Subscribe to us on Telegram to receive notifications about new versions and updates.
Create your own HTTP and/or HTTPS (HTTP over TLS) proxy server with one click. Use this proxy to enhance the security of your internet connections or to bypass restrictions.
Available on Linux x86_64 and (temporarily unavailable in installer).aarch64
Just log into your server/VPS terminal and run the command:
curl -fsSL https://proxerver-cli.pages.dev | bashAfter installation, be sure to run this command to make proxerver available in the current terminal session:
export PATH=$PATH:~/.proxerver-cli/binTo update proxerver to the latest version, use the same command that was used for installation.
- Easy to set up and use.
- Support for HTTP and HTTPS (HTTP over TLS).
- List of allowed hosts that can be proxied. Use wildcard matching.
- Using multiple credentials for authentication.
- Authentication via tokens supported by the Proxer CLI client. It is recommended for use as it helps protect your proxies from proxy server detection through active probing.
proxerver-cli --help
User Friendly HTTP and HTTPS (HTTP over TLS) proxy server.
Usage: proxerver-cli [OPTIONS]
Options:
--config <PATH> Path to the configuration file. Default: '~/.proxerver-cli/config.toml'
-h, --help Print help
-V, --version Print version
A configuration file is used to store the proxy server settings. The default configuration file is located at ~/.proxerver-cli/config.toml. You can specify a different path using the --config option.
To change the default configuration file, use the following command:
nano ~/.proxerver-cli/config.toml# HTTP server configuration
[http]
enabled = true
port = 8080
allowed_hosts = []
[http.auth]
credentials = []
tokens = []
# HTTPS server configuration
[https]
enabled = false
port = 443
allowed_hosts = []
[https.auth]
credentials = []
tokens = []
[https.tls]
cert = ""
key = ""The configuration file is in TOML format and contains the following sections:
http: HTTP server configurationhttps: HTTPS server configuration
enabled: Enables or disables the HTTP server. Default:trueport: The port to listen on. Default:8080allowed_hosts: A list of allowed hosts. Default:[]auth: Authentication configurationcredentials: A list of allowed credentials. Default:[]tokens: A list of allowed tokens. Default:[]
enabled: Enables or disables the HTTPS server. Default:falseport: The port to listen on. Default:443allowed_hostsandauth: Same as HTTP server configurationtls: TLS configurationcert: Path to the certificate file. Default:""key: Path to the private key file. Default:""
See example configuration files in the config.example.toml file for more details.
To quickly start the HTTP proxy server on port 8080, use the following command:
proxerver-cliCreate configuration files with the parameters you need and start the proxy server using the command:
proxerver-cli --config custom.tomlTo run the proxy server in the background, use nohup, for example:
nohup proxerver-cli [OPTIONS] >/dev/null 2>&1 &Running the proxy server in the background using nohup and saving the output to a file:
nohup proxerver-cli [OPTIONS] > ~/.proxerver-cli/log.txt 2>&1 &Remove the background process proxerver-cli:
pkill proxerver-cliInstall certbot, test automatic renewal, and check for a timer for automatic certificate updates.
apt-get install certbot -y
certbot certonly --standalone --agree-tos --register-unsafely-without-email -d yourdomain.com
certbot renew --dry-run
systemctl list-timers | grep certbotyourdomain.com - Your domain pointing to the server's IP
- Use
*to replace any number of characters. For example,*.example.comwill match all subdomains ofexample.com. - Use
?to replace a single character. For example,*.example?.comwill match*.example1.com,*.exampleA.com, but not*.example.com. - You can combine
*and?for more complex patterns. For example,*example?.comwill matchexample1.com,myexampleA.com, but notexample.com. - Be cautious when using wildcard matching, as it can lead to unwanted access if not configured properly.
- Check allowed hosts for duplicates to avoid conflicts in rules.
- Automatic creation and renewal of Let's Encrypt certificates for custom domains and IP.
- Daemonization of the process to run the program in the background.
