/sing-warp

One-click WARP script based on sing-box core

Primary LanguageShellGNU General Public License v3.0GPL-3.0

sing-warp

based on sing-box The core one -click WARP unlocking script supports areas that WGCFs such as HK/Mei West cannot connect. Do not support it in the IPv6 network environment for the time being.

Forced reanalysis of domain names to IPv6 to strengthen the unlocking effect.

WARP Example of unlocking effect

image

Support AMD64/ARM64 architecture. Theoretically supports all kinds of Linux distributions using SystemD.

The default provides local SOCKS proxy entrances, Shadowsocks, and VMESS WebSocket proxy protocols (support WS-0RTT).

Can be enabled by TUN transparent proxy mode, which can take over traffic without additional settings in this mode.

Note: The TUN mode does not support containers such as OpenVZ/LXC, and it will make IPv6 traffic unable to enter the site. Do not use this mode on VPS with only IPv6 networks.

Install

sudo -i
bash <(curl -L https://raw.githubusercontent.com/warexify/sing-warp/main/install.sh)

Use

Use "SystemCtl" command to control the sing-warp service, for example:

systemctl start sing-warp # Start the sing-warp service
systemctl stop sing-warp # Stop sing-warp service
systemctl restart sing-warp # Restart sing-warp service
systemctl status sing-warp # View sing-warp running status

Configuration

sing-warp config is located in /opt/sing-warp/config,the text editor can be used to modify the diversion mode, diversion rules, etc.

WARP config is located in /opt/sing-warp/warp.conf,Default warp-reg automatically generate, you can modify it yourself.

ShadowSocks and Vmess Websocket config is located in /opt/sing-warp/proxy_config,You can use a text editor to modify.

sing-box config is located in /opt/sing-warp/config.json, You can add an agency agreement to the inbounds part by some.

Uninstalled

systemctl disable --now sing-warp && rm -rf /opt/sing-warp && rm -f /etc/systemd/system/sing-warp.service