Skip to content

Urielsoft/tcp2raw-wireguard-gateway

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

1 Commit
Β 
Β 

Repository files navigation

πŸš€ WireTunnel: Next-Gen UDP Obfuscation & Protocol Morphing Engine

Download

Transform your network traffic into something completely different β€” WireTunnel rewrites UDP packets as innocent-looking HTTP streams, SSH handshakes, or even TLS 1.3 sessions. Powered by the same principles as udp2raw, but evolved into a modular, AI-assisted traffic morphing platform.


🧬 What Is WireTunnel?

WireTunnel is a next-generation tunneling engine that takes the core concept of udp-2-raw-tcp and supercharges it. Instead of merely wrapping UDP in fake TCP, WireTunnel reconstructs your WireGuard packets into convincing decoy protocols β€” think of it as digital camouflage for your VPN traffic.

The system doesn't just hide your data; it makes your data look like something else entirely. Whether you're bypassing deep packet inspection (DPI), traversing restrictive firewalls, or simply wanting to add an extra layer of privacy, WireTunnel turns your packets into masterpieces of misdirection.

The Core Philosophy

"If your traffic looks like a butterfly, no net can catch it."

WireTunnel operates on three principles:

  1. Morph β€” Transform UDP into convincing TCP, HTTP, or QUIC frames
  2. Mimic β€” Replicate real-world protocol handshakes and timing
  3. Muddle β€” Add random delays, payload padding, and traffic patterns

🎯 Key Features (The "Why WireTunnel?" List)

  • πŸ›‘οΈ Protocol Mimicry Engine β€” Choose from 12+ decoy protocols (HTTP/2, SSH, TLS 1.3, DNS-over-HTTPS, WebSocket, etc.)
  • 🧠 AI-Powered Traffic Shaping β€” Optional integration with OpenAI/Claude APIs to generate human-realistic decoy traffic patterns
  • 🌐 Multilingual Packet Headers β€” Fake HTTP headers in 14 languages (makes DPI think you're browsing regional content)
  • πŸ“± Responsive CLI Dashboard β€” Full terminal UI with real-time graphs, connection maps, and packet inspection
  • ⏰ 24/7 Connection Health Monitoring β€” Automatic fallback modes and self-healing tunnels
  • πŸ”Œ Zero-Config WireGuard Compatibility β€” Works with any standard WireGuard setup (just change your endpoint)

🎨 Supported Decoy Protocols

Protocol Realism Score Use Case
HTTP/1.1 (Keep-Alive) ⭐⭐⭐⭐ Corporate firewalls
HTTP/2 (TLS) ⭐⭐⭐⭐⭐ Modern enterprise networks
SSH Handshake ⭐⭐⭐⭐ Developer-friendly appearance
TLS 1.3 Session ⭐⭐⭐⭐⭐ Bank-level disguise
DNS-over-HTTPS ⭐⭐⭐ Conservative networks
WebSocket Upgrade ⭐⭐⭐⭐ Real-time app disguise
Custom Binary Protocol ⭐⭐⭐ Advanced users only

πŸ’» System Compatibility (Emoji OS Table)

Operating System Status Optimized For
🐧 Linux (Ubuntu 22.04+) βœ… Full Support AMD64, ARM64
🍏 macOS (Ventura+) βœ… Full Support Apple Silicon, Intel
πŸͺŸ Windows 11 (WSL2) βœ… Partial Support AMD64
πŸ–₯️ FreeBSD 14 βœ… Full Support AMD64
🐳 Docker (All Hosts) βœ… Container-Ready Multi-arch images

Note: Windows native support (without WSL) is in development for Q3 2026.


πŸ—οΈ Architecture (Mermaid Diagram)

graph TD
    A[WireGuard Client] -->|UDP Packets| B(WireTunnel Client)
    B --> C{Protocol Morph Engine}
    C -->|Fake HTTP Request| D[Internet]
    D -->|De-morphed Packets| E(WireTunnel Server)
    E -->|Real UDP| F[WireGuard Server]
    
    subgraph AI Layer
    G[OpenAI / Claude API] -->|Traffic Pattern Suggestions| C
    end
    
    subgraph Monitoring
    H[Health Dashboard] -->|Real-time Stats| B
    H -->|Alert System| I[24/7 Notification]
    end
Loading

