(There's still no working release. If you know why this module doesn't work, please help me out in the issue about it. If I can't fix that problem, I'll probably kill this project.)
Dynamically bypass deep packet inspection (DPI) in Android.
FuckYouDPI is a tool that dynamically bypasses Deep Packet Inspection (DPI) in Android. It comes as a systemless module.
FuckYouDPI runs TPWS, and runs the internet connection of user-specified target apps through that TPWS instance. That way, DPI is bypassed without other things like VPNs.
- TPWS is a tool that bypasses DPI for user-specified domains. Target domains are user-specified on FuckYouDPI too.
- Android 10 Quince Tart or newer.
- Magisk, KernelSU or APatch installed.
- KsuWebUI (only for Magisk).
FuckYouDPI can be installed and uninstalled just like any other Magisk/KernelSU/APatch module.
- Pros:
- Applies dynamically, doesn't touch unspecified apps and domains.
- Automatic after configuration, no fake VPN or setting proxy yourself.
- Harder to detect.
- Easily manageable and updatable.
- Cons:
- Requires root, so not installable on devices that have fully locked bootloaders.
fydpiutil
is the integrated command line utility of this module. You can use it on a rooted session of a terminal app (like Termux). With fydpiutil
;
- Apply or deapply to an app.
- Enable or disable to a domain.
- Enable or disable a trick.
- For usage, refer to the FuckYouDPI wiki.
- Clone the repository.
git clone https://github.com/mrdoge0/FuckYouDPI --depth=1 -b main && cd FuckYouDPI
- TPWS and NFQWS binaries in the repository are directly built from the bol-van's official Zapret source, but if you're too paranoid, you can build them yourself. Build commands can be found in the
binary-build-cmds.txt
file in the repo. - Pack everything.
zip -r out.zip *
- Enjoy.
- bol-van for creating TPWS and NFQWS.
- Zackptg5 for creating Magisk Module Template Extended (MMT Extended).