Overview
The Advanced Evasion Suite gives you access to the most effective censorship circumvention technologies currently available. Multiple protocols are supported, each working through different mechanisms — so you have options depending on your network conditions.Available Tools
1. VLESS + REALITY (Most Effective)
Effectiveness: 99.5% success rate against Iran’s DPI The most effective protocol currently available. REALITY masks the TLS fingerprint by mimicking legitimate HTTPS connections to major websites. Best for: Daily use when maximum reliability is needed2. Hysteria2 (QUIC + Salamander)
Effectiveness: 95%+ against Iran’s protocol filter QUIC-based proxy with Salamander obfuscation. Excellent performance for gaming and streaming due to QUIC’s congestion control. Best for: Gaming, streaming, low-latency needs3. Other Sing-box Protocols
Access multiple protocols through sing-box integration:- VMess: Versatile proxy protocol
- Trojan: HTTPS-masking proxy
- ShadowTLS: Certificate stealing — hides traffic behind legitimate TLS handshakes
- TUIC: QUIC-based alternative
4. Tunnel Suite (DNSTT / Slipstream / Paqet)
DNS-MNS includes a unified Tunnel Suite (nested under Advanced Evasion) with profile-based tunnel operations:- Profile create/list/select/import/export
- Resolver scan and health checks (with optional auto-switching)
- Runtime start/stop/status/logs (requires upstream tunnel binaries installed in PATH)
5. TLS Fragmentation
For: Breaking SNI-based blocking at the TCP/TLS layer Split the TLS ClientHello across multiple TCP segments, defeating SNI inspection.Choosing the Right Protocol
| Situation | Recommended |
|---|---|
| Maximum reliability | VLESS + REALITY |
| Gaming / low latency | Hysteria2 |
| Profile-based tunneling | Tunnel Suite (DNSTT / Slipstream / Paqet) |
| HTTPS-looking traffic | ShadowTLS (via singbox) |
| SNI blocking | TLS Fragmentation |
| UDP blocked | Hysteria2 or VLESS |
Evasion Status
Check the status of all running evasion tools:Configuration Examples
Scenario 1: Maximum Reliability
Scenario 2: Maximum Stealth
Scenario 3: Gaming / Low Latency
Troubleshooting
All Protocols Failing
- Check basic connectivity:
ping 1.1.1.1 - Run diagnostics:
dns-mns diagnose - Try a different network: Test on mobile hotspot
- Check system time: Incorrect time causes TLS failures
Protocol Connects but Slow
- Try a different server: Geographic distance affects speed
- Disable fragmentation: Try
--fragment nonefor speed - Switch protocol: Each protocol performs differently per network
Frequent Disconnections
- Check for QoS shaping: Try different ports (443, 8443)
- Use the fallback proxy:
dns-mns proxyauto-switches protocols - Run diagnostics:
dns-mns diagnose > debug.txt
No single protocol works everywhere all the time. Try different options to find what works best for your specific network conditions.