diff --git a/123/1 b/123/1
new file mode 100644
index 0000000..2e777da
--- /dev/null
+++ b/123/1
@@ -0,0 +1,45 @@
+{
+"outbounds": [
+{
+"tag":"IP4-out",
+"protocol": "freedom",
+"settings": {
+}
+},
+{
+"tag":"IP6-out",
+"protocol": "freedom",
+"settings": {
+"domainStrategy": "UseIPv6"
+}
+},
+{
+"protocol":"blackhole",
+"tag":"blackhole-out"
+}
+]
+}
+
+
+{
+"outbounds": [
+{
+"tag":"IP4-out",
+"protocol": "freedom",
+"settings": {
+}
+},
+{
+"tag":"IP6-out",
+"protocol": "freedom",
+"settings": {
+"domainStrategy": "UseIPv6"
+}
+},
+{
+ "protocol": "freedom",
+ "settings": {},
+ "tag": "direct"
+ }
+]
+}
diff --git a/123/101112 b/123/101112
new file mode 100644
index 0000000..3ffc89d
--- /dev/null
+++ b/123/101112
@@ -0,0 +1,47 @@
+"outbounds": [
+{
+"tag":"IP4-out",
+"protocol": "freedom",
+"settings": {}
+},
+{
+"tag":"IP6-out",
+"protocol": "freedom",
+"settings": {
+"domainStrategy": "UseIPv6"
+}
+},
+{
+"tag": "socks5-warp",
+"protocol": "socks",
+"settings": {
+"servers": [
+{
+"address": "127.0.0.1",
+"port": 40000
+}
+]
+}
+}
+],
+"routing": {
+"domainStrategy": "AsIs",
+"rules": [
+{
+"type": "field",
+"outboundTag": "IP6-out",
+"domain": [""] // 必填!自定义域名走IPv6,例:["geosite:netflix","geosite:*****"]或["netflix.com","****.**"]
+},
+{
+"type": "field",
+"outboundTag": "socks5-warp",
+"domain": [""] // 必填!自定义域名走socks5-warp,,例:["geosite:netflix","geosite:*****"]或["netflix.com","****.**"]
+},
+{
+"type": "field",
+"outboundTag": "IP4-out",
+"network": "udp,tcp"
+}
+]
+}
+}
diff --git a/123/121314 b/123/121314
new file mode 100644
index 0000000..7c87b0c
--- /dev/null
+++ b/123/121314
@@ -0,0 +1,47 @@
+"outbounds": [
+{
+"tag":"IP4-out",
+"protocol": "freedom",
+"settings": {}
+},
+{
+"tag":"IP6-out",
+"protocol": "freedom",
+"settings": {
+"domainStrategy": "UseIPv6"
+}
+},
+{
+"tag": "warp",
+"protocol": "socks",
+"settings": {
+"servers": [
+{
+"address": "127.0.0.1",
+"port": 40000
+}
+]
+}
+}
+],
+"routing": {
+"domainStrategy": "AsIs",
+"rules": [
+{
+"type": "field",
+"outboundTag": "IP6-out",
+"domain": [""]
+},
+{
+"type": "field",
+"outboundTag": "warp",
+"domain": [""]
+},
+{
+"type": "field",
+"outboundTag": "IP4-out",
+"network": "udp,tcp"
+}
+]
+}
+}
diff --git a/123/123 b/123/123
new file mode 100644
index 0000000..7c87b0c
--- /dev/null
+++ b/123/123
@@ -0,0 +1,47 @@
+"outbounds": [
+{
+"tag":"IP4-out",
+"protocol": "freedom",
+"settings": {}
+},
+{
+"tag":"IP6-out",
+"protocol": "freedom",
+"settings": {
+"domainStrategy": "UseIPv6"
+}
+},
+{
+"tag": "warp",
+"protocol": "socks",
+"settings": {
+"servers": [
+{
+"address": "127.0.0.1",
+"port": 40000
+}
+]
+}
+}
+],
+"routing": {
+"domainStrategy": "AsIs",
+"rules": [
+{
+"type": "field",
+"outboundTag": "IP6-out",
+"domain": [""]
+},
+{
+"type": "field",
+"outboundTag": "warp",
+"domain": [""]
+},
+{
+"type": "field",
+"outboundTag": "IP4-out",
+"network": "udp,tcp"
+}
+]
+}
+}
diff --git a/123/131415 b/123/131415
new file mode 100644
index 0000000..7c87b0c
--- /dev/null
+++ b/123/131415
@@ -0,0 +1,47 @@
+"outbounds": [
+{
+"tag":"IP4-out",
+"protocol": "freedom",
+"settings": {}
+},
+{
+"tag":"IP6-out",
+"protocol": "freedom",
+"settings": {
+"domainStrategy": "UseIPv6"
+}
+},
+{
+"tag": "warp",
+"protocol": "socks",
+"settings": {
+"servers": [
+{
+"address": "127.0.0.1",
+"port": 40000
+}
+]
+}
+}
+],
+"routing": {
+"domainStrategy": "AsIs",
+"rules": [
+{
+"type": "field",
+"outboundTag": "IP6-out",
+"domain": [""]
+},
+{
+"type": "field",
+"outboundTag": "warp",
+"domain": [""]
+},
+{
+"type": "field",
+"outboundTag": "IP4-out",
+"network": "udp,tcp"
+}
+]
+}
+}
diff --git a/123/456 b/123/456
new file mode 100644
index 0000000..7c87b0c
--- /dev/null
+++ b/123/456
@@ -0,0 +1,47 @@
+"outbounds": [
+{
+"tag":"IP4-out",
+"protocol": "freedom",
+"settings": {}
+},
+{
+"tag":"IP6-out",
+"protocol": "freedom",
+"settings": {
+"domainStrategy": "UseIPv6"
+}
+},
+{
+"tag": "warp",
+"protocol": "socks",
+"settings": {
+"servers": [
+{
+"address": "127.0.0.1",
+"port": 40000
+}
+]
+}
+}
+],
+"routing": {
+"domainStrategy": "AsIs",
+"rules": [
+{
+"type": "field",
+"outboundTag": "IP6-out",
+"domain": [""]
+},
+{
+"type": "field",
+"outboundTag": "warp",
+"domain": [""]
+},
+{
+"type": "field",
+"outboundTag": "IP4-out",
+"network": "udp,tcp"
+}
+]
+}
+}
diff --git a/123/5556 b/123/5556
new file mode 100644
index 0000000..d2c5943
--- /dev/null
+++ b/123/5556
@@ -0,0 +1,31 @@
+{
+"outbounds": [
+{
+"tag":"IP4-out",
+"protocol": "freedom",
+"settings": {}
+},
+{
+"tag":"IP6-out",
+"protocol": "freedom",
+"settings": {
+"domainStrategy": "UseIPv6"
+}
+}
+],
+"routing": {
+"rules": [
+{
+"type": "field",
+"outboundTag": "IP6-out",
+"domain": [""]
+},
+{
+"type": "field",
+"outboundTag": "IP4-out",
+"network": "udp,tcp"
+}
+]
+}
+}
+
diff --git a/123/789 b/123/789
new file mode 100644
index 0000000..7c87b0c
--- /dev/null
+++ b/123/789
@@ -0,0 +1,47 @@
+"outbounds": [
+{
+"tag":"IP4-out",
+"protocol": "freedom",
+"settings": {}
+},
+{
+"tag":"IP6-out",
+"protocol": "freedom",
+"settings": {
+"domainStrategy": "UseIPv6"
+}
+},
+{
+"tag": "warp",
+"protocol": "socks",
+"settings": {
+"servers": [
+{
+"address": "127.0.0.1",
+"port": 40000
+}
+]
+}
+}
+],
+"routing": {
+"domainStrategy": "AsIs",
+"rules": [
+{
+"type": "field",
+"outboundTag": "IP6-out",
+"domain": [""]
+},
+{
+"type": "field",
+"outboundTag": "warp",
+"domain": [""]
+},
+{
+"type": "field",
+"outboundTag": "IP4-out",
+"network": "udp,tcp"
+}
+]
+}
+}
diff --git a/123/XXXYAN2Z+V4W6 b/123/XXXYAN2Z+V4W6
new file mode 100644
index 0000000..254a328
--- /dev/null
+++ b/123/XXXYAN2Z+V4W6
@@ -0,0 +1,98 @@
+{
+ "api": {
+ "services": [
+ "HandlerService",
+ "LoggerService",
+ "StatsService"
+ ],
+ "tag": "api"
+ },
+ "inbounds": [
+ {
+ "listen": "127.0.0.1",
+ "port": 62789,
+ "protocol": "dokodemo-door",
+ "settings": {
+ "address": "127.0.0.1"
+ },
+ "tag": "api",
+ "sniffing": {
+ "enabled": true,
+ "destOverride": ["http", "tls"]
+ }
+ }
+ ],
+ "outbounds": [
+{
+"tag":"IP4-out",
+"protocol": "freedom",
+"settings": {}
+},
+{
+"tag":"IP6-out",
+"protocol": "freedom",
+"settings": {
+"domainStrategy": "UseIPv6"
+}
+},
+{
+"tag": "socks5-warp",
+"protocol": "socks",
+"settings": {
+"servers": [
+{
+"address": "127.0.0.1",
+"port": 40000
+}
+]
+}
+}
+],
+ "policy": {
+ "system": {
+ "statsInboundDownlink": true,
+ "statsInboundUplink": true
+ }
+ },
+ "routing": {
+ "rules": [
+{
+"type": "field",
+"outboundTag": "IP6-out",
+"domain": ["ip.gs"]
+},
+{
+"type": "field",
+"outboundTag": "socks5-warp",
+"domain": ["google.com"]
+},
+{
+"type": "field",
+"outboundTag": "IP4-out",
+"network": "udp,tcp"
+},
+ {
+ "inboundTag": [
+ "api"
+ ],
+ "outboundTag": "api",
+ "type": "field"
+ },
+ {
+ "ip": [
+ "geoip:private"
+ ],
+ "outboundTag": "blocked",
+ "type": "field"
+ },
+ {
+ "outboundTag": "blocked",
+ "protocol": [
+ "bittorrent"
+ ],
+ "type": "field"
+ }
+ ]
+ },
+ "stats": {}
+}
diff --git a/123/xxxYAN2Z+V6W4 b/123/xxxYAN2Z+V6W4
new file mode 100644
index 0000000..8bca40b
--- /dev/null
+++ b/123/xxxYAN2Z+V6W4
@@ -0,0 +1,81 @@
+{
+ "api": {
+ "services": [
+ "HandlerService",
+ "LoggerService",
+ "StatsService"
+ ],
+ "tag": "api"
+ },
+ "inbounds": [
+ {
+ "listen": "127.0.0.1",
+ "port": 62789,
+ "protocol": "dokodemo-door",
+ "settings": {
+ "address": "127.0.0.1"
+ },
+ "tag": "api",
+ "sniffing": {
+ "enabled": true,
+ "destOverride": ["http", "tls"]
+ }
+ }
+ ],
+ "outbounds": [
+{
+"tag":"IP6-out",
+"protocol": "freedom",
+"settings": {}
+},
+{
+"tag":"IP6-out",
+"protocol": "freedom",
+"settings": {
+"domainStrategy": "UseIPv4"
+}
+}
+],
+ "policy": {
+ "system": {
+ "statsInboundDownlink": true,
+ "statsInboundUplink": true
+ }
+ },
+ "routing": {
+ "rules": [
+{
+"type": "field",
+"outboundTag": "IP6-out",
+"domain": ["ip.gs"]
+},
+{
+"type": "field",
+"outboundTag": "IP4-out",
+"network": "udp,tcp"
+},
+ {
+ "inboundTag": [
+ "api"
+ ],
+ "outboundTag": "api",
+ "type": "field"
+ },
+ {
+ "ip": [
+ "geoip:private"
+ ],
+ "outboundTag": "blocked",
+ "type": "field"
+ },
+ {
+ "outboundTag": "blocked",
+ "protocol": [
+ "bittorrent"
+ ],
+ "type": "field"
+ }
+ ]
+ },
+ "stats": {}
+}
diff --git a/123/xxxYAN2ZS b/123/xxxYAN2ZS
new file mode 100644
index 0000000..096e409
--- /dev/null
+++ b/123/xxxYAN2ZS
@@ -0,0 +1,98 @@
+{
+ "api": {
+ "services": [
+ "HandlerService",
+ "LoggerService",
+ "StatsService"
+ ],
+ "tag": "api"
+ },
+ "inbounds": [
+ {
+ "listen": "127.0.0.1",
+ "port": 62789,
+ "protocol": "dokodemo-door",
+ "settings": {
+ "address": "127.0.0.1"
+ },
+ "tag": "api",
+ "sniffing": {
+ "enabled": true,
+ "destOverride": ["http", "tls"]
+ }
+ }
+ ],
+ "outbounds": [
+{
+"tag":"IP6-out",
+"protocol": "freedom",
+"settings": {}
+},
+{
+"tag":"IP6-out",
+"protocol": "freedom",
+"settings": {
+"domainStrategy": "UseIPv4"
+}
+},
+{
+"tag": "socks5-warp",
+"protocol": "socks",
+"settings": {
+"servers": [
+{
+"address": "127.0.0.1",
+"port": 40000
+}
+]
+}
+}
+],
+ "policy": {
+ "system": {
+ "statsInboundDownlink": true,
+ "statsInboundUplink": true
+ }
+ },
+ "routing": {
+ "rules": [
+{
+"type": "field",
+"outboundTag": "IP6-out",
+"domain": ["ip.gs"]
+},
+{
+"type": "field",
+"outboundTag": "socks5-warp",
+"domain": ["google.com"]
+},
+{
+"type": "field",
+"outboundTag": "IP4-out",
+"network": "udp,tcp"
+},
+ {
+ "inboundTag": [
+ "api"
+ ],
+ "outboundTag": "api",
+ "type": "field"
+ },
+ {
+ "ip": [
+ "geoip:private"
+ ],
+ "outboundTag": "blocked",
+ "type": "field"
+ },
+ {
+ "outboundTag": "blocked",
+ "protocol": [
+ "bittorrent"
+ ],
+ "type": "field"
+ }
+ ]
+ },
+ "stats": {}
+}
diff --git a/123/xxxYAN4+S b/123/xxxYAN4+S
new file mode 100644
index 0000000..5a5509c
--- /dev/null
+++ b/123/xxxYAN4+S
@@ -0,0 +1,85 @@
+{
+ "api": {
+ "services": [
+ "HandlerService",
+ "LoggerService",
+ "StatsService"
+ ],
+ "tag": "api"
+ },
+ "inbounds": [
+ {
+ "listen": "127.0.0.1",
+ "port": 62789,
+ "protocol": "dokodemo-door",
+ "settings": {
+ "address": "127.0.0.1"
+ },
+ "tag": "api",
+ "sniffing": {
+ "enabled": true,
+ "destOverride": ["http", "tls"]
+ }
+ }
+ ],
+ "outbounds": [
+ {
+ "tag": "default",
+ "protocol": "freedom"
+ },
+ {
+ "tag":"socks5_out",
+ "protocol": "socks",
+ "settings": {
+ "servers": [
+ {
+ "address": "127.0.0.1",
+ "port": 40000
+ }
+ ]
+ }
+ }
+ ],
+ "policy": {
+ "system": {
+ "statsInboundDownlink": true,
+ "statsInboundUplink": true
+ }
+ },
+ "routing": {
+ "rules": [
+ {
+ "type": "field",
+ "outboundTag": "socks5_out",
+ "domain": ["geosite:netflix"]
+ },
+ {
+ "type": "field",
+ "outboundTag": "default",
+ "network": "udp,tcp"
+ },
+ {
+ "inboundTag": [
+ "api"
+ ],
+ "outboundTag": "api",
+ "type": "field"
+ },
+ {
+ "ip": [
+ "geoip:private"
+ ],
+ "outboundTag": "blocked",
