explaingit

bannedbook/fanqiang

45,546KotlinAudience · generalComplexity · 2/5ActiveSetup · easy

TLDR

Curated collection of guides and tools to bypass internet censorship, particularly China's Great Firewall. Covers Shadowsocks, V2Ray, Trojan, and other proxy tools across Android, iOS, Windows, macOS, Linux, and routers.

Mindmap

mindmap
  root((repo))
    What it does
      Bypass censorship
      Access blocked sites
      Proxy configuration
    Tools covered
      Shadowsocks
      V2Ray and Trojan
      Brook and Psiphon
    Platforms supported
      Android and iOS
      Windows and macOS
      Linux and routers
    How to use
      Step-by-step guides
      Download links
      Pre-configured bundles
    Special features
      ChromeGo browser
      Gaming console setup
      Screenshots included

Things people build with this

USE CASE 1

Access Google, YouTube, and international websites from mainland China without technical expertise.

USE CASE 2

Set up a proxy on your Android phone or iPhone using step-by-step guides with screenshots.

USE CASE 3

Configure your home router with circumvention tools to protect all connected devices.

USE CASE 4

Use ChromeGo portable browser bundle with pre-configured free servers for immediate access.

Tech stack

KotlinShadowsocksV2RayTrojanBrookPsiphon

Getting it running

Difficulty · easy Time to first run · 5min
License could not be detected automatically. Check the repository's LICENSE file before use.

In plain English

Fanqiang (which translates roughly to "crossing the wall" or "circumventing censorship") is a Chinese-language resource hub for tools and tutorials that help users bypass internet censorship, particularly the Great Firewall of China. The problem it addresses is that many widely-used internet services, including Google, YouTube, various social platforms, and other international websites, are blocked for users in mainland China, making it difficult or impossible to access them without special software. The repository is not a single application but rather a curated collection of guides, download links, and pre-configured software bundles. It covers a wide range of circumvention tools and proxy protocols including Shadowsocks, ShadowsocksR, V2Ray, Trojan, Brook, Psiphon, and others. The README organizes these by platform: Android apps, iPhone and iPad apps, macOS desktop tools, Windows desktop tools, Linux, home routers (such as OpenWRT), and even gaming consoles like PlayStation and Nintendo Switch. There is also a one-click browser bundle called ChromeGo that packages multiple circumvention tools with pre-configured free servers into a portable Chrome browser package. Someone would use this repository if they are based in a region with heavy internet filtering and want practical instructions for regaining access to blocked websites and services. The guides are written in Chinese and aimed at everyday users rather than technical experts, the emphasis is on step-by-step walkthroughs with screenshots rather than raw configuration files. The repository's primary language is listed as Kotlin, likely reflecting some Android app components included in the project. The broader toolkit spans multiple languages and platforms, depending on which tool is being used.

Copy-paste prompts

Prompt 1
I'm in China and can't access Google or YouTube. Walk me through setting up Shadowsocks on my Windows computer using the fanqiang repository guides.
Prompt 2
Show me how to use the ChromeGo browser bundle from fanqiang to bypass the Great Firewall without installing additional software.
Prompt 3
I want to set up V2Ray on my iPhone. What are the step-by-step instructions from the fanqiang repository?
Prompt 4
Help me configure my OpenWRT router with a circumvention tool using the fanqiang guides so all my devices can access blocked sites.
Prompt 5
Which proxy tool from fanqiang (Shadowsocks, V2Ray, Trojan, Brook) is easiest for a non-technical user to set up on Android?
Open on GitHub → Explain another repo

Generated 2026-05-18 · Model: sonnet-4-6 · Verify against the repo before relying on details.