A traffic simulation and obfuscation tool written in Go.
It generates high-volume noise traffic to mask user behavior and bypass Deep Packet Inspection (DPI) systems that rely on behavioral analysis.
The tool uses a hybrid approach combining HTTP-based traffic generation with real browser automation to execute JavaScript and mimic human browsing behavior.
- Real browser simulation using chromedp with headless Chrome
- Executes real JavaScript (e.g. Fast.com speed tests)
- High-bandwidth download masking using OVH and Hetzner servers
- Hybrid traffic pattern combining heavy downloads and light browsing
- Automatic system proxy usage (e.g. V2rayN system proxy mode)
- Fully configurable worker counts, chunk sizes, and durations
Uploading large files creates a distinct traffic pattern:
- High upload-to-download ratio
- Continuous traffic to a single destination
The tool generates mixed traffic patterns:
- Download data from:
- Consume downstream bandwidth
- Reduce effective upload ratio
- Navigates to:
- Executes JavaScript speed tests
- Produces real browser-based traffic
The resulting traffic profile resembles a power user downloading content or performing network diagnostics.
- Go 1.19 or higher
- Google Chrome or Microsoft Edge
- Optional: System proxy software (e.g. V2rayN)
git clone https://github.com/your-username/your-repo-name.git
cd your-repo-name
go get -u github.com/chromedp/chromedp
go build -o traffic-obfuscator main.goRun the application:
./traffic-obfuscatorPress ENTER to start traffic generation Start your upload immediately after Press ENTER again to stop traffic generation
- HTTP Workers: Utilize net/http with io.CopyN to download specific chunks (e.g., 20MB) to simulate buffer downloading.
- Browser Worker: Uses Chrome DevTools Protocol (chromedp) to fetch pages, wait for DOM elements (like speed results), and extract data.
- Rate Limiting: Includes randomized delays to prevent detection as a bot/DDoS attack.
Randomized delays are used to avoid bot or DDoS detection
This tool is intended for educational and research purposes to demonstrate traffic obfuscation techniques. Use responsibly and in compliance with your local laws and network usage policies.