This is roskomnadzor's blocker bypasser.
It loads blocked IPs from roskomsvoboda and run local SOCKS5 proxy with special dialer. This dialer checks requested IP if it blocked. If IP blocked it uses dialer through the TOR. If not it uses default net dialer. Here's how evil roskomnadzor blocking machine is bypassed.
You need docker. Just open project root in terminal and enter:
$ docker-compose up --build -d
It will build docker and run it. You only need to configure your browser
(and any other soft) to use SOCKS5 proxy at 127.0.0.1:8000
.
You can build it by your own using go:
$ go install github.com/txe/rkn-bypasser
Now you can use it:
$ rkn-bypasser --bind-addr 127.0.0.1:8000
Sure. All this setups possible to do on Windows. You can write me if you need any help.
Feel free to contact me:
- Email: dimuls@yandex.ru
- Telegram: @dimuls