based on sing-box The core one -click WARP unlocking script supports areas that WGCFs such as HK/Mei West cannot connect. Do not support it in the IPv6 network environment for the time being.
Forced reanalysis of domain names to IPv6 to strengthen the unlocking effect.
Support AMD64/ARM64 architecture. Theoretically supports all kinds of Linux distributions using SystemD.
The default provides local SOCKS proxy entrances, Shadowsocks, and VMESS WebSocket proxy protocols (support WS-0RTT).
Can be enabled by TUN transparent proxy mode, which can take over traffic without additional settings in this mode.
Note: The TUN mode does not support containers such as OpenVZ/LXC, and it will make IPv6 traffic unable to enter the site. Do not use this mode on VPS with only IPv6 networks.
sudo -i
bash <(curl -L https://raw.githubusercontent.com/warexify/sing-warp/main/install.sh)
Use "SystemCtl" command to control the sing-warp service, for example:
systemctl start sing-warp # Start the sing-warp service
systemctl stop sing-warp # Stop sing-warp service
systemctl restart sing-warp # Restart sing-warp service
systemctl status sing-warp # View sing-warp running status
sing-warp config is located in /opt/sing-warp/config,the text editor can be used to modify the diversion mode, diversion rules, etc.
WARP config is located in /opt/sing-warp/warp.conf,Default warp-reg automatically generate, you can modify it yourself.
ShadowSocks and Vmess Websocket config is located in /opt/sing-warp/proxy_config,You can use a text editor to modify.
sing-box config is located in /opt/sing-warp/config.json, You can add an agency agreement to the inbounds part by some.
systemctl disable --now sing-warp && rm -rf /opt/sing-warp && rm -f /etc/systemd/system/sing-warp.service