+ "type": "field"
+ },
+ {
+ "outboundTag": "blocked",
+ "protocol": [
+ "bittorrent"
+ ],
+ "type": "field"
+ }
+ ]
+ },
+ "stats": {}
+}
diff --git a/CFwarp.sh b/CFwarp.sh
new file mode 100644
index 0000000..6e5879e
--- /dev/null
+++ b/CFwarp.sh
@@ -0,0 +1,975 @@
+#!/bin/bash
+export PATH=/bin:/sbin:/usr/bin:/usr/sbin:/usr/local/bin:/usr/local/sbin:~/bin
+export LANG=en_US.UTF-8
+red='\033[0;31m'
+bblue='\033[0;34m'
+plain='\033[0m'
+red(){ echo -e "\033[31m\033[01m$1\033[0m";}
+green(){ echo -e "\033[32m\033[01m$1\033[0m";}
+yellow(){ echo -e "\033[33m\033[01m$1\033[0m";}
+blue(){ echo -e "\033[36m\033[01m$1\033[0m";}
+white(){ echo -e "\033[37m\033[01m$1\033[0m";}
+bblue(){ echo -e "\033[34m\033[01m$1\033[0m";}
+rred(){ echo -e "\033[35m\033[01m$1\033[0m";}
+readtp(){ read -t5 -n26 -p "$(yellow "$1")" $2;}
+readp(){ read -p "$(yellow "$1")" $2;}
+[[ $EUID -ne 0 ]] && yellow "请以root模式运行脚本" && exit 1
+
+start(){
+yellow " 请稍等3秒……正在扫描vps类型及参数中……"
+if [[ -f /etc/redhat-release ]]; then
+release="Centos"
+elif cat /etc/issue | grep -q -E -i "debian"; then
+release="Debian"
+elif cat /etc/issue | grep -q -E -i "ubuntu"; then
+release="Ubuntu"
+elif cat /etc/issue | grep -q -E -i "centos|red hat|redhat"; then
+release="Centos"
+elif cat /proc/version | grep -q -E -i "debian"; then
+release="Debian"
+elif cat /proc/version | grep -q -E -i "ubuntu"; then
+release="Ubuntu"
+elif cat /proc/version | grep -q -E -i "centos|red hat|redhat"; then
+release="Centos"
+else
+red "不支持你当前系统,请选择使用Ubuntu,Debian,Centos系统。" && rm -f CFwarp.sh && exit 1
+fi
+vsid=`grep -i version_id /etc/os-release | cut -d \" -f2 | cut -d . -f1`
+sys(){
+[ -f /etc/os-release ] && grep -i pretty_name /etc/os-release | cut -d \" -f2 && return
+[ -f /etc/lsb-release ] && grep -i description /etc/lsb-release | cut -d \" -f2 && return
+[ -f /etc/redhat-release ] && awk '{print $0}' /etc/redhat-release && return;}
+op=`sys`
+version=`uname -r | awk -F "-" '{print $1}'`
+main=`uname -r | awk -F . '{print $1}'`
+minor=`uname -r | awk -F . '{print $2}'`
+bit=`uname -m`
+[[ $bit = x86_64 ]] && cpu=AMD64
+[[ $bit = aarch64 ]] && cpu=ARM64
+vi=`systemd-detect-virt`
+if [[ -n $(sysctl net.ipv4.tcp_congestion_control 2>/dev/null | awk -F ' ' '{print $3}') ]]; then
+bbr=`sysctl net.ipv4.tcp_congestion_control | awk -F ' ' '{print $3}'`
+elif [[ -n $(ping 10.0.0.2 -c 2 | grep ttl) ]]; then
+bbr="openvz版bbr-plus"
+else
+bbr="暂不支持显示"
+fi
+if [[ $vi = openvz ]]; then
+TUN=$(cat /dev/net/tun 2>&1)
+if [[ ! $TUN =~ 'in bad state' ]] && [[ ! $TUN =~ '处于错误状态' ]] && [[ ! $TUN =~ 'Die Dateizugriffsnummer ist in schlechter Verfassung' ]]; then
+red "检测到未开启TUN,现尝试添加TUN支持" && sleep 4
+cd /dev
+mkdir net
+mknod net/tun c 10 200
+chmod 0666 net/tun
+TUN=$(cat /dev/net/tun 2>&1)
+if [[ ! $TUN =~ 'in bad state' ]] && [[ ! $TUN =~ '处于错误状态' ]] && [[ ! $TUN =~ 'Die Dateizugriffsnummer ist in schlechter Verfassung' ]]; then
+green "添加TUN支持失败,建议与VPS厂商沟通或后台设置开启" && exit 0
+else
+green "恭喜,添加TUN支持成功,现添加防止重启VPS后TUN失效的TUN守护功能" && sleep 4
+cat>/root/tun.sh<<-\EOF
+#!/bin/bash
+cd /dev
+mkdir net
+mknod net/tun c 10 200
+chmod 0666 net/tun
+EOF
+chmod +x /root/tun.sh
+grep -qE "^ *@reboot root bash /root/tun.sh >/dev/null 2>&1" /etc/crontab || echo "@reboot root bash /root/tun.sh >/dev/null 2>&1" >> /etc/crontab
+green "TUN守护功能已启动"
+fi
+fi
+fi
+[[ $(type -P yum) ]] && yumapt='yum -y' || yumapt='apt -y'
+[[ $(type -P wget) ]] || (yellow "检测到wget未安装,升级安装中" && $yumapt update;$yumapt install wget)
+[[ $(type -P curl) ]] || (yellow "检测到curl未安装,升级安装中" && $yumapt update;$yumapt install curl)
+[[ ! $(type -P python3) ]] && (yellow "检测到python3未安装,升级安装中" && $yumapt update;$yumapt install python3)
+[[ ! $(type -P screen) ]] && (yellow "检测到screen未安装,升级安装中" && $yumapt update;$yumapt install screen)
+
+ud4='sed -i "5 s/^/PostUp = ip -4 rule add from $(ip route get 162.159.192.1 | grep -oP '"'src \K\S+') lookup main\n/"'" /etc/wireguard/wgcf.conf && sed -i "6 s/^/PostDown = ip -4 rule delete from $(ip route get 162.159.192.1 | grep -oP '"'src \K\S+') lookup main\n/"'" /etc/wireguard/wgcf.conf'
+ud6='sed -i "7 s/^/PostUp = ip -6 rule add from $(ip route get 2606:4700:d0::a29f:c001 | grep -oP '"'src \K\S+') lookup main\n/"'" /etc/wireguard/wgcf.conf && sed -i "8 s/^/PostDown = ip -6 rule delete from $(ip route get 2606:4700:d0::a29f:c001 | grep -oP '"'src \K\S+') lookup main\n/"'" /etc/wireguard/wgcf.conf'
+ud4ud6='sed -i "5 s/^/PostUp = ip -4 rule add from $(ip route get 162.159.192.1 | grep -oP '"'src \K\S+') lookup main\n/"'" /etc/wireguard/wgcf.conf && sed -i "6 s/^/PostDown = ip -4 rule delete from $(ip route get 162.159.192.1 | grep -oP '"'src \K\S+') lookup main\n/"'" /etc/wireguard/wgcf.conf && sed -i "7 s/^/PostUp = ip -6 rule add from $(ip route get 2606:4700:d0::a29f:c001 | grep -oP '"'src \K\S+') lookup main\n/"'" /etc/wireguard/wgcf.conf && sed -i "8 s/^/PostDown = ip -6 rule delete from $(ip route get 2606:4700:d0::a29f:c001 | grep -oP '"'src \K\S+') lookup main\n/"'" /etc/wireguard/wgcf.conf'
+c1="sed -i '/0\.0\.0\.0\/0/d' /etc/wireguard/wgcf.conf"
+c2="sed -i '/\:\:\/0/d' /etc/wireguard/wgcf.conf"
+c3="sed -i 's/engage.cloudflareclient.com/162.159.193.10/g' /etc/wireguard/wgcf.conf"
+c4="sed -i 's/engage.cloudflareclient.com/2606:4700:d0::a29f:c001/g' /etc/wireguard/wgcf.conf"
+c5="sed -i 's/1.1.1.1/8.8.8.8,2001:4860:4860::8888/g' /etc/wireguard/wgcf.conf"
+c6="sed -i 's/1.1.1.1/2001:4860:4860::8888,8.8.8.8/g' /etc/wireguard/wgcf.conf"
+}
+
+ShowWGCF(){
+UA_Browser="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.87 Safari/537.36"
+v6=$(curl -s6m6 https://ip.gs -k)
+v4=$(curl -s4m6 https://ip.gs -k)
+isp4=`curl -s --user-agent "${UA_Browser}" https://api.ip.sb/geoip/$v4 -k | awk -F "isp" '{print $2}' | awk -F "offset" '{print $1}' | sed "s/[,\":]//g"`
+isp6=`curl -s --user-agent "${UA_Browser}" https://api.ip.sb/geoip/$v6 -k | awk -F "isp" '{print $2}' | awk -F "offset" '{print $1}' | sed "s/[,\":]//g"`
+[[ -e /etc/wireguard/wgcf+p.log ]] && cfplus="WARP+普通账户(有限WARP+流量),设备名称:$(grep -s 'Device name' /etc/wireguard/wgcf+p.log | awk '{ print $NF }')" || cfplus="WARP+Teams账户(无限WARP+流量)"
+AE="阿联酋(United Arab Emirates)";AU="澳大利亚(Australia)";BG="保加利亚(Bulgaria)";BR="巴西(Brazil)";CA="加拿大(Canada)";CH="瑞士(Switzerland)";CL="智利(Chile)";CN="中国(China)";CO="哥伦比亚(Colombia)";DE="德国(Germany)";ES="西班牙(Spain)";FI="芬兰(Finland)";FR="法国(France)";GB="英国(United Kingdom)";HK="香港(Hong Kong)";ID="印度尼西亚(Indonesia)";IE="爱尔兰(Ireland)";IL="以色列(Israel)";IN="印度(India)";IT="意大利(Italy)";JP="日本(Japan)";KR="韩国(South Korea)";LU="卢森堡(Luxembourg)";MX="墨西哥(Mexico)";MY="马来西亚(Malaysia)";NL="荷兰(Netherlands)";NZ="新西兰(New Zealand)";PH="菲律宾(Philippines)";RO="罗马尼亚(Romania)";RU="俄罗斯(Russian)";SA="沙特(Saudi Arabia)";SE="瑞典(Sweden)";SG="新加坡(Singapore)";TW="台湾(Taiwan)";US="美国(United States)";VN="越南(Vietnam)";ZA="南非(South Africa)"
+if [[ -n $v4 ]]; then
+result4=$(curl -4 --user-agent "${UA_Browser}" -fsL --write-out %{http_code} --output /dev/null --max-time 10 "https://www.netflix.com/title/81215567" 2>&1)
+[[ "$result4" == "404" ]] && NF="遗憾哦,当前IP仅解锁奈飞Netflix自制剧..."
+[[ "$result4" == "403" ]] && NF="死心了,当前IP不支持解锁奈飞Netflix....."
+[[ "$result4" == "000" ]] && NF="检测到网络有问题,再次进入脚本可能就好了.."
+[[ "$result4" == "200" ]] && NF="恭喜呀,当前IP可解锁奈飞Netflix流媒体..."
+g4=$(eval echo \$$(curl -s --user-agent "${UA_Browser}" https://api.ip.sb/geoip/$v4 -k | awk -F "country_code" '{print $2}' | awk -F "region_code" '{print $1}' | sed "s/[,\":}]//g"))
+wgcfv4=$(curl -s4 https://www.cloudflare.com/cdn-cgi/trace -k | grep warp | cut -d= -f2)
+case ${wgcfv4} in
+plus)
+WARPIPv4Status=$(white "IPV4 WARP+状态:\c" ; rred "运行中,$cfplus" ; white " [ Cloudflare服务商 ]获取IPV4:\c" ; rred "$v4" ; white " IPV4 奈飞NF解锁情况:\c" ; rred "$NF \c"; white " IPV4 所在地区:\c" ; rred "$g4");;
+on)
+WARPIPv4Status=$(white "IPV4 WARP状态:\c" ; green "运行中,WARP普通账户(无限WARP流量)" ; white " [ Cloudflare服务商 ]获取IPV4:\c" ; green "$v4" ; white " IPV4 奈飞NF解锁情况:\c" ; green "$NF \c"; white " IPV4 所在地区:\c" ; green "$g4");;
+off)
+WARPIPv4Status=$(white "IPV4 WARP状态:\c" ; yellow "关闭中" ; white " [ $isp4服务商 ]获取IPV4:\c" ; yellow "$v4" ; white " IPV4 奈飞NF解锁情况:\c" ; yellow "$NF \c"; white " IPV4 所在地区:\c" ; yellow "$g4");;
+esac
+else
+WARPIPv4Status=$(white "IPV4 状态:\c" ; red "不存在IPV4地址 ")
+fi
+if [[ -n $v6 ]]; then
+result6=$(curl -6 --user-agent "${UA_Browser}" -fsL --write-out %{http_code} --output /dev/null --max-time 10 "https://www.netflix.com/title/81215567" 2>&1)
+[[ "$result6" == "404" ]] && NF="遗憾哦,当前IP仅解锁奈飞Netflix自制剧..."
+[[ "$result6" == "403" ]] && NF="死心了,当前IP不支持解锁奈飞Netflix....."
+[[ "$result6" == "000" ]] && NF="检测到网络有问题,再次进入脚本可能就好了.."
+[[ "$result6" == "200" ]] && NF="恭喜呀,当前IP可解锁奈飞Netflix流媒体..."
+g6=$(eval echo \$$(curl -s --user-agent "${UA_Browser}" https://api.ip.sb/geoip/$v6 -k | awk -F "country_code" '{print $2}' | awk -F "region_code" '{print $1}' | sed "s/[,\":}]//g"))
+wgcfv6=$(curl -s6 https://www.cloudflare.com/cdn-cgi/trace -k | grep warp | cut -d= -f2)
+case ${wgcfv6} in
+plus)
+WARPIPv6Status=$(white "IPV6 WARP+状态:\c" ; rred "运行中,$cfplus" ; white " [ Cloudflare服务商 ]获取IPV6:\c" ; rred "$v6" ; white " IPV6 奈飞NF解锁情况:\c" ; rred "$NF \c"; white " IPV6 所在地区:\c" ; rred "$g6");;
+on)
+WARPIPv6Status=$(white "IPV6 WARP状态:\c" ; green "运行中,WARP普通账户(无限WARP流量)" ; white " [ Cloudflare服务商 ]获取IPV6:\c" ; green "$v6" ; white " IPV6 奈飞NF解锁情况:\c" ; green "$NF \c"; white " IPV6 所在地区:\c" ; green "$g6");;
+off)
+WARPIPv6Status=$(white "IPV6 WARP状态:\c" ; yellow "关闭中" ; white " [ $isp6服务商 ]获取IPV6:\c" ; yellow "$v6" ; white " IPV6 奈飞NF解锁情况:\c" ; yellow "$NF \c"; white " IPV6 所在地区:\c" ; yellow "$g6");;
+esac
+else
+WARPIPv6Status=$(white "IPV6 状态:\c" ; red "不存在IPV6地址 ")
+fi
+}
+
+ShowSOCKS5(){
+if [[ $(systemctl is-active warp-svc) = active ]]; then
+mport=`warp-cli --accept-tos settings 2>/dev/null | grep 'WarpProxy on port' | awk -F "port " '{print $2}'`
+AE="阿联酋(United Arab Emirates)";AU="澳大利亚(Australia)";BG="保加利亚(Bulgaria)";BR="巴西(Brazil)";CA="加拿大(Canada)";CH="瑞士(Switzerland)";CL="智利(Chile)";CN="中国(China)";CO="哥伦比亚(Colombia)";DE="德国(Germany)";ES="西班牙(Spain)";FI="芬兰(Finland)";FR="法国(France)";GB="英国(United Kingdom)";HK="香港(Hong Kong)";ID="印度尼西亚(Indonesia)";IE="爱尔兰(Ireland)";IL="以色列(Israel)";IN="印度(India)";IT="意大利(Italy)";JP="日本(Japan)";KR="韩国(South Korea)";LU="卢森堡(Luxembourg)";MX="墨西哥(Mexico)";MY="马来西亚(Malaysia)";NL="荷兰(Netherlands)";NZ="新西兰(New Zealand)";PH="菲律宾(Philippines)";RO="罗马尼亚(Romania)";RU="俄罗斯(Russian)";SA="沙特(Saudi Arabia)";SE="瑞典(Sweden)";SG="新加坡(Singapore)";TW="台湾(Taiwan)";US="美国(United States)";VN="越南(Vietnam)";ZA="南非(South Africa)"
+result=$(curl -sx socks5h://localhost:$mport -fsL --write-out %{http_code} --output /dev/null --max-time 10 "https://www.netflix.com/title/81215567" 2>&1)
+[[ "$result" == "404" ]] && NF="遗憾哦,当前IP仅解锁奈飞Netflix自制剧..."
+[[ "$result" == "403" ]] && NF="死心了,当前IP不支持解锁奈飞Netflix....."
+[[ "$result" == "000" ]] && NF="检测到网络有问题,再次进入脚本可能就好了.."
+[[ "$result" == "200" ]] && NF="恭喜呀,当前IP可解锁奈飞Netflix流媒体..."
+socks5=$(curl -sx socks5h://localhost:$mport www.cloudflare.com/cdn-cgi/trace -k --connect-timeout 2 | grep warp | cut -d= -f2)
+s5ip=`curl -sx socks5h://localhost:$mport ip.gs -k`
+s5gj=$(eval echo \$$(curl -s -A "Mozilla" https://api.ip.sb/geoip/$S5ip -k | awk -F "country_code" '{print $2}' | awk -F "region_code" '{print $1}' | sed "s/[,\":}]//g"))
+case ${socks5} in
+plus)
+S5Status=$(white "Socks5 WARP+状态:\c" ; rred "运行中,WARP+普通账户(剩余WARP+流量:$((`warp-cli --accept-tos account | grep Quota | awk '{ print $(NF) }'`/1000000000))GiB)" ; white " Socks5 端口:\c" ; rred "$mport" ; white " [ Cloudflare服务商 ]获取IPV4:\c" ; rred "$s5ip" ; white " IPV4 奈飞NF解锁情况:\c" ; rred "$NF \c" ; white " IPV4 所在地区:\c" ; rred "$s5gj");;
+on)
+S5Status=$(white "Socks5 WARP状态:\c" ; green "运行中,WARP普通账户(无限WARP流量)" ; white " Socks5 端口:\c" ; green "$mport" ; white " [ Cloudflare服务商 ]获取IPV4:\c" ; green "$s5ip" ; white " IPV4 奈飞NF解锁情况:\c" ; green "$NF \c"; white " IPV4 所在地区:\c" ; green "$s5gj");;
+*)
+S5Status=$(white "Socks5 WARP状态:\c" ; yellow "已安装Socks5-WARP客户端,但端口处于关闭状态")
+esac
+else
+S5Status=$(white "Socks5 WARP状态:\c" ; red "未安装Socks5-WARP客户端")
+fi
+}
+
+docker(){
+if [[ -n $(ip a | grep docker) ]]; then
+red "检测到VPS已安装docker,如继续安装Wgcf-WARP,docker会失效"
+sleep 3s
+yellow "6秒后继续安装,退出安装请按Ctrl+c"
+sleep 6s
+fi
+}
+
+STOPwgcf(){
+if [[ $(type -P warp-cli) ]]; then
+red "已安装Socks5-WARP(+),不支持当前选择的Wgcf-WARP(+)安装方案"
+systemctl start wg-quick@wgcf >/dev/null 2>&1 ; bash CFwarp.sh
+fi
+}
+v4v6(){
+v6=$(curl -s6m6 https://ip.gs -k)
+v4=$(curl -s4m6 https://ip.gs -k)
+}
+
+ABC(){
+echo $ABC1 | sh
+echo $ABC2 | sh
+echo $ABC3 | sh
+echo $ABC4 | sh
+}
+conf(){
+rm -rf /etc/wireguard/wgcf.conf
+cp -f /etc/wireguard/wgcf-profile.conf /etc/wireguard/wgcf.conf >/dev/null 2>&1
+}
+WGCFv4(){
+yellow "稍等3秒,检测VPS内WARP环境"
+docker && checkwgcf
+if [[ ! $wgcfv4 =~ on|plus && ! $wgcfv6 =~ on|plus ]]; then
+v4v6
+if [[ -n $v4 && -n $v6 ]]; then
+green "当前原生v4+v6双栈vps首次安装Wgcf-WARP\n现添加Wgcf-WARP-IPV4单栈模式" && sleep 2
+ABC1=$ud4 && ABC2=$c2 && ABC3=$c5 && WGCFins
+fi
+if [[ -n $v6 && -z $v4 ]]; then
+green "当前原生v6单栈vps首次安装Wgcf-WARP\n现添加Wgcf-WARP-IPV4单栈模式" && sleep 2
+ABC1=$c2 && ABC2=$c4 && ABC3=$c5 && WGCFins
+fi
+if [[ -z $v6 && -n $v4 ]]; then
+green "当前原生v4单栈vps首次安装Wgcf-WARP\n现添加Wgcf-WARP-IPV4单栈模式" && sleep 2
+STOPwgcf ; ABC1=$ud4 && ABC2=$c2 && ABC3=$c3 && ABC4=$c5 && WGCFins
+fi
+else
+systemctl stop wg-quick@wgcf >/dev/null 2>&1
+v4v6
+if [[ -n $v4 && -n $v6 ]]; then
+green "当前原生v4+v6双栈vps已安装Wgcf-WARP\n现快速切换Wgcf-WARP-IPV4单栈模式" && sleep 2
+conf && ABC1=$ud4 && ABC2=$c2 && ABC3=$c5 && ABC
+fi
+if [[ -n $v6 && -z $v4 ]]; then
+green "当前原生v6单栈vps已安装Wgcf-WARP\n现快速切换Wgcf-WARP-IPV4单栈模式" && sleep 2
+conf && ABC1=$c2 && ABC2=$c4 && ABC3=$c5 && ABC
+fi
+if [[ -z $v6 && -n $v4 ]]; then
+green "当前原生v4单栈vps已安装Wgcf-WARP\n现快速切换Wgcf-WARP-IPV4单栈模式" && sleep 2
+STOPwgcf ; conf && ABC1=$ud4 && ABC2=$c2 && ABC3=$c3 && ABC4=$c5 && ABC
+fi
+CheckWARP
+ShowWGCF && WGCFmenu && back
+fi
+}
+
+WGCFv6(){
+yellow "稍等3秒,检测VPS内WARP环境"
+docker && checkwgcf
+if [[ ! $wgcfv4 =~ on|plus && ! $wgcfv6 =~ on|plus ]]; then
+v4v6
+if [[ -n $v4 && -n $v6 ]]; then
+green "当前原生v4+v6双栈vps首次安装Wgcf-WARP\n现添加Wgcf-WARP-IPV6单栈模式" && sleep 2
+ABC1=$ud6 && ABC2=$c1 && ABC3=$c5 && WGCFins
+fi
+if [[ -n $v6 && -z $v4 ]]; then
+green "当前原生v6单栈vps首次安装Wgcf-WARP\n现添加Wgcf-WARP-IPV6单栈模式(无IPV4!!!)" && sleep 2
+ABC1=$ud6 && ABC2=$c1 && ABC3=$c4 && ABC4=$c6 && WGCFins
+fi
+if [[ -z $v6 && -n $v4 ]]; then
+green "当前原生v4单栈vps首次安装Wgcf-WARP\n现添加Wgcf-WARP-IPV6单栈模式" && sleep 2
+ABC1=$c1 && ABC2=$c3 && ABC3=$c5 && WGCFins
+fi
+else
+systemctl stop wg-quick@wgcf >/dev/null 2>&1
+v4v6
+if [[ -n $v4 && -n $v6 ]]; then
+green "当前原生v4+v6双栈vps已安装Wgcf-WARP\n现快速切换Wgcf-WARP-IPV6单栈模式" && sleep 2
+conf && ABC1=$ud6 && ABC2=$c1 && ABC3=$c5 && ABC
+fi
+if [[ -n $v6 && -z $v4 ]]; then
+green "当前原生v6单栈vps已安装Wgcf-WARP\n现快速切换Wgcf-WARP-IPV6单栈模式(无IPV4!!!)" && sleep 2
+conf && ABC1=$ud6 && ABC2=$c1 && ABC3=$c4 && ABC4=$c6 && ABC
+fi
+if [[ -z $v6 && -n $v4 ]]; then
+green "当前原生v4单栈vps已安装Wgcf-WARP\n现快速切换Wgcf-WARP-IPV6单栈模式" && sleep 2
+conf && ABC1=$c1 && ABC2=$c3 && ABC3=$c5 && ABC
+fi
+CheckWARP
+ShowWGCF && WGCFmenu && back
+fi
+}
+
+WGCFv4v6(){
+yellow "稍等3秒,检测VPS内WARP环境"
+docker && checkwgcf
+if [[ ! $wgcfv4 =~ on|plus && ! $wgcfv6 =~ on|plus ]]; then
+v4v6
+if [[ -n $v4 && -n $v6 ]]; then
+green "当前原生v4+v6双栈vps首次安装Wgcf-WARP\n现添加Wgcf-WARP-IPV4+IPV6双栈模式" && sleep 2
+STOPwgcf ; ABC1=$ud4ud6 && ABC2=$c5 && WGCFins
+fi
+if [[ -n $v6 && -z $v4 ]]; then
+green "当前原生v6单栈vps首次安装Wgcf-WARP\n现添加Wgcf-WARP-IPV4+IPV6双栈模式" && sleep 2
+STOPwgcf ; ABC1=$ud6 && ABC2=$c4 && ABC3=$c5 && WGCFins
+fi
+if [[ -z $v6 && -n $v4 ]]; then
+green "当前原生v4单栈vps首次安装Wgcf-WARP\n现添加Wgcf-WARP-IPV4+IPV6双栈模式" && sleep 2
+STOPwgcf ; ABC1=$ud4 && ABC2=$c3 && ABC3=$c5 && WGCFins
+fi
+else
+systemctl stop wg-quick@wgcf >/dev/null 2>&1
+v4v6
+if [[ -n $v4 && -n $v6 ]]; then
+green "当前原生v4+v6双栈vps已安装Wgcf-WARP\n现快速切换Wgcf-WARP-IPV4+IPV6双栈模式" && sleep 2
+STOPwgcf ; conf && ABC1=$ud4ud6 && ABC2=$c5 && ABC
+fi
+if [[ -n $v6 && -z $v4 ]]; then
+green "当前原生v6单栈vps已安装Wgcf-WARP\n现快速切换Wgcf-WARP-IPV4+IPV6双栈模式" && sleep 2
+STOPwgcf ; conf && ABC1=$ud6 && ABC2=$c4 && ABC3=$c5 && ABC
+fi
+if [[ -z $v6 && -n $v4 ]]; then
+green "当前原生v4单栈vps已安装Wgcf-WARP\n现快速切换Wgcf-WARP-IPV4+IPV6双栈模式" && sleep 2
+STOPwgcf ; conf && ABC1=$ud4 && ABC2=$c3 && ABC3=$c5 && ABC
+fi
+CheckWARP
+ShowWGCF && WGCFmenu && back
+fi
+}
+
+WGCFmenu(){
+white "------------------------------------------------------------------------------------------------"
+white " 当前VPS IPV4接管出站流量情况如下 "
+blue " ${WARPIPv4Status}"
+white "------------------------------------------------------------------------------------------------"
+white " 当前VPS IPV6接管出站流量情况如下"
+blue " ${WARPIPv6Status}"
+white "------------------------------------------------------------------------------------------------"
+}
+S5menu(){
+white "------------------------------------------------------------------------------------------------"
+white " 当前Socks5-WARP客户端本地代理127.0.0.1情况如下"
+blue " ${S5Status}"
+white "------------------------------------------------------------------------------------------------"
+}
+back(){
+white "------------------------------------------------------------------------------------------------"
+white " 回主菜单,请按任意键"
+white " 退出脚本,请按Ctrl+C"
+get_char && bash CFwarp.sh
+}
+
+IP_Status_menu(){
+white "------------------------------------------------------------------------------------------------"
+WGCFmenu;S5menu
+}
+
+menu(){
+green "rwkgyg-CFwarp脚本快捷键使用指南"
+green "注意:进入实时显示Screen状态后,退出当前Screen界面:Ctrl+a+d 终止当前Screen运行:Ctrl+c "
+yellow "------------------------------------------"
+blue "cf wd : Wgcf-warp临时关闭"
+blue "cf wu : Wgcf-warp开启"
+blue "cf wr : Wgcf-warp重新启动"
+blue "cf 5d : Socks5-warp临时关闭"
+blue "cf 5u : Socks5-warp开启"
+blue "cf sup : 实时显示Screen运行状态:Wgcf-warp进程守护"
+blue "cf saw : 实时显示Screen运行状态:刷Netflix奈飞及区域的warp"
+blue "cf scr : 实时显示Screen运行状态:刷指定区域的warp"
+blue "cf scp : 实时显示Screen运行状态:刷指定IP段的warp"
+blue "cf : 显示CFwarp主菜单"
+blue "cf h : 显示CFwarp快捷键使用指南"
+yellow "------------------------------------------"
+}
+
+lncf(){
+if [[ $(type -P wg-quick) || $(type -P warp-cli) ]]; then
+chmod +x /root/CFwarp.sh
+ln -sf /root/CFwarp.sh /usr/bin/cf
+fi
+}
+checkwgcf(){
+wgcfv6=$(curl -s6m6 https://www.cloudflare.com/cdn-cgi/trace -k | grep warp | cut -d= -f2)
+wgcfv4=$(curl -s4m6 https://www.cloudflare.com/cdn-cgi/trace -k | grep warp | cut -d= -f2)
+}
+CheckWARP(){
+i=0
+wg-quick down wgcf >/dev/null 2>&1
+systemctl start wg-quick@wgcf >/dev/null 2>&1
+while [ $i -le 4 ]; do let i++
+yellow "共执行5次,第$i次获取WARP的IP中……"
+systemctl restart wg-quick@wgcf >/dev/null 2>&1
+checkwgcf
+[[ $wgcfv4 =~ on|plus || $wgcfv6 =~ on|plus ]] && green "恭喜!WARP的IP获取成功!" && break || red "遗憾!WARP的IP获取失败"
+done
+checkwgcf
+if [[ ! $wgcfv4 =~ on|plus && ! $wgcfv6 =~ on|plus ]]; then
+yellow "安装WARP失败,还原VPS,卸载Wgcf-WARP组件中……"
+cwg
+green "卸载Wgcf-WARP组件完成"
+green "失败建议如下:"
+[[ $release = Centos && ${vsid} -lt 7 ]] && yellow "当前系统版本号:Centos $vsid \n建议使用 Centos 7 以上系统 "
+[[ $release = Ubuntu && ${vsid} -lt 18 ]] && yellow "当前系统版本号:Ubuntu $vsid \n建议使用 Ubuntu 18 以上系统 "
+[[ $release = Debian && ${vsid} -lt 10 ]] && yellow "当前系统版本号:Debian $vsid \n建议使用 Debian 10 以上系统 "
+yellow "1、强烈建议使用官方源升级系统及内核加速!如已使用第三方源及内核加速,请务必更新到最新版,或重置为官方源"
+yellow "2、部分VPS系统极度精简,相关依赖需自行安装后再尝试"
+yellow "3、查看https://www.cloudflarestatus.com/,你当前VPS就近区域可能处于黄色的【Re-routed】状态"
+exit 0
+else
+screen -d >/dev/null 2>&1
+[[ -e /root/check.sh ]] && screen -S aw -X quit ; screen -UdmS aw bash -c '/bin/bash /root/check.sh'
+[[ -e /root/WARP-CR.sh ]] && screen -S cr -X quit ; screen -UdmS cr bash -c '/bin/bash /root/WARP-CR.sh'
+[[ -e /root/WARP-CP.sh ]] && screen -S cp -X quit ; screen -UdmS cp bash -c '/bin/bash /root/WARP-CP.sh'
+if [[ -e /root/WARP-UP.sh ]]; then
+screen -S up -X quit ; screen -UdmS up bash -c '/bin/bash /root/WARP-UP.sh'
+else
+readtp "是否安装WARP在线监测守护进程(Y/y)?(5秒后默认为N,不安装):" warpup
+echo
+if [[ $warpup = [Yy] ]]; then
+cat>/root/WARP-UP.sh<<-\EOF
+#!/bin/bash
+red(){ echo -e "\033[31m\033[01m$1\033[0m";}
+green(){ echo -e "\033[32m\033[01m$1\033[0m";}
+checkwgcf(){
+wgcfv6=$(curl -s6m6 https://www.cloudflare.com/cdn-cgi/trace -k | grep warp | cut -d= -f2)
+wgcfv4=$(curl -s4m6 https://www.cloudflare.com/cdn-cgi/trace -k | grep warp | cut -d= -f2)
+}
+warpclose(){
+wg-quick down wgcf >/dev/null 2>&1 ; systemctl stop wg-quick@wgcf >/dev/null 2>&1 ; systemctl disable wg-quick@wgcf >/dev/null 2>&1
+}
+warpopen(){
+wg-quick down wgcf >/dev/null 2>&1 ; systemctl enable wg-quick@wgcf >/dev/null 2>&1 ; systemctl start wg-quick@wgcf >/dev/null 2>&1 ; systemctl restart wg-quick@wgcf >/dev/null 2>&1
+}
+warpre(){
+i=0
+while [ $i -le 4 ]; do let i++
+warpopen
+checkwgcf
+[[ $wgcfv4 =~ on|plus || $wgcfv6 =~ on|plus ]] && green "中断后的WARP尝试获取IP成功!" && break || red "中断后的WARP尝试获取IP失败!"
