Last active
June 13, 2023 19:29
-
-
Save lepz0r/89b278324bc453df8ee32e501458b8cf to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
@ECHO OFF | |
PUSHD "%~dp0" | |
set _arch=x86 | |
IF "%PROCESSOR_ARCHITECTURE%"=="AMD64" (set _arch=x86_64) | |
IF DEFINED PROCESSOR_ARCHITEW6432 (set _arch=x86_64) | |
echo This script should be run with administrator privileges. | |
echo Right click - run as administrator. | |
echo Press any key if you're running it as administrator. | |
pause | |
sc stop "GoodbyeDPI" | |
sc delete "GoodbyeDPI" | |
sc create "GoodbyeDPI" binPath= "\"%CD%\%_arch%\goodbyedpi.exe\" -p -r -s -f 8 -e 8 --wrong-seq " start= "auto" | |
sc description "GoodbyeDPI" "Passive Deep Packet Inspection blocker and Active DPI circumvention utility" | |
sc start "GoodbyeDPI" | |
POPD |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
@ECHO OFF | |
PUSHD "%~dp0" | |
set _arch=x86 | |
IF "%PROCESSOR_ARCHITECTURE%"=="AMD64" (set _arch=x86_64) | |
IF DEFINED PROCESSOR_ARCHITEW6432 (set _arch=x86_64) | |
PUSHD "%_arch%" | |
start "" goodbyedpi.exe -p -r -s -f 8 -e 8 --wrong-seq | |
POPD | |
POPD |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment