A cross-platform SSH tunneling tool that creates secure connections through direct connections over WebSocket and HTTP proxies.
- Multiple tunnel modes: Direct connection and Proxy
- WebSocket-based SSH tunnels for better bypass capabilities
- SOCKS5 and HTTP proxy support
- Domain spoofing capabilities
- Cross-platform (Windows, Linux, macOS)
Download the latest binary from the releases page or build from source:
git clone https://github.com/ayanrajpoot10/tunn.git
cd tunn
go build- Generate a configuration file:
tunn config generate --mode direct --output config.json- Edit the configuration with your details:
{
"mode": "direct",
"ssh": {
"host": "www.ayanrajpoot.net",
"port": 80,
"username": "abc",
"password": "1234"
},
"listener": {
"port": 1080,
"proxyType": "http"
},
"httpPayload": "GET / HTTP/1.1[crlf]Host: api.ril.com[crlf]Upgrade: websocket[crlf][crlf]",
"connectionTimeout": 30
}- Run Tunn:
tunn --config config.json- Configure your applications to use the proxy at
127.0.0.1:1080
- Direct Mode: Direct connection with optional domain spoofing
- Proxy Mode: Routes through HTTP proxy → WebSocket → SSH server
mode: "direct" or "proxy"ssh.host: SSH server hostnamessh.usernameandssh.password: SSH credentials
listener.port: Local proxy port (default: 1080)listener.proxyType: "socks5" or "http" (default: "socks5")connectionTimeout: Connection timeout in seconds (default: 30)
Set your browser to use HTTP/SOCKS5 proxy at 127.0.0.1:1080
Configure your system proxy settings to use 127.0.0.1:1080 (SOCKS5) or 127.0.0.1:1080 (HTTP) for system-wide tunneling.
MIT License - see LICENSE file for details.