/tunnel/ToRecordName](/source/protocols/dns/tunnel/ToRecordName_test.go)
- [x] [protocols/http/Proxy](/source/protocols/http/Proxy_test.go)
- [ ] [protocols/http/Tunnel](/source/protocols/http/Tunnel_test.go)# License
AGPL3