Goodbye DPI
ntc.party/c/community-software/goodbyedpi/8 Windows
Passive Deep Packet Inspection blocker and Active DPI circumvention utility, for Windows.
- Homepage: ntc.party/c/community-software/goodbyedpi/8
- GitHub: github.com/ValdikSS/GoodbyeDPI
- Web info: web-check.xyz/results/ntc.party
Goodbye DPI Source Code
Author
Description
GoodbyeDPI — Deep Packet Inspection circumvention utility (for Windows)
Homepage
https://ntc.party/c/community-software/goodbyedpiLicense
Apache-2.0
Created
16 May 17
Last Updated
05 Apr 24
Latest version
Primary Language
C
Size
203 KB
Stars
10,169
Forks
875
Watchers
10,169
Language Usage
Star History
Top Contributors
-
@ValdikSS (172)
-
@KOLANICH (2)
-
@pash7ka (2)
-
@r4sas (1)
-
@VladWinner (1)
-
@alisharifi76 (1)
-
@beatcracker (1)
-
@m0hadang (1)
-
@msekmfb (1)
Recent Commits
-
ValdikSS (29 Mar 23)
Add manual Github Action trigger
-
ValdikSS (06 Aug 22)
Merge pull request #270 from mohadangKim/master fix memcpy usage
-
ValdikSS (06 Aug 22)
Merge branch 'VladWinner-master'
-
ValdikSS (06 Aug 22)
Merge branch 'master' of https://github.com/VladWinner/GoodbyeDPI into VladWinner-master
-
ValdikSS (06 Aug 22)
Add GhosTCP by macronut to the list of alternative projects
-
mohadangKim (01 Jul 22)
fix memcpy usage
-
ValdikSS (31 Mar 22)
Print correct set-ttl/auto-ttl mode in the status
-
ValdikSS (31 Mar 22)
Disable auto-ttl if set-ttl has been used after auto-ttl
-
ValdikSS (21 Mar 22)
Handle HTTP GET and POST in packets larger than --max-payload If --max-payload 1200 is used and there's HTTP request with lots of cookies which exceed 1200 bytes in size, this packet would have been skipped as 'too large', and the circumvention won't be applied. Fix this by checking for "GET " or "POST" in the beginning of the packet regardless of its size.
-
ValdikSS (21 Mar 22)
Merge branch 'windivert2'
-
ValdikSS (21 Mar 22)
GoodbyeDPI v0.2.2
-
ValdikSS (21 Mar 22)
Fix --set-ttl when used with --min-ttl
-
ValdikSS (16 Mar 22)
Update bug template
-
Vlad (14 Mar 22)
Update README.md
-
ValdikSS (05 Mar 22)
Handle "0" in domain names
-
ValdikSS (18 Feb 22)
Change argument order for calloc()
-
ValdikSS (17 Feb 22)
Allocate (argc + 1) for the service arguments, with calloc It was assumed that getopt checks argc count and does not require null-terminated argv pointer to determine argv end for optional parameter. That is wrong. Add null-terminated latest argv. Fixes #246
-
ValdikSS (10 Jan 22)
Allow to set --max-payload to zero
-
ValdikSS (06 Jan 22)
Add forgotten default max-payload value in the README
-
ValdikSS (06 Jan 22)
Add DANGEROUS notices for ttl modes in readme
-
ValdikSS (04 Jan 22)
Add SpoofDPI to similar projects
-
ValdikSS (04 Jan 22)
Document forgotten --max-payload in -5 and -6 modes (v0.2.0+)
-
ValdikSS (04 Jan 22)
Use WinDivert 2.2.0 for Github Actions building
-
ValdikSS (04 Jan 22)
Call WinDivertShutdown on shutdown
-
ValdikSS (03 Jan 22)
Initial support for WinDivert 2.0+ This patch adds WinDivert 2.0+ support in a backward-incompatible way. WinDivert 1.4 won't work after this commit anymore.
-
ValdikSS (30 Dec 21)
GoodbyeDPI v0.2.1
-
ValdikSS (30 Dec 21)
SNI extraction bugfix: add forgotten hyphen as an allowed domain character This fixes --allow-no-sni option for domains with hyphen.
-
ValdikSS (30 Dec 21)
GoodbyeDPI v0.2.0
-
ValdikSS (30 Dec 21)
Update readme
-
ValdikSS (30 Dec 21)
Ensure the resource file to be compiled before linking
Goodbye DPI Website
Website
GoodbyeDPI - NTC
GoodbyeDPI Deep Packet Inspection (DPI) circumvention software discussion and official support forum
Redirects
Does not redirect
Security Checks
2 security checks failed (64 passed)
- Top-Level Domain Highly Abused
- Password Field Present
Server Details
- IP Address 130.255.77.28
- Hostname box.ntc.party
- Location Bochum, Nordrhein-Westfalen, Germany, EU
- ISP Bradler & Krantz GmbH & Co. KG
- ASN AS29141
Associated Countries
-
US
-
DE
Saftey Score
Website marked as risky
70%
Blacklist Check
ntc.party was found on 0 blacklists
- ThreatLog
- OpenPhish
- PhishTank
- Phishing.Database
- PhishStats
- URLhaus
- RPiList Not Serious
- AntiSocial Blacklist
- PhishFeed
- NABP Not Recommended Sites
- Spam404
- CRDF
- Artists Against 419
- CERT Polska
- PetScams
- Suspicious Hosting IP
- Phishunt
- CoinBlockerLists
- MetaMask EthPhishing
- EtherScamDB
- EtherAddressLookup
- ViriBack C2 Tracker
- Bambenek Consulting
- Badbitcoin
- SecureReload Phishing List
- Fake Website Buster
- TweetFeed
- CryptoScamDB
- StopGunScams
- ThreatFox
- PhishFort
Website Preview
Goodbye DPI Reviews
More Network Analysis
-
Open Observatory of Network Interference - A free tool and global observation network, for detecting censorship, surveillance and traffic manipulation on the internet. Developed by The Tor Project, and available for Android, iOS, and Linux.
-
An Android app to bypass deep packet inspection.
-
You can quickly check if a given IP is using a proxy, this can also be done through the command line.
About the Data: Goodbye DPI
API
You can access Goodbye DPI's data programmatically via our API.
Simply make a GET
request to:
https://api.awesome-privacy.xyz/networking/network-analysis/goodbye-dpi
The REST API is free, no-auth and CORS-enabled. To learn more, view the Swagger Docs or read the API Usage Guide.
About the Data
Beyond the user-submitted YAML you see above, we also augment each listing with additional data dynamically fetched from several sources. To learn more about where the rest of data included in this page comes from, and how it is computed, see the About the Data section of our About page.
Share Goodbye DPI
Help your friends compare Network Analysis, and pick privacy-respecting software and services.
Share Goodbye DPI and Awesome Privacy with your network!