This project is a fork of v2ray, with tls module replaced by utls in order to simulate the fingerprint of popular web browsers.
Note: NO WARRANT FOR ANY KIND OF USAGE. DO NOT FILE ANY ISSUE. MAY NOT UPDATE ANYMORE.
- Install Go
git clone https://github.com/emc2314/v2ray-core.git
cd v2ray-core
go get github.com/emc2314/websocket@master
mkdir build
go build -o build\wv2ray.exe -ldflags "-H windowsgui -s -w -X v2ray.com/core.codename=utls -X v2ray.com/core.build=emc2314 -X v2ray.com/core.version=4.23.1" .\main\
Note: Use ONLY on client.
- Update V2rayN to 3.18 or above.
- Update
v2ctl.exe
in your V2rayN folder to 4.23.1 or above. - Delete
v2ray.exe
in your V2rayN folder. Because V2rayN will usev2ray.exe
instead ofwv2ray.exe
sometimes. - Replace
wv2ray.exe
in your V2rayN folder. - Enjoy!
For tls in v2ray, Chrome 72 ClientHello is used.
However, this fingerprint has http/2 as well as http/1.1 in ALPN. If the server supports http/2, they will negotiate the protocol as http/2, which has not been supoorted by the go websocket yet.
So, ws+tls will use another popular fingerprint which has no http/2 in ALPN extention.
For v2ray part of code: The MIT License (MIT)
For my part of code: DO WHAT THE FUCK YOU WANT TO PUBLIC LICENSE