An unidentifiable TLS-based proxy mechanism designed to bypass the Great Firewall of China.
Trojan is an open-source network proxy tool that uses TLS encryption to disguise internet traffic as normal HTTPS connections. It is specifically designed to bypass the Great Firewall of China (GFW) by making traffic appear indistinguishable from legitimate web services. The tool helps users avoid detection and censorship by imitating common internet protocols.
Users in regions with heavy internet censorship, such as China, who need reliable and stealthy access to the open internet. It is also suitable for privacy-conscious individuals and researchers studying network circumvention techniques.
Trojan offers a highly stealthy approach to bypassing firewalls by perfectly mimicking standard TLS traffic, making it difficult for deep packet inspection to identify. Unlike traditional VPNs, it focuses on obfuscation and protocol imitation to provide a more resilient solution against advanced censorship mechanisms.
An unidentifiable mechanism that helps you bypass GFW.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Encapsulates traffic within standard TLS connections to appear as normal HTTPS, making it difficult for firewalls like GFW to detect through deep packet inspection.
Works over various protocols to avoid both active and passive monitoring, enhancing resilience against advanced censorship techniques.
Helps circumvent Internet Service Provider quality-of-service limitations, ensuring more stable and consistent access speeds in restricted regions.
Based on imitating common web services, aiming for permanent undetectability, which is a core idea rather than just a fixed protocol.
Requires CMake, Boost, OpenSSL, and libmysqlclient for compilation, making installation and setup non-trivial compared to binary-distributed tools.
Specifically optimized for bypassing GFW, so it lacks features like kill switches or multi-hop routing found in general-purpose VPNs.
Relies on online docs and a wiki, which can be fragmented and require users to piece together configuration steps, especially for beginners.