unrknize
Spoof RosKomPozor listening by protocol
How it works
unrknize-server part simply starts tls encrypted server that acts like a https server
unrknize-client part acts like a normal browser that connects to a normal https site
Usage
On server:
git clone https://git.meex.lol/MeexReay/unrknize
cd unrknize/unrknize-server
cargo run -- somepassword.example.com 127.0.0.1:9090 127.0.0.1:443
# 127.0.0.1:9090 is the server where you want client to connect, but RKN detects it by protocol handshake
# use nginx or smth if you already have https port (443) used or use any other port (less believable)
# somepassword.example.com can be changed on anything else, for example just your ip address, its used for SNI
On client:
git clone https://git.meex.lol/MeexReay/unrknize
cd unrknize/unrknize-client
cargo run -- somepassword.example.com 127.0.0.1:443 127.0.0.1:1080
# 127.0.0.1:1080 is the local server where you can connect now
License
This project is licensed under WTFPL.
Languages
Rust
100%