HysteriaGen helps you to deploy your Hysteria VPN with docker.
Hysteria is a feature-packed proxy & relay tool optimized for lossy, unstable connections (e.g. satellite networks, congested public Wi-Fi, connecting to foreign servers from China) powered by a customized protocol based on QUIC.
HysteriaGen
uses docker-compose to pull hysteria docker image and running it with created configuration file
After deploying it gave you client configuration & URL and QRCode to use that with your device
For Running HysteriaGen
you only need to have python3 on you server
Docker
will automatically installed of it's not exist in your server
Running Program :
curl https://raw.githubusercontent.com/SonyaCore/HysteriaGen/main/hysteria.py -o /tmp/hysteria.py && python3 /tmp/hysteria.py
_ _ _ _ _____
| | | | | | (_) | __ \
| |_| |_ _ ___| |_ ___ _ __ _ __ _| | \/ ___ _ __
| _ | | | / __| __/ _ \ '__| |/ _` | | __ / _ \ '_ \
| | | | |_| \__ \ || __/ | | | (_| | |_\ \ __/ | | |
\_| |_/\__, |___/\__\___|_| |_|\__,_|\____/\___|_| |_|
__/ |
|___/
HysteriaGen
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Server Information :
Distro : Ubuntu
Kernel : Linux 5.15.0-56-generic aarch64
IP : ###
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
==============================================
[1] Deploying Hysteria using docker-compose
[0] Exit the program
==============================================
Use option 1 to deploy hysteria on docker
In option [1] you have several choices
Self-signed
certificate for using hysteria without a domain
Custom certificate path
for using a sigend certificate and a valid domain name
There are several protcols you can choice from
- UDP
- Wechat-Video
- FakeTcp
UDP
protcol which uses port hopping , The server can then listen on port 5666, while the client connects with example.com:20000-50000.
Users in China often report that their ISPs block/restrict persistent UDP connections to a single port. Port hopping should invalidate this kind of mechanism.
Wechat-video
obfuscation feature ( highly recommended in Iran
)
faketcp
mode that allows servers and clients to communicate using a protocol that looks like TCP but does not actually go through the system TCP stack. This tricks whatever middleboxes into thinking it’s actually TCP traffic, rendering UDP-specific restrictions useless. (only works on linux and require root privileges)
After specifying the protocol you have to set an authentication password for a password which will prompt you, pressing enter will generate a 6-character random password
After specifying the protocol you have to set an authentication method :
OBFS
: generating a 32-character random and using OBFS for obfuscatingSTRING
: prompt you for password, pressing enter will generate a 6-character random password
Coming Soon
If this Project helped you, you can also help me by donation
Licensed under the GPL-3 license.