Download Latest Version release-linux-amd64-avx512.7z (27.7 MB)
Email in envelope

Get an email when there's a new version of RU DPI resistance

Home
Name Modified Size InfoDownloads / Week
Releases 2026-04-13
CIDRs 2026-04-11
Configurations 2026-03-21
readme.md 2026-03-21 5.7 kB
Totals: 4 Items   5.7 kB 65



Summary

Some information and a bundle of patched, well-known applications for bypassing RU DPI.

Content

CIDRs

A list of subnets useful for configuring torrent clients and split tunneling in OS.

AWS

A list of all Amazon Web Services subnets in CIDR notation and OpenVPN route format.

DPI triggering

A list of subnets that trigger mass DPI blocking upon connection in CIDR notation and OpenVPN route format.

UA blocking

A list of blocked UA subnets in CIDR notation and OpenVPN route format.

UA working

A list of worked UA subnets in CIDR notation format.

Configurations

Tips for enhancing connection stability.

Releases

Pre-built program archives ready for deployment on specified architectures. Outgoing connections can be bound to a specified interface by name. Changing the interface's IP address via DHCP or manually while applications are running is not supported.

dnscrypt-proxy

The following patches were applied to the original application:

  • MaxDNSUDPPacketSize variable was set to 0x1600 — the maximum number of UDP packet on server
  • outbound_interface_name configuration parameter was added

dnstt

The following patches were applied to the original application:

  • Unuseful DoH and DoT supporting was removed
  • New logging was introduced
  • Logging loglevel, syslog, logfile and logfile-truncate CLI arguments were added
  • outbound-address, outbound-ifname and outbound-port CLI arguments were added

GOST

The following patches were applied to the original application:

  • Unuseful Prometheus metrics and Redis sources were removed

Hysteria

The following patches were applied to the original application:

  • The patched quic-go module was merged with the original December 2025 branch, increasing connection speed by a factor of five
  • outboundInterfaceName configuration parameter was added
  • tun configuration parameter was removed

Snawoot's proxies

Unified CLI arguments were added to original applications:

  • loglevel
  • syslog
  • logfile
  • logfile-truncate
  • bootstrap-dns
  • api-dialer-timeout
  • api-dialer-outbound-address
  • api-dialer-outbound-ifname
  • api-dialer-outbound-port
  • api-dialer-fallback-delay
  • api-dialer-keep-alive
  • api-dialer-keep-alive-idle
  • api-dialer-keep-alive-interval
  • api-dialer-keep-alive-count
  • api-proxy
  • api-server-names
  • api-client to specify uTLS parroting
  • dialer-timeout
  • dialer-outbound-address
  • dialer-outbound-ifname
  • dialer-outbound-port
  • dialer-fallback-delay
  • dialer-keep-alive
  • dialer-keep-alive-idle
  • dialer-keep-alive-interval
  • dialer-keep-alive-count
  • proxy
  • server-names
  • client to specify uTLS parroting
  • config

Thus, CLI arguments can be specified in a configuration file and passed using config argument.

Tor Pluggable Transports

Unified CLI arguments were added to original applications:

  • dialer-timeout
  • dialer-outbound-address
  • dialer-outbound-ifname
  • dialer-outbound-port
  • dialer-fallback-delay
  • dialer-keep-alive
  • dialer-keep-alive-idle
  • dialer-keep-alive-interval
  • dialer-keep-alive-count

Note: Whitespaces in dialer-outbound-ifname and server-names parameters can be escaped by + in torrc file.

obfs-client

The following patches were applied to the original Lyrebird transport:

  • OutboundBindAddress torrc parameter can be used for IPv4/IPv6 outgoing connections

snowflake-client

The following patches were applied to the original Snowflake transport:

  • udp-port-limits, network-types and network-interfaces CLI arguments were added to configure WebRTC ICE engine
  • client CLI argument was added to specify uTLS parroting
  • Unuseful ampcache, sqsqueue and sqscreds transport arguments were removed
  • front, fronts, utls-nosni and utls-imitate transport arguments were removed
  • connect-to, insecure, host-name-to-verify, server-names, client, proxy transport arguments were added

webtunnel-client

The following patches were applied to the original Webtunnel transport:

  • client CLI argument was added to specify uTLS parroting
  • servername transport argument was removed
  • connect-to, insecure, host-name-to-verify, server-names, client, proxy transport arguments were added

usque

The following patches were applied to the original application:

  • outbound-address, outbound-ifname and outbound-port CLI arguments were added

server-names

EBNF:

server-names = '!' | '~' | '@' | ( host-name { ' ', host-name } )
host-name = ("'" { escaped_symbol } "'")
          | ('"' { escaped_symbol } '"')
          | ( non_whitespace_symbol { non_whitespace_symbol } )

Where ! can be used to remove SNI extension, ~ to declare empty extension, @ to declare empty server_name_list.

uTLS parroting

client argument can be specified by following values:

  • golang
  • randomized
  • randomizedALPN
  • randomizedNoALPN
  • firefox
  • firefox_56
  • firefox_65
  • firefox_99
  • firefox_102
  • firefox_105
  • firefox_120
  • firefox_148
  • chrome
  • chrome_tls12
  • chrome_62
  • chrome_70
  • chrome_72
  • chrome_87
  • chrome_96
  • chrome_102
  • chrome_106
  • chrome_100_psk
  • chrome_112
  • chrome_114
  • chrome_115
  • chrome_115_psk
  • chrome_120
  • chrome_133
  • chrome_133_tls12
  • ios
  • ios_11
  • ios_12
  • ios_13
  • ios_14
  • android
  • edge
  • edge_85
  • edge_106
  • safari
  • safari_16
  • safari_26
  • 360
  • 360_7
  • 360_11
  • qq
  • qq_11
  • curl_win11
  • schannel_win11
Source: readme.md, updated 2026-03-21