Cyber security

Shadowsocks : The Ultimate Guide To Features, Installation, And Configuration

  • hickory-dns – Uses hickory-resolver as DNS resolver instead of tokio‘s builtin.
  • local-http – Allow using HTTP protocol for sslocal
    • local-http-native-tls – Support HTTPS with native-tls
    • local-http-rustls – Support HTTPS with rustls
  • local-tunnel – Allow using tunnel protocol for sslocal
  • local-socks4 – Allow using SOCKS4/4a protocol for sslocal
  • local-redir – Allow using redir (transparent proxy) protocol for sslocal
  • local-dns – Allow using dns protocol for sslocal, serves as a DNS server proxying queries to local or remote DNS servers by ACL rules
  • local-fake-dns – FakeDNS, allocating an IP address for each individual Query from a specific IP pool
  • local-tunTUN interface support for sslocal
  • local-online-config – SIP008 Online Configuration Delivery
  • stream-cipher – Enable deprecated stream ciphers. WARN: stream ciphers are UNSAFE!
  • aead-cipher-extra – Enable non-standard AEAD ciphers
  • aead-cipher-2022 – Enable AEAD-2022 ciphers (SIP022)
  • aead-cipher-2022-extra – Enable AEAD-2022 extra ciphers (non-standard ciphers)

Memory Allocators

This project uses system (libc) memory allocator (Rust’s default). But it also allows you to use other famous allocators by features:

  • jemalloc – Uses jemalloc as global memory allocator
  • mimalloc – Uses mi-malloc as global memory allocator
  • tcmalloc – Uses TCMalloc as global memory allocator. It tries to link system-wide tcmalloc by default, use vendored from source with tcmalloc-vendored.
  • snmalloc – Uses snmalloc as global memory allocator
  • rpmalloc – Uses rpmalloc as global memory allocator

crates.io

# Install from crates.io
cargo install shadowsocks-rust

then you can find sslocal and ssserver in $CARGO_HOME/bin.

Install Using Homebrew

For macOS and Linux, you can install it using Homebrew:

brew install shadowsocks-rust

For more information click here.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

Pystinger : Bypass Firewall For Traffic Forwarding Using Webshell

Pystinger is a Python-based tool that enables SOCKS4 proxying and port mapping through webshells. It…

1 week ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

1 week ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

1 week ago

How to Bash Append to File: A Simple Guide for Beginners

If you are working with Linux or writing bash scripts, one of the most common…

1 week ago

Mastering the Bash Case Statement with Simple Examples

What is a bash case statement? A bash case statement is a way to control…

1 week ago

How to Check if a File Exists in Bash – Simply Explained

Why Do We Check Files in Bash? When writing a Bash script, you often work…

2 weeks ago