AI Architecture Analysis
This repository is indexed by RepoMind. By analyzing hyperion-cs/dpi-checkers in our AI interface, you can instantly generate complete architecture diagrams, visualize control flows, and perform automated security audits across the entire codebase.
Our Agentic Context Augmented Generation (Agentic CAG) engine loads full source files into context on-demand, avoiding the fragmentation of traditional RAG systems. Ask questions about the architecture, dependencies, or specific features to see it in action.
Repository Overview (README excerpt)
Crawler viewDPI Checkers š This repository contains checkers that allow you to determine if your residential ISP has DPI, as well as the specific methods (and their parameters) the censor uses for restrictions. > [!WARNING] > All content in this repository is provided **for research and educational purposes only**. > You are **solely responsible** for ensuring that your use of any code, data, or information from this repository complies with all applicable laws and regulations in your jurisdiction. > The authors and contributors **assume no liability** for any misuse or violations arising from the use of this materials. Checkers list :bulb: For web checkers: some providers block access to _hyperion-cs.github.io_ ā in this case, you can preload checker in your browser. ⢠ā **RU :: DPI-CH** (dpi comprehensive checker) This is the "big brother" of all other checkers, not limited by the browser sandbox. It is an attempt to create a powerful tool for general-purpose DPI analysis (incl. an improved _tcp 16-20_ checker and much more). Extremely flexible configuration. Written in golang, builds are available for windows/macos/linux (android coming soon). See its page for a detailed description. ⢠**RU :: TCP 16-20** => https://hyperion-cs.github.io/dpi-checkers/ru/tcp-16-20 Allows to detect _TCP 16-20_ blocking method in Russia + host alive check. The tests use popular web-services hosted by providers whose subnets are potentially subject to limitations. The testing process runs right in your browser and the source code is available. VPN should be disabled during the check. This checker has optional _GET_ parameters: | name | type | default | description | |:-:|:-:|:-:|-| | timeout | int | | Timeout for connecting/fetching data from endpoint (in ms). | | host | string | ā | A custom host to check in addition to the default ones (e.g. your steal-oneself server). It doesn't matter what the CORS policy is. | | provider | string | _Custom_ | Provider name for the custom endpoint (you can set any name). | ⢠**RU :: IPv4 Whitelisted Subnets** => https://hyperion-cs.github.io/dpi-checkers/ru/ipv4-whitelisted-subnets Allows to detect IPv4 subnets from the so-called "whitelist" in cases where a censor restricts TCP/UDP/etc connections by IP subnets (aka CIDR censorship). There are three control buttons: ⢠_Cache_ ā fetch and cache suitable IPv4 subnets in the client browser (_local storage_) for further tests. They are saved even after reloading the checker's web page, exiting a browser, etc. This process uses services that are almost certainly not on the whitelist, so it is wise to run it when your provider does not use whitelists (e.g., your "home" ISP's Wi-Fi). This process can only be repeated when you want to update the list of testable subnets of suitable ASes) (and they change quite rarely); ⢠_Check_ ā check suitable subnets if they are on the whitelist; ⢠_Save_ ā save the check results to a _.csv_ file. This checker has optional _GET_ parameters: | name | type | default | description | |:-:|:-:|:-:|-| | timeout | int | | Timeout for connecting/fetching data from host (in ms). | | sn_sample_size | int | | The number of random unique hosts that will be checked for each suitable subnet. | | sn_alive_min | int | | The minimum number of "alive" hosts in a subnet to declare it as whitelisted. | | sn_only_24_prefix | bool | | Check only subnets with the prefix in each AS (this is usually preferable, as a censor is unlikely to allow larger subnets). | :warning: There are some nuances to be noted: ⢠Not all subnets on the _Internet_ are tested, only those _AS_ subnets that could potentially be on the whitelist and that could potentially be available to the "customer"; ⢠There may be _false negative_ results, as selective checks are used for performance reasons + a test HTTP(S) HEAD request is sent to port for selected hosts in each subnet; ⢠This checker will not work if a censor, in addition to subnet restrictions, also restricts TLS SNI (_unfortunately, the browser sandbox is unable to spoof this parameter_); ⢠If you are using mobile internet, don't worry about large traffic usage (_it will use a couple of megabytes at maximum_); ⢠It is prohibited to minimize the browser or lock the screen on phones during the check (_however, you can share Wi-Fi from your phone to your computer ā this is more convenient_); ⢠Even with performance optimizations, the checker can take quite a while to run (_several tens of minutes_). In the worst case, the time ā "_number of suitable subnets_" Ć (_see above_). See here for details on this blocking method. ⢠**RU :: TCP 16-20 DWC** (domain whitelist checker) Allows to find out whitelisted items on DPIs where _TCP 16-20_ blocking method is applied. This kind of information can be interesting in its own right as well as useful for bypassing limitations. A list of domains is required as input. Also requires _Python 3_, the _curl_ utility, and a specially configured server on "limited" networks. See here for details (ready-to-use results are also available for download there). Contributing We would be happy if you could help us improve our checkers through PR or by creating issues (please use only English for international communication). Also you can star the repository so you don't lose the checkers. The repository is available here.