+done
+checkwgcf
+if [[ ! $wgcfv4 =~ on|plus && ! $wgcfv6 =~ on|plus ]]; then
+warpclose
+red "由于5次尝试获取WARP的IP失败,现执行停止并关闭WARP,VPS恢复原IP状态"
+fi
+}
+while true; do
+green "检测WARP是否启动中…………"
+checkwgcf
+[[ $wgcfv4 =~ on|plus || $wgcfv6 =~ on|plus ]] && green "恭喜!WARP状态为运行中!下轮检测将在你设置的60秒后自动执行" && sleep 60s || (warpre ; green "下轮检测将在你设置的50秒后自动执行" ; sleep 50s)
+done
+EOF
+readp "WARP状态为运行时,重新检测WARP状态间隔时间(回车默认60秒),请输入间隔时间(例:50秒,输入50):" stop
+[[ -n $stop ]] && sed -i "s/60s/${stop}s/g;s/60秒/${stop}秒/g" /root/WARP-UP.sh || green "默认间隔60秒"
+readp "WARP状态为中断时(连续5次失败自动关闭WARP),继续检测WARP状态间隔时间(回车默认50秒),请输入间隔时间(例:50秒,输入50):" goon
+[[ -n $goon ]] && sed -i "s/50s/${goon}s/g;s/50秒/${goon}秒/g" /root/WARP-UP.sh || green "默认间隔50秒"
+[[ -e /root/WARP-UP.sh ]] && screen -S up -X quit ; screen -UdmS up bash -c '/bin/bash /root/WARP-UP.sh'
+green "设置screen窗口名称'up',离线后台WARP在线守护进程" && sleep 2
+grep -qE "^ *@reboot root screen -UdmS up bash -c '/bin/bash /root/WARP-UP.sh' >/dev/null 2>&1" /etc/crontab || echo "@reboot root screen -UdmS up bash -c '/bin/bash /root/WARP-UP.sh' >/dev/null 2>&1" >> /etc/crontab
+green "添加WARP在线守护进程功能,重启VPS也会自动生效"
+fi
+fi
+fi
+}
+
+dns(){
+if [[ -n $v6 && -z $v4 ]]; then
+echo -e "nameserver 2001:4860:4860::8888\nnameserver 8.8.8.8" > /etc/resolv.conf
+else
+echo -e "nameserver 8.8.8.8\nnameserver 2001:4860:4860::8888" > /etc/resolv.conf
+fi
+}
+dig9(){
+if [[ -n $(grep 'DiG 9' /etc/hosts) ]]; then
+echo -e "search blue.kundencontroller.de\noptions rotate\nnameserver 2a02:180:6:5::1c\nnameserver 2a02:180:6:5::4\nnameserver 2a02:180:6:5::1e\nnameserver 2a02:180:6:5::1d" > /etc/resolv.conf
+fi
+}
+
+get_char(){
+SAVEDSTTY=`stty -g`
+stty -echo
+stty cbreak
+dd if=/dev/tty bs=1 count=1 2> /dev/null
+stty -raw
+stty echo
+stty $SAVEDSTTY
+}
+
+WGCFins(){
+rm -rf /usr/local/bin/wgcf /etc/wireguard/wgcf.conf /etc/wireguard/wgcf-profile.conf /etc/wireguard/wgcf-account.toml /etc/wireguard/wgcf+p.log /etc/wireguard/ID /usr/bin/wireguard-go wgcf-account.toml wgcf-profile.conf
+ShowWGCF
+if [[ $release = Centos ]]; then
+if [[ ${vsid} =~ 8 ]]; then
+cd /etc/yum.repos.d/ && mkdir backup && mv *repo backup/
+curl -o /etc/yum.repos.d/CentOS-Base.repo http://mirrors.aliyun.com/repo/Centos-8.repo
+sed -i -e "s|mirrors.cloud.aliyuncs.com|mirrors.aliyun.com|g " /etc/yum.repos.d/CentOS-*
+sed -i -e "s|releasever|releasever-stream|g" /etc/yum.repos.d/CentOS-*
+yum clean all && yum makecache
+fi
+yum install epel-release -y;yum install iproute iptables wireguard-tools -y
+elif [[ $release = Debian ]]; then
+apt install lsb-release -y
+echo "deb http://deb.debian.org/debian $(lsb_release -sc)-backports main" | tee /etc/apt/sources.list.d/backports.list
+apt update -y;apt install iproute2 openresolv dnsutils iptables -y;apt install wireguard-tools --no-install-recommends -y
+elif [[ $release = Ubuntu ]]; then
+apt update -y;apt install iproute2 openresolv dnsutils iptables -y;apt install wireguard-tools --no-install-recommends -y
+fi
+[[ $cpu = AMD64 ]] && wget -N https://gitlab.com/rwkgyg/cfwarp/raw/main/wgcf_2.2.15_amd64 -O /usr/local/bin/wgcf && chmod +x /usr/local/bin/wgcf
+[[ $cpu = ARM64 ]] && wget -N https://gitlab.com/rwkgyg/cfwarp/raw/main/wgcf_2.2.15_arm64 -O /usr/local/bin/wgcf && chmod +x /usr/local/bin/wgcf
+if [[ $main -lt 5 || $minor -lt 6 ]] || [[ $vi =~ lxc|openvz ]]; then
+[[ -e /usr/bin/wireguard-go ]] || wget -N https://gitlab.com/rwkgyg/cfwarp/raw/main/wireguard-go -O /usr/bin/wireguard-go && chmod +x /usr/bin/wireguard-go
+fi
+echo | wgcf register
+until [[ -e wgcf-account.toml ]]
+do
+yellow "申请WARP普通账户过程中可能会多次提示:429 Too Many Requests,请等待30秒" && sleep 1
+echo | wgcf register
+done
+wgcf generate
+yellow "开始自动设置WARP的MTU最佳网络吞吐量值,以优化WARP网络!"
+MTUy=1500
+MTUc=10
+if [[ -n $v6 && -z $v4 ]]; then
+ping='ping6'
+IP1='2606:4700:4700::1111'
+IP2='2001:4860:4860::8888'
+else
+ping='ping'
+IP1='1.1.1.1'
+IP2='8.8.8.8'
+fi
+while true; do
+if ${ping} -c1 -W1 -s$((${MTUy} - 28)) -Mdo ${IP1} >/dev/null 2>&1 || ${ping} -c1 -W1 -s$((${MTUy} - 28)) -Mdo ${IP2} >/dev/null 2>&1; then
+MTUc=1
+MTUy=$((${MTUy} + ${MTUc}))
+else
+MTUy=$((${MTUy} - ${MTUc}))
+[[ ${MTUc} = 1 ]] && break
+fi
+[[ ${MTUy} -le 1360 ]] && MTUy='1360' && break
+done
+MTU=$((${MTUy} - 80))
+green "MTU最佳网络吞吐量值= $MTU 已设置完毕"
+sed -i "s/MTU.*/MTU = $MTU/g" wgcf-profile.conf
+cp -f wgcf-profile.conf /etc/wireguard/wgcf.conf >/dev/null 2>&1
+echo $ABC1 | sh
+echo $ABC2 | sh
+echo $ABC3 | sh
+echo $ABC4 | sh
+mv -f wgcf-profile.conf /etc/wireguard >/dev/null 2>&1
+mv -f wgcf-account.toml /etc/wireguard >/dev/null 2>&1
+systemctl enable wg-quick@wgcf >/dev/null 2>&1
+CheckWARP
+ShowWGCF && WGCFmenu && lncf && menu
+}
+
+SOCKS5ins(){
+yellow "检测Socks5-WARP安装环境中……"
+if [[ $release = Centos ]]; then
+[[ ! ${vsid} =~ 8 ]] && yellow "当前系统版本号:Centos $vsid \nSocks5-WARP仅支持Centos 8 " && bash CFwarp.sh
+elif [[ $release = Ubuntu ]]; then
+[[ ! ${vsid} =~ 16|18|20 ]] && yellow "当前系统版本号:Ubuntu $vsid \nSocks5-WARP仅支持 Ubuntu 16.04/18.04/20.04系统 " && bash CFwarp.sh
+elif [[ $release = Debian ]]; then
+[[ ! ${vsid} =~ 9|10|11 ]] && yellow "当前系统版本号:Debian $vsid \nSocks5-WARP仅支持 Debian 9/10/11系统 " && bash CFwarp.sh
+fi
+[[ $(warp-cli --accept-tos status 2>/dev/null) =~ 'Connected' ]] && red "当前Socks5-WARP已经在运行中" && bash CFwarp.sh
+systemctl stop wg-quick@wgcf >/dev/null 2>&1
+v4v6
+if [[ -n $v6 && -z $v4 ]]; then
+systemctl start wg-quick@wgcf >/dev/null 2>&1
+red "纯IPV6的VPS目前不支持安装Socks5-WARP" && bash CFwarp.sh
+elif [[ -n $v4 && -z $v6 ]]; then
+systemctl start wg-quick@wgcf >/dev/null 2>&1
+checkwgcf
+[[ $wgcfv4 =~ on|plus && ! $wgcfv6 =~ on|plus ]] && red "纯IPV4的VPS已安装Wgcf-WARP-IPV4(选项1),不支持安装Socks5-WARP" && bash CFwarp.sh
+elif [[ -n $v4 && -n $v6 ]]; then
+systemctl start wg-quick@wgcf >/dev/null 2>&1
+checkwgcf
+[[ $wgcfv4 =~ on|plus || $wgcfv6 =~ on|plus ]] && red "原生双栈VPS已安装Wgcf-WARP-IPV4/IPV6(选项1或选项2),请先卸载。然后安装Socks5-WARP,最后安装Wgcf-WARP-IPV4/IPV6" && bash CFwarp.sh
+fi
+systemctl start wg-quick@wgcf >/dev/null 2>&1
+checkwgcf
+[[ $wgcfv4 =~ on|plus && $wgcfv6 =~ on|plus ]] && red "已安装Wgcf-WARP-IPV4+IPV6(选项3),不支持安装Socks5-WARP" && bash CFwarp.sh
+if [[ $release = Centos ]]; then
+if [[ ${vsid} =~ 8 ]]; then
+cd /etc/yum.repos.d/ && mkdir backup && mv *repo backup/
+curl -o /etc/yum.repos.d/CentOS-Base.repo http://mirrors.aliyun.com/repo/Centos-8.repo
+sed -i -e "s|mirrors.cloud.aliyuncs.com|mirrors.aliyun.com|g " /etc/yum.repos.d/CentOS-*
+sed -i -e "s|releasever|releasever-stream|g" /etc/yum.repos.d/CentOS-*
+yum clean all && yum makecache
+fi
+yum -y install epel-release && yum -y install net-tools
+rpm -ivh https://pkg.cloudflareclient.com/cloudflare-release-el8.rpm
+yum -y install cloudflare-warp
+fi
+if [[ $release = Debian ]]; then
+[[ ! $(type -P gpg) ]] && apt update && apt install gnupg -y
+[[ ! $(apt list 2>/dev/null | grep apt-transport-https | grep installed) ]] && apt update && apt install apt-transport-https -y
+fi
+if [[ $release != Centos ]]; then
+apt install net-tools -y
+curl https://pkg.cloudflareclient.com/pubkey.gpg | gpg --yes --dearmor --output /usr/share/keyrings/cloudflare-warp-archive-keyring.gpg
+echo "deb [arch=amd64 signed-by=/usr/share/keyrings/cloudflare-warp-archive-keyring.gpg] http://pkg.cloudflareclient.com/ $(lsb_release -sc) main" | tee /etc/apt/sources.list.d/cloudflare-client.list
+apt update;apt install cloudflare-warp -y
+fi
+warp-cli --accept-tos register >/dev/null 2>&1 && sleep 2
+warp-cli --accept-tos set-mode proxy >/dev/null 2>&1
+warp-cli --accept-tos enable-always-on >/dev/null 2>&1
+sleep 2 && ShowSOCKS5
+[[ -e /root/check.sh ]] && screen -S aw -X quit ; screen -UdmS aw bash -c '/bin/bash /root/check.sh'
+[[ -e /root/WARP-CR.sh ]] && screen -S cr -X quit ; screen -UdmS cr bash -c '/bin/bash /root/WARP-CR.sh'
+[[ -e /root/WARP-CP.sh ]] && screen -S cp -X quit ; screen -UdmS cp bash -c '/bin/bash /root/WARP-CP.sh'
+S5menu && lncf && menu
+}
+
+WARPup(){
+ab="1.升级Wgcf-WARP+账户\n2.升级Socks5-WARP+账户\n3.更换Socks5端口\n0.返回上一层\n 请选择:"
+readp "$ab" cd
+case "$cd" in
+1 )
+[[ ! $(type -P wg-quick) ]] && red "未安装Wgcf-WARP,无法升级到Wgcf-WARP+账户" && bash CFwarp.sh
+ShowWGCF
+[[ $wgcfv4 = plus || $wgcfv6 = plus ]] && red "当前已是Wgcf-WARP+账户,无须再升级" && bash CFwarp.sh
+cd /etc/wireguard
+readp "按键许可证秘钥(26个字符):" ID
+[[ -n $ID ]] && sed -i "s/license_key.*/license_key = \"$ID\"/g" wgcf-account.toml && readp "设备名称重命名(直接回车随机命名):" sbmc || (red "未输入按键许可证秘钥(26个字符)" && bash CFwarp.sh)
+[[ -n $sbmc ]] && SBID="--name $(echo $sbmc | sed s/[[:space:]]/_/g)"
+wgcf update $SBID > /etc/wireguard/wgcf+p.log 2>&1
+wgcf generate
+sed -i "2s#.*#$(sed -ne 2p wgcf-profile.conf)#;4s#.*#$(sed -ne 4p wgcf-profile.conf)#" wgcf.conf
+checkwgcf
+[[ $wgcfv4 = plus || $wgcfv6 = plus ]] && green "已升级为Wgcf-WARP+账户\nWgcf-WARP+账户设备名称:$(grep -s 'Device name' /etc/wireguard/wgcf+p.log | awk '{ print $NF }')\nWgcf-WARP+账户剩余流量:$(grep -s Quota /etc/wireguard/wgcf+p.log | awk '{ print $(NF-1), $NF }')"
