| Crates.io | nooshdaroo |
| lib.rs | nooshdaroo |
| version | 0.2.2 |
| created_at | 2025-11-17 06:33:51.001667+00 |
| updated_at | 2025-11-28 18:40:09.874059+00 |
| description | Protocol Shape-Shifting SOCKS Proxy - Dynamic protocol emulation for encrypted proxy traffic |
| homepage | https://github.com/0xinf0/nooshdaroo |
| repository | https://github.com/0xinf0/nooshdaroo |
| max_upload_size | |
| id | 1936339 |
| size | 962,198 |
Protocol Shape-Shifting SOCKS Proxy
Nooshdaroo (نوشدارو, Persian for "antidote") disguises encrypted SOCKS5 traffic as legitimate network protocols to bypass censorship and deep packet inspection.
→ https://nooshdaroo.net/ - Download signed binaries, verify GPG signatures, and learn more about the antidote to censorship.
→ NOOSHDAROO TECHNICAL REFERENCE - Everything you need to know about Nooshdaroo: architecture, deployment, API reference, and configuration.
→ QUICK REFERENCE - One-page command cheatsheet and common operations.
# Clone repository
git clone https://github.com/0xinf0/nooshdaroo.git
cd nooshdaroo
# Build from source
cargo build --release
# Binary at target/release/nooshdaroo
# 1. Generate keys and configs
./target/release/nooshdaroo genkey --server-config server.toml --client-config client.toml
# 2. Run server (on VPS)
./target/release/nooshdaroo server --config server.toml
# 3. Run client (on local machine)
./target/release/nooshdaroo client --config client.toml
# 4. Use the proxy
curl --socks5 127.0.0.1:1080 https://example.com
# Corporate network
./target/release/nooshdaroo client --profile corporate --server vps.example.com:8443
# Airport/Hotel WiFi
./target/release/nooshdaroo client --profile airport --server vps.example.com:8443
# High-censorship environments
./target/release/nooshdaroo client --profile china --server vps.example.com:8443
./target/release/nooshdaroo client --profile iran --server vps.example.com:8443
./target/release/nooshdaroo client --profile russia --server vps.example.com:8443
Available profiles: corporate, airport, hotel, china, iran, russia
Nooshdaroo is experimental software and not recommended for security-critical applications.
While Nooshdaroo implements strong cryptography (Noise Protocol Framework with ChaCha20-Poly1305), it is:
For production use cases requiring high security guarantees, consider well-established VPN solutions (WireGuard, OpenVPN) or Tor.
Note: This project builds upon Proteus (~70% of TCP proxy architecture), which is also experimental software.
┌──────────────┐
│ Application │ curl, browser, ssh, etc.
└──────┬───────┘
│ SOCKS5/HTTP CONNECT
┌──────▼───────────────────────────────────────┐
│ Nooshdaroo Client │
│ ┌─────────┐ ┌─────────┐ ┌─────────┐ │
│ │ Proxy │ │ Traffic │ │ Shape- │ │
│ │ Engine │ │ Shaper │ │ Shift │ │
│ └────┬────┘ └────┬────┘ └────┬────┘ │
│ └────────────┴────────────┘ │
│ ┌───────────────▼──────────────┐ │
│ │ Protocol Wrapper (PSF) │ │
│ └───────────────┬──────────────┘ │
│ ┌───────────────▼──────────────┐ │
│ │ Noise Protocol Encryption │ │
│ │ (ChaCha20-Poly1305) │ │
│ └───────────────┬──────────────┘ │
└──────────────────┼──────────────────────────┘
│ Encrypted, Protocol-Wrapped
▼
╔═════════════════╗
║ Internet ║
╚═════════════════╝
│
┌──────────────────▼──────────────────────────┐
│ Nooshdaroo Server │
│ ┌───────────────┬──────────────┐ │
│ │ Protocol Unwrapper │ │
│ └───────────────┬──────────────┘ │
│ ┌───────────────▼──────────────┐ │
│ │ Noise Protocol Decryption │ │
│ └───────────────┬──────────────┘ │
│ ┌───────────────▼──────────────┐ │
│ │ Destination Router │ │
│ └───────────────┬──────────────┘ │
└──────────────────┼──────────────────────────┘
│
▼
┌──────────────┐
│ Destination │
│ (Internet) │
└──────────────┘
Bypass DPI-based blocking in restrictive networks (Great Firewall of China, Iran national firewall, corporate firewalls).
Hide proxy usage from network surveillance and traffic analysis.
Research and testing of protocol fingerprinting and DPI evasion techniques.
Encrypted tunneling with forward secrecy for sensitive communications.
Real-World Benchmark Results (HTTPS tunnel with protocol obfuscation):
| Mode | Download Speed | Time (100 MB) | Overhead | Use Case |
|---|---|---|---|---|
| Direct Connection | 108 MB/s (905 Mbps) | 0.93s | - | Baseline |
| Nooshdaroo Tunnel | 84.5 MB/s (711 Mbps) | 1.18s | 22% | Production |
Test Environment: MacBook Pro M1 → Bare-metal server (1 Gbps connection) → Nov 17, 2025
Performance is sufficient for:
22% overhead breakdown:
Comparison with other solutions:
Performance varies based on network conditions, hardware, protocol selection, and quality settings. See NOOSHDAROO_TECHNICAL_REFERENCE.md for detailed benchmarks and methodology.
See Security Analysis for threat model and detailed security properties.
Nooshdaroo builds on the Proteus project (approximately 70% of core TCP proxy architecture). Key enhancements include:
Development: Orchestrated by Sina Rabbani through context engineering with Claude Code (Anthropic).
Dual-licensed under:
Choose whichever works best for your use case.
Contributions welcome! Areas of interest:
See CONTRIBUTING.md for details.
نوشدارو - The Antidote to Network Censorship