Back to feed

denuitt1/mhr-cfw

denuitt1/mhr-cfw
1.9k
+264/day
206
Python

A Domain-Fronting Relay that routes traffic though GAS (Google Apps Script) and forwards it to Cloudflare Workers. Designed to bypass DPI.

From the README

MHR-CFW - MasterHttpRelay + Cloudflare Worker

This project is an edit of MasterHttpRelayVPN

Disclaimer

mhr-cfw is provided for educational, testing, and research purposes only.

  • Provided without warranty: This software is provided "AS IS", without express or implied warranty, including merchantability, fitness for a particular purpose, and non-infringement.
  • Limitation of liability: The developers and contributors are not responsible for any direct, indirect, incidental, consequential, or other damages resulting from the use of this project or the inability to use it.
  • User responsibility: Running this project outside controlled test environments may affect networks, accounts, proxies, certificates, or connected systems. You are solely responsible for installation, configuration, and use.
  • Legal compliance: You are responsible for complying with all local, national, and international laws and regulations before using this software.
  • Google services compliance: If you use Google Apps Script or other Google services with this project, you are responsible for complying with Google's Terms of Service, acceptable use rules, quotas, and platform policies. Misuse may lead to suspension or termination of your Google account or deployments.
  • License terms: Use, copying, distribution, and modification of this software are governed by the repository license. Any use outside those terms is prohibited.

How It Works

Client -> Local Proxy -> Google/CDN front -> GoogleAppsScript (GAS) Relay -> Cloudflare Worker -> Target website
             |
             +-> shows www.google.com to the network DPI filter

In normal use, the browser sends traffic to the proxy running on your computer. The proxy sends that traffic through Google-facing infrastructure so the network only sees an allowed domain such as www.google.com. Your deployed relay then fetches the real website through cloudflare worker and sends the response back through the same path.

This means the filter sees normal-looking Google traffic, while the actual destination stays hidden inside the relay request.

How to Use

1 - Download project and extract

git clone 
cd mhr-cfw
pip install -r requirements.txt

Can't reach PyPI directly? Use this mirror instead:

pip install -r requirements.txt -i  --trusted-host mirror-pypi.runflare.com

2 - Set Up the Cloudflare Worker (worker.js)

  1. Open Cloudflare Dashboard and sign in with your Cloudflare account.
  2. From the sidebar, navigate to Compute > Workers & Pages
  3. Click Create Application, Choose Start with Hello World and click on Deploy
  4. Click on Edit code and Delete all the default code in the editor.
  5. Open the worker.js file from this project (under script/), copy everything, and paste it into the Apps Script editor.
  6. **Important: