mhr-cfw

Project Url: denuitt1/mhr-cfw
Introduction: A Domain-Fronting Relay that routes traffic though GAS (Google Apps Script) and forwards it to Cloudflare Workers. Designed to bypass DPI.
More: Author   ReportBugs   
Tags:

GitHub

English Persian

Disclaimer

mhr-cfw is provided for educational, testing, and research purposes only.

  • Provided without warranty: This software is provided "AS IS", without express or implied warranty, including merchantability, fitness for a particular purpose, and non-infringement.
  • Limitation of liability: The developers and contributors are not responsible for any direct, indirect, incidental, consequential, or other damages resulting from the use of this project or the inability to use it.
  • User responsibility: Running this project outside controlled test environments may affect networks, accounts, proxies, certificates, or connected systems. You are solely responsible for installation, configuration, and use.
  • Legal compliance: You are responsible for complying with all local, national, and international laws and regulations before using this software.
  • Google services compliance: If you use Google Apps Script or other Google services with this project, you are responsible for complying with Google's Terms of Service, acceptable use rules, quotas, and platform policies. Misuse may lead to suspension or termination of your Google account or deployments.
  • License terms: Use, copying, distribution, and modification of this software are governed by the repository license. Any use outside those terms is prohibited.

How It Works

Client -> Local Proxy -> Google/CDN front -> GoogleAppsScript (GAS) Relay -> Cloudflare Worker -> Target website
             |
             +-> shows www.google.com to the network DPI filter

In normal use, the browser sends traffic to the proxy running on your computer. The proxy sends that traffic through Google-facing infrastructure so the network only sees an allowed domain such as www.google.com. Your deployed relay then fetches the real website through cloudflare worker and sends the response back through the same path.

This means the filter sees normal-looking Google traffic, while the actual destination stays hidden inside the relay request.


How to Use

1 - Download project and extract

git clone https://github.com/denuitt1/mhr-cfw.git
cd mhr-cfw
pip install -r requirements.txt

Can't reach PyPI directly? Use this mirror instead:

pip install -r requirements.txt -i https://mirror-pypi.runflare.com/simple/ --trusted-host mirror-pypi.runflare.com

2 - Set Up the Cloudflare Worker (worker.js)

  1. Open Cloudflare Dashboard and sign in with your Cloudflare account.
  2. From the sidebar, navigate to Compute > Workers & Pages
  3. Click Create Application, Choose Start with Hello World and click on Deploy
  4. Click on Edit code and Delete all the default code in the editor.
  5. Open the worker.js file from this project (under script/), copy everything, and paste it into the Apps Script editor.
  6. Important: Change the worker on this line to the worker you created:
    const WORKER_URL = "myworker.workers.dev";
    
  7. Click Deploy.

3 - Set Up the Google Relay (Code.gs)

  1. Open Google Apps Script and sign in with your Google account.
  2. Click New project.
  3. Delete all the default code in the editor.
  4. Open the Code.gs file from this project (under script/), copy everything, and paste it into the Apps Script editor.
  5. Important: Change the password on this line to something only you know, also replace the worker url with your cloudflare worker:
    const AUTH_KEY = "your-secret-password-here";
    const WORKER_URL = "https://myworker.workers.dev";
    
  6. Click DeployNew deployment.
  7. Choose Web app as the type.
  8. Set:
    • Execute as: Me
    • Who has access: Anyone
  9. Click Deploy.
  10. Copy the Deployment ID (it looks like a long random string). You'll need it in the next step.

⚠️ Remember the password you set in step 3. You'll use the same password in the config file below.

4 - Run

Click on the run.bat file (on windows) or run.sh file (on linux) to start the relay.

If you're running for the first time it will prompt a setup wizard where you have to enter the AUTH_KEY and Google Apps Script Deployment ID. You should see a message saying the HTTP proxy is running on 127.0.0.1:8085

5 - Usage

We recommend using v2rayN client and configuring a socks5 proxy.

You can also use FoxyProxy's Chrome extension or Firefox extension to use this proxy in your browser.

6 - Test your connection

Open ipleak.net in your browser, you should see your ip address set as cloudflare's.

image

Optional: Stable Exit IP via Upstream Forwarder

CAPTCHAs (Cloudflare Turnstile/bot challenge, reCAPTCHA, hCaptcha) bind tokens to the IP that solved the challenge. Cloudflare Workers exit through different edge IPs per request, so verification on the target site fails even when you solve the challenge. This optional add-on lets the Worker forward all fetch() calls through a small Node server you run on a VPS with a stable IP — giving the target site one consistent exit address.

When you need this

  • Sites behind Cloudflare's bot challenge keep looping you back to the challenge page.
  • Login forms reject you after solving a reCAPTCHA/hCaptcha.
  • You need cookie continuity across requests (e.g. cf_clearance).

If you don't hit these, leave it unconfigured — the Worker behaves exactly as before.

Why a separate server is required

Cloudflare Workers don't expose a stable outbound IP — fetch() exits through a rotating pool of Cloudflare edge IPs, which is exactly what breaks IP-bound CAPTCHA tokens. Cloudflare's static-egress options (BYOIP, Egress Workers) are Enterprise-tier, so a small VPS with a static IP is the practical workaround. The forwarder is just a thin proxy that re-issues the fetch() from a stable address.

1. Deploy the forwarder on a VPS

The reference implementation is script/upstream_forwarder.js. It needs Node 18+ and no dependencies. Run it behind Caddy or nginx with TLS — the Worker rejects non-HTTPS forwarder URLs.

# On your VPS (Ubuntu/Debian example):
sudo apt install -y nodejs   # must be 18+
export AUTH_KEY="some-long-random-string-at-least-32-chars"
export PORT=8787
node script/upstream_forwarder.js

Front it with Caddy for auto-TLS:

forwarder.example.com {
    reverse_proxy 127.0.0.1:8787
}

Quick smoke test:

curl -X POST https://forwarder.example.com/fwd \
  -H "x-upstream-auth: $AUTH_KEY" \
  -H "content-type: application/json" \
  -d '{"u":"https://httpbin.org/ip","m":"GET","h":{}}'

The decoded response body should show the VPS's IP.

2. Wire the Worker to the forwarder

In the Cloudflare dashboard → your Worker → Settings → Variables and Secrets:

Name Type Value
UPSTREAM_FORWARDER_URL Secret https://forwarder.example.com/fwd
UPSTREAM_AUTH_KEY Secret the same AUTH_KEY you set on the VPS
UPSTREAM_FAIL_MODE Variable closed (default) — return 502 on forwarder failure. Use open to fall back to direct fetch.
UPSTREAM_TIMEOUT_MS Variable (optional) default 25000

Save and redeploy the Worker.

3. Verify

Browse https://httpbin.org/ip through the proxy — you should see the VPS's IP, not Cloudflare's. Then revisit a CAPTCHA-protected site that wasn't working — the challenge should now validate.

The forwarder must require auth. Without AUTH_KEY it refuses to start. Anyone with the URL and key can use it as a relay, so keep both secret.


Sources for this project

Apps
About Me
GitHub: Trinea
Facebook: Dev Tools