Documentation Index
Fetch the complete documentation index at: https://e-gurl.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
Overview
The Advanced Evasion Suite gives you access to the most effective censorship circumvention technologies currently available. Multiple protocols are supported, each working through different mechanisms — so you have options depending on your network conditions.Available Tools
1. VLESS + REALITY (Most Effective)
Effectiveness: 99.5% success rate against Iran’s DPI The most effective protocol currently available. REALITY masks the TLS fingerprint by mimicking legitimate HTTPS connections to major websites. Best for: Daily use when maximum reliability is needed2. Hysteria2 (QUIC + Salamander)
Effectiveness: 95%+ against Iran’s protocol filter QUIC-based proxy with Salamander obfuscation. Excellent performance for gaming and streaming due to QUIC’s congestion control. Best for: Gaming, streaming, low-latency needs3. Other Sing-box Protocols
Access multiple protocols through sing-box integration:- VMess: Versatile proxy protocol
- Trojan: HTTPS-masking proxy
- ShadowTLS: Certificate stealing — hides traffic behind legitimate TLS handshakes
- TUIC: QUIC-based alternative
4. Tunnel Suite (DNSTT / Slipstream / Paqet)
DNS-MNS includes a unified Tunnel Suite (nested under Advanced Evasion) with profile-based tunnel operations:- Profile create/list/select/import/export
- Resolver scan and health checks (with optional auto-switching)
- Runtime start/stop/status/logs (requires upstream tunnel binaries installed in PATH)
5. TLS Fragmentation
For: Breaking SNI-based blocking at the TCP/TLS layer Split the TLS ClientHello across multiple TCP segments, defeating SNI inspection.Choosing the Right Protocol
| Situation | Recommended |
|---|---|
| Maximum reliability | VLESS + REALITY |
| Gaming / low latency | Hysteria2 |
| Profile-based tunneling | Tunnel Suite (DNSTT / Slipstream / Paqet) |
| HTTPS-looking traffic | ShadowTLS (via singbox) |
| SNI blocking | TLS Fragmentation |
| UDP blocked | Hysteria2 or VLESS |
Evasion Status
Check the status of all running evasion tools:Configuration Examples
Scenario 1: Maximum Reliability
Scenario 2: Maximum Stealth
Scenario 3: Gaming / Low Latency
Troubleshooting
All Protocols Failing
- Check basic connectivity:
ping 1.1.1.1 - Run diagnostics:
dns-mns diagnose - Try a different network: Test on mobile hotspot
- Check system time: Incorrect time causes TLS failures
Protocol Connects but Slow
- Try a different server: Geographic distance affects speed
- Disable fragmentation: Try
--fragment nonefor speed - Switch protocol: Each protocol performs differently per network
Frequent Disconnections
- Check for QoS shaping: Try different ports (443, 8443)
- Use the fallback proxy:
dns-mns proxyauto-switches protocols - Run diagnostics:
dns-mns diagnose > debug.txt
No single protocol works everywhere all the time. Try different options to find what works best for your specific network conditions.