+ShowWGCF && WGCFmenu && back;;
+2 )
+[[ ! $(type -P warp-cli) ]] && red "未安装Socks5-WARP,无法升级到Socks5-WARP+账户" && bash CFwarp.sh
+[[ $(warp-cli --accept-tos account) =~ 'Limited' ]] && red "当前已是Socks5-WARP+账户,无须再升级" && bash CFwarp.sh
+mkdir -p /etc/wireguard/ >/dev/null 2>&1
+readp "按键许可证秘钥(26个字符):" ID
+[[ -n $ID ]] && warp-cli --accept-tos set-license $ID >/dev/null 2>&1 || (red "未输入按键许可证秘钥(26个字符)" && bash CFwarp.sh)
+yellow "如提示Error: Too many devices.说明超过了最多绑定4台设备限制"
+[[ $(warp-cli --accept-tos account) =~ 'Limited' ]] && green "已升级为Socks5-WARP+账户\nSocks5-WARP+账户剩余流量:$((`warp-cli --accept-tos account | grep Quota | awk '{ print $(NF) }'`/1000000000))GB" && echo $ID >/etc/wireguard/ID
+ShowSOCKS5 && S5menu && back;;
+3 )
+[[ ! $(type -P warp-cli) ]] && red "未安装Socks5-WARP(+),无法更改端口" && bash CFwarp.sh
+if readp "请输入自定义socks5端口(1024~65535):" port ; then
+if [[ -n $(netstat -ntlp | grep "$port") ]]; then
+until [[ -z $(netstat -ntlp | grep "$port") ]]
+do
+[[ -n $(netstat -ntlp | grep "$port") ]] && yellow "\n端口被占用,请重新输入端口" && readp "自定义Socks5端口:" port
+done
+fi
+fi
+[[ -n $port ]] && warp-cli --accept-tos set-proxy-port $port >/dev/null 2>&1
+ShowSOCKS5 && S5menu && back;;
+0 ) WARPupre
+esac
+}
+
+WARPupre(){
+ab="1.Wgcf-WARP(+)账户升级到Teams账户\n2.Wgcf-WARP升级到WARP+账户、Wgcf-Socks5升级到WARP+账户、更换Socks5端口\n3.在线前台刷WARP+普通账户流量\n4.离线后台刷WARP+普通账户流量\n5.screen管理设置\n0.返回上一层\n 请选择:"
+readp "$ab" cd
+case "$cd" in
+1 )
+[[ ! -e /etc/wireguard/wgcf.conf ]] && red "无法找到Wgcf-WARP(+)配置文件,建议重装Wgcf-WARP(+)" && bash CFwarp.sh
+readp "请复制privateKey(44个字符):" Key
+readp "请复制IPV6的Address:" Add
+if [[ -n $Key && -n $Add ]]; then
+sed -i "s#PrivateKey.*#PrivateKey = $Key#g;s#Address.*128#Address = $Add/128#g" /etc/wireguard/wgcf.conf
+systemctl restart wg-quick@wgcf >/dev/null 2>&1
+checkwgcf
+if [[ $wgcfv4 = plus || $wgcfv6 = plus ]]; then
+rm -rf /etc/wireguard/wgcf+p.log && green "Wgcf-WARP+Teams账户已生效" && ShowWGCF && WGCFmenu && back
+else
+red "开启Wgcf-WARP+Teams账户失败,恢复使用WARP普通账户" && cp -f /etc/wireguard/wgcf-profile.conf /etc/wireguard/wgcf.conf >/dev/null 2>&1 && systemctl restart wg-quick@wgcf && ShowWGCF && WGCFmenu && back
+fi
+else
+red "未复制privateKey或Address,恢复使用WARP普通账户" && cp -f /etc/wireguard/wgcf-profile.conf /etc/wireguard/wgcf.conf >/dev/null 2>&1 && systemctl restart wg-quick@wgcf && ShowWGCF && WGCFmenu && back
+fi;;
+2 ) WARPup;;
+3 ) wget -N --no-check-certificate https://cdn.jsdelivr.net/gh/ALIILAPRO/warp-plus-cloudflare/wp-plus.py && python3 wp-plus.py;;
+4 )
+wget -N --no-check-certificate https://cdn.jsdelivr.net/gh/ALIILAPRO/warp-plus-cloudflare/wp-plus.py
+sed -i "27 s/[(][^)]*[)]//g" wp-plus.py
+readp "客户端配置ID(36个字符):" ID
+sed -i "27 s/input/'$ID'/" wp-plus.py
+readp "设置screen窗口名称,回车默认名称为'wp':" wpp
+[[ -z $wpp ]] && wpp='wp'
+screen -UdmS $wpp bash -c '/usr/bin/python3 /root/wp-plus.py' && back;;
+5 ) wget -N https://gitlab.com/rwkgyg/screen-script/raw/main/screen.sh && bash screen.sh && back;;
+0 ) bash CFwarp.sh
+esac
+}
+
+ReIP(){
+ab="1.手动刷新Wgcf-WARP(+)奈飞IP\n2.手动刷新Socks5-WARP(+)奈飞IP\n0.返回上一层\n 请选择:"
+readp "$ab" cd
+case "$cd" in
+1 )
+[[ ! $(type -P wg-quick) ]] && red "未安装Wgcf-WARP(+),无法刷新IP" && bash CFwarp.sh
+ShowWGCF
+ab="1.刷新IPV4的奈飞IP\n2.刷新IPV6的奈飞IP\n0.返回上一层\n 请选择:"
+readp "$ab" cd
+case "$cd" in
+1 )
+[[ $wgcfv4 = plus || $wgcfv4 = on ]] || (yellow "未开启Wgcf-WARP(+)-IPV4" && bash CFwarp.sh)
+i=0
+yellow "共刷新10次IP"
+while [ $i -le 9 ]; do let i++
+ShowWGCF
+[[ "$result4" == "200" ]] && yellow "第$i次刷新IP \c" && green "恭喜,此IP:$v4 支持奈飞" && break || (yellow "第$i次刷新IP \c" && CheckWARP && red "当前IP:$v4 $NF" && sleep 3)
+done
+ShowWGCF && WGCFmenu && back;;
+2 )
+[[ $wgcfv6 = plus || $wgcfv6 = on ]] || (yellow "未开启Wgcf-WARP(+)-IPV6" && bash CFwarp.sh)
+i=0
+yellow "共刷新10次IP"
+while [ $i -le 9 ]; do let i++
+ShowWGCF
+[[ "$result6" == "200" ]] && yellow "第$i次刷新IP \c" && green "恭喜,此IP:$v6 支持奈飞" && break || (yellow "第$i次刷新IP \c" && CheckWARP && red "当前IP:$v6 $NF" && sleep 3)
+done
+ShowWGCF && WGCFmenu && back;;
+0 ) ReIP
+esac;;
+2 )
+[[ ! $(type -P warp-cli) ]] && red "未安装Socks5-WARP(+),无法刷新IP" && bash CFwarp.sh
+s5c(){
+warp-cli --accept-tos register >/dev/null 2>&1 && sleep 2
+[[ -e /etc/wireguard/ID ]] && warp-cli --accept-tos set-license $(cat /etc/wireguard/ID) >/dev/null 2>&1
+}
+i=0
+yellow "共刷新10次IP"
+while [ $i -le 9 ]; do let i++
+ShowSOCKS5
+[[ "$result" == "200" ]] && yellow "第$i次刷新IP \c" && green "恭喜,此IP:$s5ip 支持奈飞" && break || (yellow "第$i次刷新IP \c" && s5c && red "当前IP:$s5i $NF" && sleep 3)
+done
+ShowSOCKS5 && S5menu && back;;
+0 ) REnfwarp
+esac
+}
+
+Rewarp(){
+ab="1.启用:离线后台+重启VPS后screen后台自动刷NF功能\n2.启用:离线后台+重启VPS后screen后台自动刷区域IP功能\n3.启用:离线后台+重启VPS后screen后台自动刷Wgcf-IPV4的IP段功能\n4.关闭:重启VPS自动刷奈飞IP或区域IP功能\n(离线Screen窗口请在Screen管理设置中删除)\n0.返回上一层\n 请选择:"
+readp "$ab" cd
+case "$cd" in
+1 )
+[[ -e /root/WARP-CR.sh || -e /root/WARP-CP.sh ]] && yellow "经检测,你正在使用其他刷IP功能,请关闭它后再执行" && REnfwarp
+screen -d >/dev/null 2>&1
+wget -N --no-check-certificate https://gitlab.com/rwkgyg/cfwarp/raw/main/check.sh
+readp "输入国家区域简称(例:新加坡,输入大写SG;美国,输入大写US):" gj
+[[ -n $gj ]] && sed -i "s/dd/$gj/g" check.sh || (sed -i "s/dd/\$region/g" check.sh && green "当前设置WARP默认随机分配的国家区域: $g4 ")
+readp "已是奈飞IP或者指定IP区域时,重新检测间隔时间(回车默认45秒),请输入间隔时间(例:50秒,输入50):" stop
+[[ -n $stop ]] && sed -i "s/45s/${stop}s/g;s/45秒/${stop}秒/g" check.sh || green "默认间隔45秒"
+readp "非奈飞IP或者非指定IP区域时,继续检测间隔时间(回车默认30秒),请输入间隔时间(例:50秒,输入50):" goon
+[[ -n $goon ]] && sed -i "s/30s/${goon}s/g;s/30秒/${goon}秒/g" check.sh || green "默认间隔30秒"
+[[ -e /root/check.sh ]] && screen -S aw -X quit ; screen -UdmS aw bash -c '/bin/bash /root/check.sh'
+green "设置screen窗口名称'aw',离线后台自动刷奈飞IP" && sleep 2
+grep -qE "^ *@reboot root screen -UdmS aw bash -c '/bin/bash /root/check.sh' >/dev/null 2>&1" /etc/crontab || echo "@reboot root screen -UdmS aw bash -c '/bin/bash /root/check.sh' >/dev/null 2>&1" >> /etc/crontab
+green "添加VPS重启后screen后台自动刷奈飞IP功能,重启VPS后自动生效"
+back;;
+2 )
+[[ -e /root/WARP-CP.sh || -e /root/check.sh ]] && yellow "经检测,你正在使用其他刷IP功能,请关闭它后再执行" && REnfwarp
+screen -d >/dev/null 2>&1
+wget -N --no-check-certificate https://gitlab.com/rwkgyg/cfwarp/raw/main/WARP-CR.sh
+readp "输入国家区域简称(例:新加坡,输入大写SG;美国,输入大写US):" gj
+[[ -n $gj ]] && sed -i "s/dd4/$gj/g" WARP-CR.sh || (sed -i "s/dd4/\$eg4/g" WARP-CR.sh && green "IPV4当前设置WARP默认分配的国家区域: $g4 ")
+[[ -n $gj ]] && sed -i "s/dd6/$gj/g" WARP-CR.sh || (sed -i "s/dd6/\$eg6/g" WARP-CR.sh && green "IPV6当前设置WARP默认分配的国家区域: $g6 ")
+[[ -n $gj ]] && sed -i "s/ddj/$gj/g" WARP-CR.sh || (sed -i "s/ddj/\$egj/g" WARP-CR.sh && green "Socks5当前设置WARP默认分配的国家区域: $s5gj ")
+readp "已是指定IP区域时,重新检测间隔时间(回车默认60秒),请输入间隔时间(例:50秒,输入50):" stop
+[[ -n $stop ]] && sed -i "s/60s/${stop}s/g;s/60秒/${stop}秒/g" WARP-CR.sh || green "默认间隔60秒"
+readp "非指定IP区域时,重新检测间隔时间(回车默认30秒),请输入间隔时间(例:50秒,输入50):" goon
+[[ -n $goon ]] && sed -i "s/30s/${goon}s/g;s/30秒/${goon}秒/g" WARP-CR.sh || green "默认间隔30秒"
+[[ -e /root/WARP-CR.sh ]] && screen -S cr -X quit ; screen -UdmS cr bash -c '/bin/bash /root/WARP-CR.sh'
+green "设置screen窗口名称'cr',离线后台自动刷WARP指定区域IP" && sleep 2
+grep -qE "^ *@reboot root screen -UdmS cr bash -c '/bin/bash /root/WARP-CR.sh' >/dev/null 2>&1" /etc/crontab || echo "@reboot root screen -UdmS cr bash -c '/bin/bash /root/WARP-CR.sh' >/dev/null 2>&1" >> /etc/crontab
+green "添加VPS重启后screen后台自动刷IP功能,重启VPS后自动生效"
+back;;
+3 )
+[[ -e /root/WARP-CR.sh || -e /root/check.sh ]] && yellow "经检测,你正在使用其他刷IP功能,请关闭它后再执行" && REnfwarp
+wgcfv4=$(curl -s4m6 https://www.cloudflare.com/cdn-cgi/trace -k | grep warp | cut -d= -f2)
+[[ ! $wgcfv4 =~ on|plus ]] && yellow "当前Wgcf-IPV4未开启" && bash CFwarp.sh
+screen -d >/dev/null 2>&1
+wget -N --no-check-certificate https://gitlab.com/rwkgyg/cfwarp/raw/main/WARP-CP.sh
+readp "输入WARP-IPV4的第二段.第三段的IP段(例:8.45.46.123 , 输入 45.46 ):" gj
+[[ -n $gj ]] && sed -i "s/ipd/$gj/g" WARP-CP.sh || (sed -i "s/ipd/\$v4d/g" WARP-CP.sh && green "未输入,使用当前WARP默认IP段$(curl -s4m3 https://ip.gs -k | awk -F '.' '{print $2"."$3}')")
+readp "已刷到设置的IP段时,重新检测间隔时间(回车默认60秒),请输入间隔时间(例:50秒,输入50):" stop
+[[ -n $stop ]] && sed -i "s/60s/${stop}s/g;s/60秒/${stop}秒/g" WARP-CP.sh || green "默认间隔60秒"
+readp "未刷到设置的IP段时,继续检测间隔时间(回车默认20秒),请输入间隔时间(例:50秒,输入50):" goon
+[[ -n $goon ]] && sed -i "s/20s/${goon}s/g;s/20秒/${goon}秒/g" WARP-CP.sh || green "默认间隔20秒"
+[[ -e /root/WARP-CP.sh ]] && screen -S cp -X quit ; screen -UdmS cp bash -c '/bin/bash /root/WARP-CP.sh'
+green "设置screen窗口名称'cp',离线后台自动WARP的IP段" && sleep 2
+grep -qE "^ *@reboot root screen -UdmS cp bash -c '/bin/bash /root/WARP-CP.sh' >/dev/null 2>&1" /etc/crontab || echo "@reboot root screen -UdmS cp bash -c '/bin/bash /root/WARP-CP.sh' >/dev/null 2>&1" >> /etc/crontab
+green "添加VPS重启后screen后台自动刷WARP的IP段功能,重启VPS后自动生效"
+back;;
+4 )
+sed -i '/check.sh/d' /etc/crontab ; sed -i '/WARP-CR.sh/d' /etc/crontab ; sed -i '/WARP-CP.sh/d' /etc/crontab
+rm -rf check.sh WARP-CR.sh WARP-CP.sh
+green "卸载完成";;
+0 ) REnfwarp
+esac
+}
+
+REnfwarp(){
+ab="1.在线前台临时刷奈飞NF\n2.离线后台+重启VPS后screen后台自动刷奈飞NF、WARP区域、Wgcf-IPV4的IP段三大功能\n3.screen管理设置\n0.返回上一层\n 请选择:"
+readp "$ab" cd
+case "$cd" in
+1 ) ReIP;;
+2 ) Rewarp;;
+3 ) wget -N https://gitlab.com/rwkgyg/screen-script/raw/main/screen.sh && bash screen.sh && back;;
+0 ) bash CFwarp.sh
+esac
+}
+
+WARPonoff(){
+ab="1.开启或者完全关闭Wgcf-WARP(+)\n2.开启或完全关闭Socks5-WARP(+)\n0.返回上一层\n 请选择:"
+readp "$ab" cd
+case "$cd" in
+1 )
+[[ ! $(type -P wg-quick) ]] && red "Wgcf-WARP(+)未安装,无法启动或关闭,建议重新安装Wgcf-WARP(+)" && bash CFwarp.sh
+checkwgcf
+if [[ $wgcfv4 =~ on|plus || $wgcfv6 =~ on|plus ]]; then
+yellow "当前Wgcf-WARP(+)状态:已运行中,现执行:完全关闭……"
+rm -rf WARP-UP.sh
+sed -i '/WARP-UP.sh/d' /etc/crontab >/dev/null 2>&1
+wg-quick down wgcf >/dev/null 2>&1
+systemctl disable wg-quick@wgcf >/dev/null 2>&1
+checkwgcf
+[[ ! $wgcfv4 =~ on|plus && ! $wgcfv6 =~ on|plus ]] && green "关闭Wgcf-WARP(+)成功" || red "关闭Wgcf-WARP(+)失败"
+elif [[ ! $wgcfv4 =~ on|plus && ! $wgcfv6 =~ on|plus ]]; then
+yellow "当前Wgcf-WARP(+)为完全关闭状态,现执行:恢复运行……"
+systemctl enable wg-quick@wgcf >/dev/null 2>&1
+CheckWARP
+fi
+ShowWGCF && WGCFmenu && back;;
+2 )
+[[ ! $(type -P warp-cli) ]] && red "Socks5-WARP(+)未安装,无法启动或关闭,建议重新安装Socks5-WARP(+)" && bash CFwarp.sh
+if [[ $(warp-cli --accept-tos status) =~ 'Connected' ]]; then
+yellow "当前Socks5-WARP(+)状态:已运行中,现执行:完全关闭……" && sleep 1
+warp-cli --accept-tos disable-always-on >/dev/null 2>&1
+[[ -e /root/check.sh ]] && screen -S aw -X quit ; screen -UdmS aw bash -c '/bin/bash /root/check.sh'
+[[ -e /root/WARP-CR.sh ]] && screen -S cr -X quit ; screen -UdmS cr bash -c '/bin/bash /root/WARP-CR.sh'
+[[ -e /root/WARP-CP.sh ]] && screen -S cp -X quit ; screen -UdmS cp bash -c '/bin/bash /root/WARP-CP.sh'
+[[ $(warp-cli --accept-tos status) =~ 'Disconnected' ]] && green "临时关闭WARP(+)成功" || red "临时关闭WARP(+)失败"
+elif [[ $(warp-cli --accept-tos status) =~ 'Disconnected' ]]; then
+yellow "当前Socks5-WARP(+)为完全关闭状态,现执行:恢复运行……" && sleep 1
+warp-cli --accept-tos enable-always-on >/dev/null 2>&1
+[[ -e /root/check.sh ]] && screen -S aw -X quit ; screen -UdmS aw bash -c '/bin/bash /root/check.sh'
+[[ -e /root/WARP-CR.sh ]] && screen -S cr -X quit ; screen -UdmS cr bash -c '/bin/bash /root/WARP-CR.sh'
+[[ -e /root/WARP-CP.sh ]] && screen -S cp -X quit ; screen -UdmS cp bash -c '/bin/bash /root/WARP-CP.sh'
+fi
+ShowSOCKS5 && S5menu && back;;
+0 ) WARPOC
+esac
+}
+
+cwg(){
+wg-quick down wgcf >/dev/null 2>&1
+systemctl disable wg-quick@wgcf >/dev/null 2>&1
+$yumapt autoremove wireguard-tools
+screen -S up -X quit ; rm -rf WARP-UP.sh ; sed -i '/WARP-UP.sh/d' /etc/crontab
+dig9
+}
+cso(){
+warp-cli --accept-tos disconnect >/dev/null 2>&1
+warp-cli --accept-tos disable-always-on >/dev/null 2>&1
+warp-cli --accept-tos delete >/dev/null 2>&1
+[[ $release = Centos ]] && (yum autoremove cloudflare-warp -y) || (apt purge cloudflare-warp -y && rm -f /etc/apt/sources.list.d/cloudflare-client.list /usr/share/keyrings/cloudflare-warp-archive-keyring.gpg)
+}
+
+WARPun(){
+wj="rm -rf /usr/local/bin/wgcf /etc/wireguard/wgcf.conf /etc/wireguard/wgcf-profile.conf /etc/wireguard/wgcf-account.toml /etc/wireguard/wgcf+p.log /etc/wireguard/ID /usr/bin/wireguard-go wgcf-account.toml wgcf-profile.conf"
+cron1="rm -rf CFwarp.sh screen.sh check.sh WARP-CR.sh WARP-CP.sh WARP-UP.sh /usr/bin/cf"
+cron2(){
+sed -i '/check.sh/d' /etc/crontab ; sed -i '/WARP-CR.sh/d' /etc/crontab ; sed -i '/WARP-CP.sh/d' /etc/crontab ; sed -i '/WARP-UP.sh/d' /etc/crontab
+}
+cron3(){
+screen -S up -X quit;screen -S aw -X quit;screen -S cr -X quit;screen -S cp -X quit
+}
+ab="1.卸载Wgcf-WARP(+)\n2.卸载Socks5-WARP(+)\n3.彻底卸载并清除WARP脚本及相关进程文件\n0.返回上一层\n 请选择:"
+readp "$ab" cd
+case "$cd" in
+1 ) [[ $(type -P wg-quick) ]] && (cwg ; $wj ; green "Wgcf-WARP(+)卸载完成" && ShowWGCF && WGCFmenu && back) || (yellow "并未安装Wgcf-WARP(+),无法卸载" && bash CFwarp.sh);;
+2 ) [[ $(type -P warp-cli) ]] && (cso ; green "Socks5-WARP(+)卸载完成" && ShowSOCKS5 && S5menu && back) || (yellow "并未安装Socks5-WARP(+),无法卸载" && bash CFwarp.sh);;
+3 ) [[ ! $(type -P wg-quick) && ! $(type -P warp-cli) ]] && (red "并没有安装任何的WARP功能,无法卸载" && CFwarp.sh) || (cwg ; cso ; $wj ; $cron1 ; cron2 ; cron3 ; green "WARP已全部卸载完成" && ShowSOCKS5 && ShowWGCF && WGCFmenu && S5menu && exit);;
+0 ) WARPOC
+esac
+}
+
+WARPOC(){
+ab="1.完全关闭与启用WARP(+)功能\n2.卸载WARP(+)功能\n0.返回上一层\n 请选择:"
+readp "$ab" cd
+case "$cd" in
+1 ) WARPonoff;;
+2 ) WARPun;;
+0 ) bash CFwarp.sh
+esac
+}
+
+start_menu(){
+ShowWGCF;ShowSOCKS5
+clear
+green "~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~"
+echo -e "${bblue} ░██ ░██ ░██ ░██ ░██${plain} ░██ ░██ ░██ ░██ ██ ${red}██${plain} "
+echo -e "${bblue} ░██ ░██ ░██ ░██${plain} ░██ ░██ ░██ ░██ ░██ ${red}░░██${plain} "
+echo -e "${bblue} ░██ ██ ░██${plain} ██ ░██ ██ ░██ ░██ ░${red}██ ${plain} "
+echo -e "${bblue} ░██ ██ ${plain} ░██ ██ ░██ ██ ░██ ${red}░██ ░██ ██${plain} "
+echo -e "${bblue} ░██ ░${plain}██ ░██ ░██ ░██ ░██ ░${red}██ ░██ ░░██${plain}"
+echo -e "${bblue} ░${plain}██ ░░██ ░██ ░░██ ░██ ░░${red}██ ░██ ░██ ██ ██${plain} "
+green "~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~"
+white "甬哥Gitlab项目 :gitlab.com/rwkgyg"
+white "甬哥blogger博客 :ygkkk.blogspot.com"
+white "甬哥YouTube频道 :www.youtube.com/c/甬哥侃侃侃kkkyg"
+yellow "~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~"
+bblue " WARP-WGCF/SOCKS5安装脚本:2022.3.24更新 Beta 8 版本"
+yellow " 切记:安装WARP成功后,进入脚本快捷方式:cf 其他说明:cf h"
+white " ========================================================================================"
+green " 1. 安装Wgcf-WARP:虚拟IPV4"
+green " 2. 安装Wgcf-WARP:虚拟IPV6"
+green " 3. 安装Wgcf-WARP:虚拟IPV4+IPV6"
+[[ $cpu != AMD64 ]] && red " 4. 提示:当前VPS的CPU并非AMD64架构,目前不支持安装Socks5-WARP(+)" || green " 4. 安装Socks5-WARP:IPV4本地Socks5代理"
+white " -------------------------------------------------------------------------------------------"
+green " 5. WARP账户升级:WARP+账户与WARP+Teams账户"
+green " 6. WARPR解锁NF奈飞:自动识别WARP配置环境"
+green " 7. WARP开启、停止、卸载"
+green " 0. 退出脚本 "
+red "~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~"
+white " VPS系统信息如下:"
+white " VPS操作系统: $(blue "$op") \c" && white " 内核版本: $(blue "$version") \c" && white " CPU架构 : $(blue "$cpu") \c" && white " 虚拟化类型: $(blue "$vi") \c" && white " TCP算法: $(blue "$bbr")"
+IP_Status_menu
+echo
+readp "请输入数字:" Input
+case "$Input" in
+ 1 ) WGCFv4;;
+ 2 ) WGCFv6;;
+ 3 ) WGCFv4v6;;
+ 4 ) [[ $cpu = AMD64 ]] && SOCKS5ins || bash CFwarp.sh;;
+ 5 ) WARPupre;;
+ 6 ) REnfwarp;;
+ 7 ) WARPOC;;
+ * ) exit
+esac
+}
+if [ $# == 0 ]; then
+start
+start_menu
+fi
+screenup(){
+screen -Ur up
+}
+screenaw(){
+screen -Ur aw
+}
+screencr(){
+screen -Ur cr
+}
+screencp(){
+screen -Ur cp
+}
+wgcfup(){
+wg-quick up wgcf
+ShowWGCF && WGCFmenu
+}
+wgcfdn(){
+wg-quick down wgcf
+ShowWGCF && WGCFmenu
+}
+wgcfre(){
+systemctl restart wg-quick@wgcf
+ShowWGCF && WGCFmenu
+}
+s5up(){
+warp-cli --accept-tos enable-always-on >/dev/null 2>&1
+ShowSOCKS5 && S5menu
+}
+s5dn(){
+warp-cli --accept-tos disable-always-on >/dev/null 2>&1
+ShowSOCKS5 && S5menu
+}
+
+if [[ $# > 0 ]]; then
+case $1 in
+wd ) wgcfdn 0;;
+wu ) wgcfup 0;;
+wr ) wgcfre 0;;
+5d ) s5dn 0;;
+5u ) s5up 0;;
+sup ) screenup 0;;
+saw ) screenaw 0;;
+scr ) screencr 0;;
+scp ) screencp 0;;
+h ) menu;;
+esac
+fi
diff --git a/README.md b/README.md
index 51e3ec4..57f11d7 100644
--- a/README.md
+++ b/README.md
@@ -1 +1,169 @@
-# 1-CFwarp
\ No newline at end of file
+-------------------------------------------------------------------------------------------------------------------------------
+### 已收到很多意见和建议,6月将彻底更新本项目及说明,同步油管视频教程。。。
+
+### 广告:
+
+### 甬哥博客正式上线:https://ygkkk.blogspot.com/
+
+------------------------------------------------------------------------------------------------------------------------------
+
+一键脚本:
+```
+wget -N --no-check-certificate https://gitlab.com/rwkgyg/cfwarp/raw/main/CFwarp.sh && bash CFwarp.sh
+```
+
+## CFwarp脚本更新说明:
+
+### 2022.3.24 更新 BETA 8,添加快捷键功能
+
+### 视频教程及应用简析注意点后续发布。大家自行“摸鱼”!!!以下版面很乱,后续即将重新整理
+----------------------------------------------------------------------------------------------------------------------
+
+## 支持KVM、lxc、openvz等架构VPS的WARP一键综合脚本
+
+- [x] 支持自动识别系统类型,CPU架构(X86/ARM),内核版本,虚拟化架构类型!
+- [x] 支持Ubuntu 18 /Centos 7/Debain 10 以上最新系统,包含Centos各类衍生版本!
+- [x] 支持纯IPV4,纯IPV6,双栈IPV4+IPV6三大类VPS,每类三种Wgcf-WARP安装形式,以及Socks5-WARP客户端!
+- [x] 支持主菜单实时显示当前可用IP是否解锁奈飞Netflix,可选择前台手动、前后台自动、重启自动刷支持奈飞Netflix的IP!
+- [x] 支持WARP普通账户升级:1、WARP+Teams无限流量账户,2、WARP+有限流量账户!
+- [x] 支持screen管理菜单,以方便对一键screen无限刷流量、一键screen刷奈飞IP的管理及查询相关状态!
+- [x] 支持自定义刷奈飞时间段间隔与选定奈飞国家区域
+
+### 相关视频教程及项目
+
+待更新
+
+---------------------------------------------------------------------------------------------
+
+加入无限刷WARP+流量功能(方法如下)
+
+下载好手机APP名称:1.1.1.1
+
+添加WARP+账户提示26字符:右上角设置-账户-按键-复制许可证秘钥
+
+刷WARP+流量提示36字符:右上角设置-高级-诊断-复制客户端配置ID
+
+APP显示warp+流量更新:右上角设置-高级-连接选项-重置安全密钥,再回到APP主界面即可显示最新WARP+流量数据
+
+提示400 bad request:密钥ID输入错误或者绑定设备数超过4个
+
+超过5个设备如何删减:右上角设置-账户-管理设备,点暗不要的设备
+
+有意见提ISSUES!!
