Trojan VPN is an unidentifiable mechanism that helps you bypass GFW. The Trojan has multiple protocols over TLS to avoid both active/passive detection and ISP QoS limitations. Trojan VPN imitating the most common services and behave identically

Trojan-Go supports multiplexing to improve concurrency performance; uses routing modules to achieve domestic and foreign traffic distribution; supports CDN traffic transfer (based on WebSocket over TLS); supports the use of AEAD for secondary encryption of Trojan traffic (based on Shadowsocks AEAD); supports pluggable The unplugged transport layer plugin allows to replace TLS and use other encrypted tunnels to transmit Trojan protocol traffic.

Choose Servers

Create Your Trojan VPN Account

Trojan VPN
TrojanVPN MD 01
  • Host: md1.trojanvpn.xyz
  • Location: Moldova
  • Protocol: Websocket
  • Port: 80, 8080, 8880, 2052, 2082, 2086, 2095
  • Port TLS: 443, 2053, 2083, 2087, 2096, 8443
  • Valid: 7 days

Offline0ms
last checked: 1 seconds ago

Acc Remaining: 25 accounts

CREATE

What is Trojan GFW VPN?

An unidentifiable mechanism that helps you bypass GFW.

Trojan features multiple protocols over TLS to avoid both active/passive detections and ISP QoS limitations.

Trojan is not a fixed program or protocol. It's an idea, an idea that imitating the most common service, to an extent that it behaves identically, could help you get across the Great FireWall permanently, without being identified ever. We are the GreatER Fire; we ship Trojan Horses.

Overview

On penetrating GFW, people assume that strong encryption and random obfuscation may cheat GFW’s filtration mechanism. However, trojan implements the direct opposite: it imitates the most common protocol across the wall, HTTPS, to trick GFW into thinking that it is HTTPS.

What is Trojan Go VPN?

Trojan-Go is a complete Trojan agent implemented in Go language, compatible with the Trojan protocol and the original configuration file format. It supports and is compatible with most functions of the Trojan-GFW version, and has expanded more practical functions. The primary goal of Trojan-Go is to ensure transmission security and concealment. Under this premise, the transmission performance and ease of use should be improved as much as possible. A complete Trojan proxy implemented using Go, compatible with the original Trojan protocol and configuration file format. Safe, efficient, lightweight and easy to use. Trojan-Go supports multiplexing to improve concurrency performance. uses routing modules to achieve domestic and foreign traffic distribution. supports CDN traffic transfer (based on WebSocket over TLS). supports the use of AEAD for secondary encryption of Trojan traffic (based on Shadowsocks AEAD). supports pluggable The unplugged transport layer plug-in allows to replace TLS and use other encrypted tunnels to transmit Trojan protocol traffic. The pre-compiled binary executable file can be downloaded on the Release page. It can be run directly after decompression, no other components depend on it.

Protocol
  • Trojan TLS
  • Trojan Websocket TLS
  • Trojan gRPC TLS
  • Trojan TLS Shadowrocket
  • Trojan TLS QV2ray
Features
  • TLS tunneling.
  • UDP proxy.
  • Transparent proxy based on TProxy (TCP / UDP)
  • Countermeasures against GFW passive detection/active detection mechanism.
  • Socks5 / HTTP proxy automatic adaptation.
  • Websocket transmission support to realize CDN traffic transfer (based on WebSocket over TLS) and counter GFW man-in-the-middle attacks.