back to home

MrMohebi / xray-proxy-grabber-telegram

Xray proxy grabber and checker + JSON and YAML Config - telegram channels

273 stars
39 forks
6 issues
PythonGoDockerfile

AI Architecture Analysis

This repository is indexed by RepoMind. By analyzing MrMohebi/xray-proxy-grabber-telegram in our AI interface, you can instantly generate complete architecture diagrams, visualize control flows, and perform automated security audits across the entire codebase.

Our Agentic Context Augmented Generation (Agentic CAG) engine loads full source files into context on-demand, avoiding the fragmentation of traditional RAG systems. Ask questions about the architecture, dependencies, or specific features to see it in action.

Source files are only loaded when you start an analysis to optimize performance.

Embed this Badge

Showcase RepoMind's analysis directly in your repository's README.

[![Analyzed by RepoMind](https://img.shields.io/badge/Analyzed%20by-RepoMind-4F46E5?style=for-the-badge)](https://repomind.in/repo/MrMohebi/xray-proxy-grabber-telegram)
Preview:Analyzed by RepoMind

Repository Overview (README excerpt)

Crawler view

Xray Proxy Grabber **See more:** also explore this project; the best solution to use these collected proxies : xray-iran-bridge-configs :) Quick access | | all | active all | active ping less than 1000ms | active ping less than 1500ms | active ping less than 1000ms and No google 403 | |----------------|--------------------------------------------------------------------------------------------------------------------------------------|----------------------------------------------------------------------------------------------------------------------------------------------------|-------------------------------------------------------------------------------------------------------------------------------------------------------------|-------------------------------------------------------------------------------------------------------------------------------------------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------| | Row URLs | subscription link | subscription link | ask me to provide if u need | ask me to provide if u need | ask me to provide if u need | | Xray JSON | ask me to provide if u need | json configs | json configs | json configs | json configs | | Xray JSON FULL | ask me to provide if u need | json config File | json config File | json config File | json config File | | Clash Meta | provider link | ask me to provide if u need | provider link | provider link | ask me to provide if u need | Explanation This project is aimed at grabbing fresh proxies from Telegram channels and testing them by real-delay ping. A Telegram bot will listen on provided channels (even private ones), then parse new proxies and commit them to ur repo. The main differences between this project and others are: • creating xray json config from urls (I'll explain what this is for :) ) • can grab proxies from private channels or even PVs (with some little changes). • AND to-dos that will be added :) Telegram grabber: Uses the Telegram MTProto API Framework and acts exactly like ur real account. After first running, It will ask u to sign in to your account. then listens to the provided channel in . Because of that, it can grab proxies everywhere that u join them with ur real account, even PVs :) To get started with the MTProto API, u should get and which I couldn't get them easily. *Note:* Telegram detects u'r using a VPN and throws an error while creating :|. Ask someone to create it for u.(God bless Telegram.) On each new message that contains a proxy URL, will be updated real-time. *Tip:* u can use as subscription link in ur clients app (V2rayNG, V2rayN, etc):) Xray URL Decoder This part of project aimed to decode and convert proxy URL to python class which can be played with. Because of this part I only support I couldn't find it anywhere. Really nobody wrote it before !? :| If u know any repo done this before, notify me, tnx. Xray ping To test grabbed proxies, be only relied on ping of server on that port is not a correct approach. In this part I run a xray-core temporarily, which tries to GET a simple html page by real connection throw proxy. Also, nobody wrote it before. Come on guys. Auto Run Jobs will be run every 1 hour by the GitHub runner and check for grabbed proxies to be active. Next, sort these proxies by real delay ping and save them as JSON type in *Note:* GitHub runners aren't in Iran, So proxy checker can't detect censored proxies. U can run it on ur server from Iran by cron jobs. will be run each 12 hours by GitHub runner and remove all URL proxies which are not present in . So the url list will be clean always *Note:* It means only supported protocols will remain, and all others will be deleted. Env-File: To commit new proxies in ur repo, u should get GitHub tokenSo the bot will be able to commit new changes, such as new proxies. Also, I explained How to get here ToDo • [x] vless protocol support • [x] reality security support • [x] vmess protocol support • [x] trojan protocol support • [x] connect to iran bridge • [x] update iran bridge with actives • [x] tcp security support • [ ] server less grabber (no telegram or server needed)