+
+关注甬哥侃侃侃油管频道:https://www.youtube.com/channel/UCxukdnZiXnTFvjF5B5dvJ5w
+
+echo -e "search blue.kundencontroller.de\noptions rotate\nnameserver 2a02:180:6:5::1c\nnameserver 2a02:180:6:5::4\nnameserver 2a02:180:6:5::1e\nnameserver 2a02:180:6:5::1d" > /etc/resolv.conf
+
+# 目录
+
+* [vps的ip套上warp功能的优势及不足](#vps的ip套上warp功能的优势及不足)
+
+* [warp多功能一键脚本](#warp多功能一键脚本)
+
+* [warp多功能一键脚本各功能简析](#warp多功能一键脚本各功能简析)
+
+* [自定义ip分流配置模板说明](#自定义ip分流配置模板说明)
+
+* [相关附加说明](#相关附加说明)
+
+-----------------------------------------------------------------------------------------
+### vps的ip套上warp功能的优势及不足
+
+
+给纯IPV4/纯IPV6 VPS添加WARP的好处
+
+```bash
+1:使只有IPV4/IPV6的VPS获取访问IPV6/IPV4的能力,套上WARP的ip,变成双栈VPS!
+
+2:基本能隐藏VPS的真实IP!
+
+3:加速VPS到CloudFlare CDN节点访问速度!
+
+4:避开原VPS的IP需要谷歌验证码问题!
+
+5:原IPV4下,WARP的IPV6替代HE tunnelbroker IPV6的隧道代理方案,做IPV6 VPS跳板机代理更加稳定!
+```
+
+
+
+给IPV4+IPV6双栈VPS添加WARP的好处
+
+```bash
+1:基本能隐藏VPS的真实IP!
+
+2:WARP分配的IPV4或者IPV6的IP段,都支持奈非Netflix流媒体,无视VPS原IP限制!
+
+3:加速VPS到CloudFlare CDN节点访问速度!
+
+4:避开原VPS的IP需要谷歌验证码问题!
+```
+
+
+
+不稳定或者不足点
+
+```bash
+1:warp的IP与原生IP在Youtube上速度对比,并不一定有优势,具体看网络环境!
+
+2:warp的IP归属国家一般与原生IP一致,但可能会自动改变!
+
+3:由于warp是虚拟的IP,类似宝塔面板等相关工具可能需要另外的设置,请自行谷歌。
+```
+
+
+-------------------------------------------------------------------------------------------------------
+
+
+---------------------------------------------------------------------------------------------------
+
+### warp多功能一键脚本各功能简析
+
+待更新
+
+注意:域名解析所填写的IP必须是VPS本地IP,与WARP分配的IP没关系!
+
+------------------------------------------------------------------------------------------------------
+### 自定义ip分流配置模板说明(Socks5代理分流-待更新)
+
+分流配置文件:outbounds配置文件或者routing配置文件,让IP、域名自定义。待更新
+
+----------------------------------------------------------------------------------------------
+
+### 相关附加说明
+
+- 提示:配置文件wgcf.conf和注册文件wgcf-account.toml都已备份在/etc/wireguard目录下!
+
+- 查看WARP当前统计状态:wg
+
+- 相关WARP进程命令
+
+手动临时关闭WARP网络接口
+
+wg-quick down wgcf
+
+手动开启WARP网络接口
+
+wg-quick up wgcf
+
+启动systemctl enable wg-quick@wgcf
+
+开始systemctl start wg-quick@wgcf
+
+状态systemctl status wg-quick@wgcf
+
+重启systemctl restart wg-quick@wgcf
+
+停止systemctl stop wg-quick@wgcf
+
+关闭systemctl disable wg-quick@wgcf
+
+systemctl is-active warp-svc
+systemctl is-enabled warp-svc
+warp-cli --accept-tos status
+warp-cli --accept-tos account
+warp-cli --accept-tos settings
+
+---------------------------------------------------------------------------------------------------------
+#### 感谢P3terx,参考来源:https://github.com/P3TERX/warp.sh
+
diff --git a/WARP-CP.sh b/WARP-CP.sh
new file mode 100644
index 0000000..1d1516a
--- /dev/null
+++ b/WARP-CP.sh
@@ -0,0 +1,62 @@
+#!/bin/bash
+sleep 5
+green(){ echo -e "\033[32m\033[01m$1\033[0m";}
+yellow(){ echo -e "\033[33m\033[01m$1\033[0m";}
+
+info(){
+v4=$(curl -s4m3 https://ip.gs -k)
+v4d=$(curl -s4m3 https://ip.gs -k | awk -F '.' '{print $2"."$3}')
+}
+
+BEndpoint(){
+grep Endpoint /etc/wireguard/wgcf.conf
+if [[ -n $(grep -w 162.159.192.1 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.192.1/162.159.192.2/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 162.159.192.2 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.192.2/162.159.192.3/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 162.159.192.3 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.192.3/162.159.192.4/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 162.159.192.4 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.192.4/162.159.192.5/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 162.159.192.5 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.192.5/162.159.192.6/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 162.159.192.6 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.192.6/162.159.192.7/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 162.159.192.7 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.192.7/162.159.192.8/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 162.159.192.8 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.192.8/162.159.192.9/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 162.159.192.9 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.192.9/162.159.193.10/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 162.159.193.10 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.193.10/162.159.192.1/g" /etc/wireguard/wgcf.conf
+fi
+if [[ -n $(grep -w 162.159.193.1 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.193.1/162.159.193.2/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 162.159.193.2 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.193.2/162.159.193.3/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 162.159.193.3 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.193.3/162.159.193.4/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 162.159.193.4 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.193.4/162.159.193.5/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 162.159.193.5 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.193.5/162.159.193.6/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 162.159.193.6 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.193.6/162.159.193.7/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 162.159.193.7 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.193.7/162.159.193.8/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 162.159.193.8 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.193.8/162.159.193.9/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 162.159.193.9 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.193.9/162.159.193.1/g" /etc/wireguard/wgcf.conf
+fi
+systemctl restart wg-quick@wgcf
+}
+
+WGCFV4(){
+while true; do
+info
+[[ "$v4d" = "ipd" ]] && green "恭喜!目前wgcf-ipv4的IP为($v4),设置的IP段为ipd,下轮检测将在你设置的60秒后自动执行" && sleep 60s || (BEndpoint && yellow "遗憾!目前wgcf-ipv4的IP($v4),设置的IP段为ipd,下轮检测将在你设置的20秒后自动执行" && sleep 20s)
+done
+}
+green "开始刷wgcf-ipv4的IP,你设置的IP段为ipd" && WGCFV4
diff --git a/WARP-CR.sh b/WARP-CR.sh
new file mode 100644
index 0000000..415d37b
--- /dev/null
+++ b/WARP-CR.sh
@@ -0,0 +1,165 @@
+#!/usr/bin/env bash
+sleep 5
+green(){ echo -e "\033[32m\033[01m$1\033[0m";}
+yellow(){ echo -e "\033[33m\033[01m$1\033[0m";}
+
+info1(){
+UA_Browser="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.87 Safari/537.36"
+v6=$(curl -s6m3 https://ip.gs -k)
+v4=$(curl -s4m3 https://ip.gs -k)
+AE="阿联酋(United Arab Emirates)";AU="澳大利亚(Australia)";BG="保加利亚(Bulgaria)";BR="巴西(Brazil)";CA="加拿大(Canada)";CH="瑞士(Switzerland)";CL="智利(Chile)";CN="中国(China)";CO="哥伦比亚(Colombia)";DE="德国(Germany)";ES="西班牙(Spain)";FI="芬兰(Finland)";FR="法国(France)";GB="英国(United Kingdom)";HK="香港(Hong Kong)";ID="印度尼西亚(Indonesia)";IE="爱尔兰(Ireland)";IL="以色列(Israel)";IN="印度(India)";IT="意大利(Italy)";JP="日本(Japan)";KR="韩国(South Korea)";LU="卢森堡(Luxembourg)";MX="墨西哥(Mexico)";MY="马来西亚(Malaysia)";NL="荷兰(Netherlands)";NZ="新西兰(New Zealand)";PH="菲律宾(Philippines)";RO="罗马尼亚(Romania)";RU="俄罗斯(Russian)";SA="沙特(Saudi Arabia)";SE="瑞典(Sweden)";SG="新加坡(Singapore)";TW="台湾(Taiwan)";US="美国(United States)";VN="越南(Vietnam)";ZA="南非(South Africa)"
+if [[ -n $v4 ]]; then
+wgcfv4=$(curl -s4 https://www.cloudflare.com/cdn-cgi/trace -k | grep warp | cut -d= -f2)
+eg4=$(curl -s --user-agent "${UA_Browser}" https://api.ip.sb/geoip/$v4 -k | awk -F "country_code" '{print $2}' | awk -F "region_code" '{print $1}' | sed "s/[,\":}]//g")
+g4=$(eval echo \$$eg4)
+fi
+if [[ -n $v6 ]]; then
+wgcfv6=$(curl -s6 https://www.cloudflare.com/cdn-cgi/trace -k | grep warp | cut -d= -f2)
+eg6=$(curl -s --user-agent "${UA_Browser}" https://api.ip.sb/geoip/$v6 -k | awk -F "country_code" '{print $2}' | awk -F "region_code" '{print $1}' | sed "s/[,\":}]//g")
+g6=$(eval echo \$$eg6)
+fi
+mport=`warp-cli --accept-tos settings 2>/dev/null | grep 'WarpProxy on port' | awk -F "port " '{print $2}'`
+s5ip=`curl -sx socks5h://localhost:$mport ip.gs -k`
+egj=$(curl -s --user-agent "${UA_Browser}" https://api.ip.sb/geoip/$S5ip -k | awk -F "country_code" '{print $2}' | awk -F "region_code" '{print $1}' | sed "s/[,\":}]//g")
+s5gj=$(eval echo \$$egj)
+}
+s5c(){
+warp-cli --accept-tos register >/dev/null 2>&1 && sleep 2
+if [[ -e /etc/wireguard/ID ]]; then
+warp-cli --accept-tos set-license $(cat /etc/wireguard/ID) >/dev/null 2>&1
+fi
+}
+
+BEndpoint(){
+grep Endpoint /etc/wireguard/wgcf.conf
+if [[ -n $(grep -w 2606:4700:d0::a29f:c001 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/2606:4700:d0::a29f:c001/2606:4700:d0::a29f:c002/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 2606:4700:d0::a29f:c002 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/2606:4700:d0::a29f:c002/2606:4700:d0::a29f:c003/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 2606:4700:d0::a29f:c003 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/2606:4700:d0::a29f:c003/2606:4700:d0::a29f:c004/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 2606:4700:d0::a29f:c004 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/2606:4700:d0::a29f:c004/2606:4700:d0::a29f:c005/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 2606:4700:d0::a29f:c005 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/2606:4700:d0::a29f:c005/2606:4700:d0::a29f:c006/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 2606:4700:d0::a29f:c006 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/2606:4700:d0::a29f:c006/2606:4700:d0::a29f:c007/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 2606:4700:d0::a29f:c007 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/2606:4700:d0::a29f:c007/2606:4700:d0::a29f:c008/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 2606:4700:d0::a29f:c008 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/2606:4700:d0::a29f:c008/2606:4700:d0::a29f:c009/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 2606:4700:d0::a29f:c009 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/2606:4700:d0::a29f:c009/2606:4700:d0::a29f:c001/g" /etc/wireguard/wgcf.conf
+fi
+if [[ -n $(grep -w 2606:4700:d0::a29f:c101 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/2606:4700:d0::a29f:c101/2606:4700:d0::a29f:c102/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 2606:4700:d0::a29f:c102 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/2606:4700:d0::a29f:c102/2606:4700:d0::a29f:c103/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 2606:4700:d0::a29f:c103 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/2606:4700:d0::a29f:c103/2606:4700:d0::a29f:c104/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 2606:4700:d0::a29f:c104 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/2606:4700:d0::a29f:c104/2606:4700:d0::a29f:c105/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 2606:4700:d0::a29f:c105 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/2606:4700:d0::a29f:c105/2606:4700:d0::a29f:c106/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 2606:4700:d0::a29f:c106 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/2606:4700:d0::a29f:c106/2606:4700:d0::a29f:c107/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 2606:4700:d0::a29f:c107 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/2606:4700:d0::a29f:c107/2606:4700:d0::a29f:c108/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 2606:4700:d0::a29f:c108 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/2606:4700:d0::a29f:c108/2606:4700:d0::a29f:c109/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 2606:4700:d0::a29f:c109 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/2606:4700:d0::a29f:c109/2606:4700:d0::a29f:c101/g" /etc/wireguard/wgcf.conf
+fi
+if [[ -n $(grep -w 162.159.192.1 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.192.1/162.159.192.2/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 162.159.192.2 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.192.2/162.159.192.3/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 162.159.192.3 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.192.3/162.159.192.4/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 162.159.192.4 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.192.4/162.159.192.5/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 162.159.192.5 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.192.5/162.159.192.6/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 162.159.192.6 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.192.6/162.159.192.7/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 162.159.192.7 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.192.7/162.159.192.8/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 162.159.192.8 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.192.8/162.159.192.9/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 162.159.192.9 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.192.9/162.159.193.10/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 162.159.193.10 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.193.10/162.159.192.1/g" /etc/wireguard/wgcf.conf
+fi
+if [[ -n $(grep -w 162.159.193.1 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.193.1/162.159.193.2/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 162.159.193.2 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.193.2/162.159.193.3/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 162.159.193.3 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.193.3/162.159.193.4/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 162.159.193.4 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.193.4/162.159.193.5/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 162.159.193.5 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.193.5/162.159.193.6/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 162.159.193.6 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.193.6/162.159.193.7/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 162.159.193.7 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.193.7/162.159.193.8/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 162.159.193.8 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.193.8/162.159.193.9/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 162.159.193.9 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.193.9/162.159.193.1/g" /etc/wireguard/wgcf.conf
