Skip to content

Latest commit

 

History

History
executable file
·
38 lines (24 loc) · 1.6 KB

README.md

File metadata and controls

executable file
·
38 lines (24 loc) · 1.6 KB

About

This project is a fork of v2ray, with tls module replaced by utls in order to simulate the fingerprint of popular web browsers.

Note: NO WARRANT FOR ANY KIND OF USAGE. DO NOT FILE ANY ISSUE. MAY NOT UPDATE ANYMORE.

Windows Build

  • Install Go
  • git clone https://github.com/emc2314/v2ray-core.git
  • cd v2ray-core
  • go get github.com/emc2314/websocket@master
  • mkdir build
  • go build -o build\wv2ray.exe -ldflags "-H windowsgui -s -w -X v2ray.com/core.codename=utls -X v2ray.com/core.build=emc2314 -X v2ray.com/core.version=4.23.1" .\main\

Usage

Note: Use ONLY on client.

  • Update V2rayN to 3.18 or above.
  • Update v2ctl.exe in your V2rayN folder to 4.23.1 or above.
  • Delete v2ray.exe in your V2rayN folder. Because V2rayN will use v2ray.exe instead of wv2ray.exe sometimes.
  • Replace wv2ray.exe in your V2rayN folder.
  • Enjoy!

Details

For tls in v2ray, Chrome 72 ClientHello is used.

However, this fingerprint has http/2 as well as http/1.1 in ALPN. If the server supports http/2, they will negotiate the protocol as http/2, which has not been supoorted by the go websocket yet.

So, ws+tls will use another popular fingerprint which has no http/2 in ALPN extention.

License

For v2ray part of code: The MIT License (MIT)

For my part of code: DO WHAT THE FUCK YOU WANT TO PUBLIC LICENSE