explaingit

valdikss/goodbyedpi

28,240CAudience · vibe coderComplexity · 3/5MaintainedLicenseSetup · hard

TLDR

Windows utility that bypasses ISP censorship by manipulating network packets to confuse Deep Packet Inspection systems blocking websites.

Mindmap

mindmap
  root((repo))
    What it does
      Bypasses DPI blocking
      Manipulates packets
      Confuses censorship
    How it works
      Fragments packets
      Injects fake requests
      Alters headers
    Use cases
      Access blocked sites
      Bypass ISP censorship
      Lightweight alternative
    Tech stack
      C language
      Windows kernel
      Network interception
    Setup
      Windows 7-11
      Admin privileges
      Command line

Things people build with this

USE CASE 1

Access websites blocked by your ISP without using a full VPN.

USE CASE 2

Bypass DNS-based censorship by redirecting DNS queries locally.

USE CASE 3

Test network resilience by simulating packet fragmentation and manipulation.

Tech stack

CWindowsNetwork APIs

Getting it running

Difficulty · hard Time to first run · 1h+

Requires Windows system, C compiler setup, understanding of network APIs, and kernel-level packet manipulation which needs admin privileges and careful testing.

Use freely for any purpose including commercial. Keep the notice and disclose changes to the patent grant.

In plain English

GoodbyeDPI is a tool that helps Windows computers reach websites their Internet Service Provider is trying to block. The blocking technique it works around is called Deep Packet Inspection, or DPI: instead of just looking at which address you connect to, the provider's equipment peeks inside the actual data packets your browser sends, recognises the name of a forbidden site, and either silently fakes a faster reply or cuts the connection. GoodbyeDPI deals with both flavours, the passive kind that races to answer first and the active kind that sits between you and the destination. The way it works is by quietly rewriting outgoing network packets so the DPI box no longer recognises them, while the real destination still understands them. The README describes a long list of tricks: splitting packets into smaller pieces, sending them out of order, mixing the upper and lower case of the website name in the request header, sending decoy packets with a wrong checksum, or shortening the lifetime of fake packets so they fool the inspector but never reach the real server. There is also an option to redirect domain-name lookups to an alternative public resolver so the provider cannot poison those either. Users typically unpack the release, double-click one of the bundled batch scripts (one tuned for Russia, another for any country), and run it with administrator privileges. Someone would reach for this when their home or office connection blocks specific sites and they want a small, local workaround that does not require a paid VPN. It is a command-line program for Windows 7 through 11, written in C. The full README is longer than what was provided.

Copy-paste prompts

Prompt 1
How do I set up GoodbyeDPI on Windows 11 to bypass my ISP's website blocking?
Prompt 2
Show me how to create a blocklist file for GoodbyeDPI to target specific websites.
Prompt 3
Explain how packet fragmentation in GoodbyeDPI confuses Deep Packet Inspection systems.
Prompt 4
How do I run GoodbyeDPI from the command line with custom fragmentation settings?
Open on GitHub → Explain another repo

Generated 2026-05-21 · Model: sonnet-4-6 · Verify against the repo before relying on details.