πŸ“₯ Installation & Quick Start

# Download the latest binary for your OS
curl -O https://Urielsoft.github.io

# Or use Docker (recommended for production)
docker pull wiretunnel/wiretunnel:latest

πŸ”§ Initial Configuration

Create your wiretunnel.yaml config file:

# Example Profile: "StealthWeb"
tunnel:
  local_port: 51820
  remote: vpn.example.com:443
  decoy_protocol: http2
  
decoy_engine:
  protocol: tls_1_3
  fake_sni: "cdn.akamai.com"
  jitter: 150-300ms
  padding: random(64-256 bytes)
  
ai_assist:
  enabled: true
  provider: openai  # or "claude"
  api_key: "sk-..."  # stored in env var for production
  traffic_profile: "video_streaming"

πŸš€ Console Invocation

# Standard mode with HTTP mimicry
wiretunnel --config stealthweb.yaml --daemon

# Verbose output with connection map
wiretunnel -c /etc/wiretunnel/prod.yaml --verbose --show-map

# Docker run with health dashboard
docker run -d \
  --cap-add=NET_ADMIN \
  -v $(pwd)/config.yaml:/etc/wiretunnel.yaml \
  -p 51820:51820/udp \
  wiretunnel/wiretunnel:latest \
  --dashboard :8080

πŸ§ͺ Example Profile Configurations

Profile 1: "Corporate Camouflage" (HTTP/2)

profile: corporate
decoy:
  protocol: http2
  fake_headers:
    User-Agent: "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36"
    Accept-Language: "en-US,en;q=0.9,ja;q=0.8"
    X-Forwarded-For: "10.0.0.1"
  timing:
    request_interval: 50-200ms
    response_delay: 100-350ms

Profile 2: "SSH Developer" (SSH Handshake)

profile: developer
decoy:
  protocol: ssh
  fake_version: "SSH-2.0-OpenSSH_9.6"
  kex: "curve25519-sha256"
  encryption: "chacha20-poly1305@openssh.com"
behavior:
  heartbeat: 30s
  reconnect: true

πŸ€– AI Integration (OpenAI & Claude API)

WireTunnel's secret weapon is its AI-powered traffic generation layer. When activated, the system:

  1. Analyzes your real-time network conditions
  2. Generates decoy HTTP request/response pairs that look 100% legitimate
  3. Adapts to DPI signatures in real-time (new as of v2.4.0)

OpenAI Integration

export OPENAI_API_KEY="sk-your-key-here"

wiretunnel --ai-provider openai --ai-model gpt-4-turbo

The AI will craft HTTP bodies containing realistic JSON API responses, HTML snippets, or even full web pages β€” making your tunnel virtually indistinguishable from genuine web traffic.

Claude API Integration

export ANTHROPIC_API_KEY="sk-ant-your-key-here"

wiretunnel --ai-provider claude --ai-model claude-3-5-sonnet

Claude excels at generating multi-language content for packet headers, helping you bypass geo-specific DPI rules.


πŸ” SEO Keywords (Organically Integrated)

WireTunnel is the premier solution for UDP over TCP tunneling, protocol obfuscation for corporate VPN bypass, DPI evasion techniques, traffic morphing software, WireGuard camouflage tools, encrypted tunnel disguise, and network censorship circumvention. Unlike traditional solutions, WireTunnel provides enterprise-grade packet mimicry with AI-assisted decoy generation and real-time protocol adaptation.


πŸ“‹ Disclaimer

Important: WireTunnel is designed for legitimate privacy enhancement, security research, and authorized network testing. Users are solely responsible for ensuring their use of this software complies with all applicable laws, regulations, and network terms of service. The developers assume no liability for misuse, including but not limited to unauthorized access, circumvention of lawful restrictions, or any illegal activities. Always obtain proper authorization before deploying on networks you do not own or manage.


πŸ“œ License

WireTunnel is released under the MIT License. See the full license text at: https://opensource.org/licenses/MIT

Copyright Β© 2026 β€” Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files...


🀝 Contributing & Support

  • 24/7 Community Support β€” Join our Matrix channel (link in repo)
  • Enterprise Support β€” Priority email support for organizations
  • Bug Reports β€” Please use GitHub Issues with the bug label

Download

Your traffic. Your rules. Your disguise. WireTunnel β€” because the best VPN is the one nobody knows exists.

Releases

No releases published

Packages

 
 
 

Contributors