+fi
+systemctl restart wg-quick@wgcf
+}
+
+info1
+WGCFV4(){
+while true; do
+info1
+[[ "$eg4" = "dd4" ]] && green "恭喜!目前wgcf-ipv4的IP为($v4),WARP默认地区为$g4,设置的地区为$(eval echo \$dd4),下轮检测将在你设置的60秒后自动执行" && sleep 60s || (BEndpoint && yellow "遗憾!目前wgcf-ipv4的IP($v4),WARP默认地区为$g4,设置的地区为$(eval echo \$dd4) ,下轮检测将在你设置的30秒后自动执行" && sleep 30s)
+done
+}
+WGCFV6(){
+while true; do
+info1
+[[ "$eg6" = "dd6" ]] && green "恭喜!目前wgcf-ipv6的IP为($v6),WARP默认地区为$g6,设置的地区为$(eval echo \$dd6),下轮检测将在你设置的60秒后自动执行" && sleep 60s || (BEndpoint && yellow "遗憾!目前wgcf-ipv6的IP($v6),WARP默认地区为$g6,设置的地区为$(eval echo \$dd6) ,下轮检测将在你设置的30秒后自动执行" && sleep 30s)
+done
+}
+SOCKS5warp(){
+while true; do
+info1
+[[ "$egj" = "ddj" ]] && green "恭喜!目前socks5的IP为($s5ip),WARP默认地区为$s5gj ,设置的地区为$(eval echo \$ddj),下轮检测将在你设置的60秒后自动执行" && sleep 60s || (s5c && yellow "遗憾!目前socks5的IP($s5ip),WARP默认地区为$s5gj,设置的地区为$(eval echo \$ddj) ,下轮检测将在你设置的30秒后自动执行" && sleep 30s)
+done
+}
+SOCKS5wgcf4(){
+while true; do
+info1
+[[ "$egj" = "ddj" ]] && green "恭喜!目前socks5的IP为($s5ip),WARP默认地区为$s5gj,设置的地区为$(eval echo \$ddj),下轮检测将在你设置的60秒后自动执行" && sleep 60s || (s5c && yellow "遗憾!目前socks5的IP($s5ip),WARP默认地区为$s5gj,设置的地区为$(eval echo \$ddj) ,下轮检测将在你设置的30秒后自动执行" && sleep 30s)
+[[ "$eg4" = "dd4" ]] && green "恭喜!目前wgcf-ipv4的IP为($v4),WARP默认地区为$g4,设置的地区为$(eval echo \$dd4),下轮检测将在你设置的60秒后自动执行" && sleep 60s || (BEndpoint && yellow "遗憾!目前wgcf-ipv4的IP($v4),WARP默认地区为$g4,设置的地区为$(eval echo \$dd4) ,下轮检测将在你设置的30秒后自动执行" && sleep 30s)
+done
+}
+SOCKS5wgcf6(){
+while true; do
+info1
+[[ "$egj" = "ddj" ]] && green "恭喜!目前socks5的IP为($s5ip),WARP默认地区为$s5gj,设置的地区为$(eval echo \$ddj),下轮检测将在你设置的60秒后自动执行" && sleep 60s || (s5c && yellow "遗憾!目前socks5的IP($s5ip),WARP默认地区为$s5gj,设置的地区为$(eval echo \$ddj) ,下轮检测将在你设置的30秒后自动执行" && sleep 30s)
+[[ "$eg6" = "dd6" ]] && green "恭喜!目前wgcf-ipv6的IP为($v6),WARP默认地区为$g6,设置的地区为$(eval echo \$dd6),下轮检测将在你设置的60秒后自动执行" && sleep 60s || (BEndpoint && yellow "遗憾!目前wgcf-ipv6的IP($v6),WARP默认地区为$g6,设置的地区为$(eval echo \$dd6) ,下轮检测将在你设置的30秒后自动执行" && sleep 30s)
+done
+}
+WGCFV4V6(){
+while true; do
+info1
+[[ "$eg4" = "dd4" ]] && green "恭喜!目前wgcf-ipv4的IP为($v4),WARP默认地区为$g4,设置的地区为$(eval echo \$dd4),下轮检测将在你设置的60秒后自动执行" && sleep 60s || (BEndpoint && yellow "遗憾!目前wgcf-ipv4的IP($v4),WARP默认地区为$g4,设置的地区为$(eval echo \$dd4) ,下轮检测将在你设置的30秒后自动执行" && sleep 30s)
+[[ "$eg6" = "dd6" ]] && green "恭喜!目前wgcf-ipv6的IP为($v6),WARP默认地区为$g6,设置的地区为$(eval echo \$dd6),下轮检测将在你设置的60秒后自动执行" && sleep 60s || (BEndpoint && yellow "遗憾!目前wgcf-ipv6的IP($v6),WARP默认地区为$g6,设置的地区为$(eval echo \$dd6) ,下轮检测将在你设置的30秒后自动执行" && sleep 30s)
+done
+}
+[[ $(warp-cli --accept-tos status 2>/dev/null ) =~ 'Connected' && $wgcfv6 =~ on|plus ]] && green "双栈WARP循环执行:刷socks5与wgcf-ipv6的IP" && SOCKS5wgcf6
+[[ $(warp-cli --accept-tos status 2>/dev/null ) =~ 'Connected' && $wgcfv4 =~ on|plus ]] && green "双栈WARP循环执行:刷socks5与wgcf-ipv4的IP" && SOCKS5wgcf4
+if [[ $(warp-cli --accept-tos status 2>/dev/null ) =~ 'Connected' ]]; then
+[[ ! $wgcfv6 =~ on|plus && ! $wgcfv4 =~ on|plus ]] && green "单栈WARP循环执行:刷socks5的IP" && SOCKS5warp
+fi
+[[ $wgcfv6 =~ on|plus && $wgcfv4 =~ on|plus ]] && green "双栈WARP单v4循环执行:仅刷wgcf-ipv4的IP" && WGCFV4
+[[ $wgcfv6 = off && $wgcfv4 =~ on|plus ]] && green "单栈WARP循环执行:刷wgcf-ipv4的IP" && WGCFV4
+[[ $wgcfv6 =~ on|plus && $wgcfv4 = off ]] && green "单栈WARP循环执行:刷wgcf-ipv6的IP" && WGCFV6
+[[ -z $wgcfv6 && $wgcfv4 =~ on|plus ]] && green "单栈WARP循环执行:刷wgcf-ipv4的IP" && WGCFV4
+[[ $wgcfv6 =~ on|plus && -z $wgcfv4 ]] && green "单栈WARP循环执行:刷wgcf-ipv6的IP" && WGCFV6
diff --git a/check.sh b/check.sh
new file mode 100644
index 0000000..6c23558
--- /dev/null
+++ b/check.sh
@@ -0,0 +1,177 @@
+#!/usr/bin/env bash
+sleep 5
+green(){ echo -e "\033[32m\033[01m$1\033[0m";}
+yellow(){ echo -e "\033[33m\033[01m$1\033[0m";}
+
+info(){
+v6=$(curl -s6m3 https://ip.gs -k)
+v4=$(curl -s4m3 https://ip.gs -k)
+UA_Browser="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.87 Safari/537.36"
+if [[ -n $v6 ]]; then
+wgcfv6=$(curl -s6 https://www.cloudflare.com/cdn-cgi/trace -k | grep warp | cut -d= -f2)
+result6=$(curl -6 --user-agent "${UA_Browser}" -fsL --write-out %{http_code} --output /dev/null --max-time 10 "https://www.netflix.com/title/81215567" 2>&1)
+[[ "$result6" == "404" ]] && NF6="遗憾哦,当前IP仅解锁奈飞Netflix自制剧..."
+[[ "$result6" == "403" ]] && NF6="死心了,当前IP不支持解锁奈飞Netflix....."
+[[ "$result6" == "000" ]] && NF6="检测到网络有问题,再次进入脚本可能就好了.."
+[[ "$result6" == "200" ]] && NF6="恭喜呀,当前IP可解锁奈飞Netflix流媒体..."
+fi
+if [[ -n $v4 ]]; then
+wgcfv4=$(curl -s4 https://www.cloudflare.com/cdn-cgi/trace -k | grep warp | cut -d= -f2)
+result4=$(curl -4 --user-agent "${UA_Browser}" -fsL --write-out %{http_code} --output /dev/null --max-time 10 "https://www.netflix.com/title/81215567" 2>&1)
+[[ "$result4" == "404" ]] && NF4="遗憾哦,当前IP仅解锁奈飞Netflix自制剧..."
+[[ "$result4" == "403" ]] && NF4="死心了,当前IP不支持解锁奈飞Netflix....."
+[[ "$result4" == "000" ]] && NF4="检测到网络有问题,再次进入脚本可能就好了.."
+[[ "$result4" == "200" ]] && NF4="恭喜呀,当前IP可解锁奈飞Netflix流媒体..."
+fi
+mport=`warp-cli --accept-tos settings 2>/dev/null | grep 'WarpProxy on port' | awk -F "port " '{print $2}'`
+result=$(curl -sx socks5h://localhost:$mport -fsL --write-out %{http_code} --output /dev/null --max-time 10 "https://www.netflix.com/title/81215567" 2>&1)
+[[ "$result" == "404" ]] && NF="遗憾哦,当前IP仅解锁奈飞Netflix自制剧..."
+[[ "$result" == "403" ]] && NF="死心了,当前IP不支持解锁奈飞Netflix....."
+[[ "$result" == "000" ]] && NF="检测到网络有问题,再次进入脚本可能就好了.."
+[[ "$result" == "200" ]] && NF="恭喜呀,当前IP可解锁奈飞Netflix流媒体..."
+s5ip=`curl -sx socks5h://localhost:$mport ip.gs -k`
+AE="阿联酋(United Arab Emirates)";AU="澳大利亚(Australia)";BG="保加利亚(Bulgaria)";BR="巴西(Brazil)";CA="加拿大(Canada)";CH="瑞士(Switzerland)";CL="智利(Chile)";CN="中国(China)";CO="哥伦比亚(Colombia)";DE="德国(Germany)";ES="西班牙(Spain)";FI="芬兰(Finland)";FR="法国(France)";GB="英国(United Kingdom)";HK="香港(Hong Kong)";ID="印度尼西亚(Indonesia)";IE="爱尔兰(Ireland)";IL="以色列(Israel)";IN="印度(India)";IT="意大利(Italy)";JP="日本(Japan)";KR="韩国(South Korea)";LU="卢森堡(Luxembourg)";MX="墨西哥(Mexico)";MY="马来西亚(Malaysia)";NL="荷兰(Netherlands)";NZ="新西兰(New Zealand)";PH="菲律宾(Philippines)";RO="罗马尼亚(Romania)";RU="俄罗斯(Russian)";SA="沙特(Saudi Arabia)";SE="瑞典(Sweden)";SG="新加坡(Singapore)";TW="台湾(Taiwan)";US="美国(United States)";VN="越南(Vietnam)";ZA="南非(South Africa)"
+region=`tr [:lower:] [:upper:] <<< $(curl --user-agent "${UA_Browser}" -fs --max-time 10 --write-out %{redirect_url} --output /dev/null "https://www.netflix.com/title/80018499" | cut -d '/' -f4 | cut -d '-' -f1)`
+[[ ! "$region" ]] && region="US"
+}
+
+s5c(){
+warp-cli --accept-tos register >/dev/null 2>&1 && sleep 2
+if [[ -e /etc/wireguard/ID ]]; then
+warp-cli --accept-tos set-license $(cat /etc/wireguard/ID) >/dev/null 2>&1
+fi
+}
+
+BEndpoint(){
+grep Endpoint /etc/wireguard/wgcf.conf
+if [[ -n $(grep -w 2606:4700:d0::a29f:c001 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/2606:4700:d0::a29f:c001/2606:4700:d0::a29f:c002/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 2606:4700:d0::a29f:c002 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/2606:4700:d0::a29f:c002/2606:4700:d0::a29f:c003/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 2606:4700:d0::a29f:c003 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/2606:4700:d0::a29f:c003/2606:4700:d0::a29f:c004/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 2606:4700:d0::a29f:c004 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/2606:4700:d0::a29f:c004/2606:4700:d0::a29f:c005/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 2606:4700:d0::a29f:c005 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/2606:4700:d0::a29f:c005/2606:4700:d0::a29f:c006/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 2606:4700:d0::a29f:c006 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/2606:4700:d0::a29f:c006/2606:4700:d0::a29f:c007/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 2606:4700:d0::a29f:c007 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/2606:4700:d0::a29f:c007/2606:4700:d0::a29f:c008/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 2606:4700:d0::a29f:c008 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/2606:4700:d0::a29f:c008/2606:4700:d0::a29f:c009/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 2606:4700:d0::a29f:c009 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/2606:4700:d0::a29f:c009/2606:4700:d0::a29f:c001/g" /etc/wireguard/wgcf.conf
+fi
+if [[ -n $(grep -w 2606:4700:d0::a29f:c101 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/2606:4700:d0::a29f:c101/2606:4700:d0::a29f:c102/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 2606:4700:d0::a29f:c102 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/2606:4700:d0::a29f:c102/2606:4700:d0::a29f:c103/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 2606:4700:d0::a29f:c103 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/2606:4700:d0::a29f:c103/2606:4700:d0::a29f:c104/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 2606:4700:d0::a29f:c104 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/2606:4700:d0::a29f:c104/2606:4700:d0::a29f:c105/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 2606:4700:d0::a29f:c105 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/2606:4700:d0::a29f:c105/2606:4700:d0::a29f:c106/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 2606:4700:d0::a29f:c106 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/2606:4700:d0::a29f:c106/2606:4700:d0::a29f:c107/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 2606:4700:d0::a29f:c107 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/2606:4700:d0::a29f:c107/2606:4700:d0::a29f:c108/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 2606:4700:d0::a29f:c108 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/2606:4700:d0::a29f:c108/2606:4700:d0::a29f:c109/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 2606:4700:d0::a29f:c109 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/2606:4700:d0::a29f:c109/2606:4700:d0::a29f:c101/g" /etc/wireguard/wgcf.conf
+fi
+if [[ -n $(grep -w 162.159.192.1 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.192.1/162.159.192.2/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 162.159.192.2 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.192.2/162.159.192.3/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 162.159.192.3 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.192.3/162.159.192.4/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 162.159.192.4 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.192.4/162.159.192.5/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 162.159.192.5 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.192.5/162.159.192.6/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 162.159.192.6 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.192.6/162.159.192.7/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 162.159.192.7 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.192.7/162.159.192.8/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 162.159.192.8 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.192.8/162.159.192.9/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 162.159.192.9 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.192.9/162.159.193.10/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 162.159.193.10 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.193.10/162.159.192.1/g" /etc/wireguard/wgcf.conf
+fi
+if [[ -n $(grep -w 162.159.193.1 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.193.1/162.159.193.2/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 162.159.193.2 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.193.2/162.159.193.3/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 162.159.193.3 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.193.3/162.159.193.4/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 162.159.193.4 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.193.4/162.159.193.5/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 162.159.193.5 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.193.5/162.159.193.6/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 162.159.193.6 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.193.6/162.159.193.7/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 162.159.193.7 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.193.7/162.159.193.8/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 162.159.193.8 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.193.8/162.159.193.9/g" /etc/wireguard/wgcf.conf
+elif [[ -n $(grep -w 162.159.193.9 /etc/wireguard/wgcf.conf) ]]; then
+sed -i "s/162.159.193.9/162.159.193.1/g" /etc/wireguard/wgcf.conf
+fi
+systemctl restart wg-quick@wgcf
+}
+
+info
+WGCFV4(){
+while true; do
+info
+[[ "$result4" == "200" && "$region" = "dd" ]] && green "目前wgcf-ipv4的IP($v4)支持奈飞,WARP默认地区为$(eval echo \$$region) ,设置的地区为$(eval echo \$dd) ,下轮检测将在你设置的45秒后自动执行" && sleep 45s || (BEndpoint && yellow "目前wgcf-ipv4的IP($v4) $NF4,WARP默认地区为$(eval echo \$$region) ,设置的地区为$(eval echo \$dd) ,下轮检测将在你设置的30秒后自动执行" && sleep 30s)
+done
+}
+WGCFV6(){
+while true; do
+info
+[[ "$result6" == "200" && "$region" = "dd" ]] && green "目前wgcf-ipv6的IP($v6)支持奈飞,WARP默认地区为$(eval echo \$$region) ,设置的地区为$(eval echo \$dd) ,下轮检测将在你设置的45秒后自动执行" && sleep 45s || (BEndpoint && yellow "目前wgcf-ipv6的IP($v6) $NF6,WARP默认地区为$(eval echo \$$region) ,设置的地区为$(eval echo \$dd) ,下轮检测将在你设置的30秒后自动执行" && sleep 30s)
+done
+}
+SOCKS5warp(){
+while true; do
+info
+[[ "$result" == "200" && "$region" = "dd" ]] && green "目前socks5的IP($s5ip)支持奈飞,WARP默认地区为$(eval echo \$$region) ,设置的地区为$(eval echo \$dd) ,下轮检测将在你设置的45秒后自动执行" && sleep 45s || (s5c && yellow "目前socks5的IP($s5ip) $NF,WARP默认地区为$(eval echo \$$region) ,设置的地区为$(eval echo \$dd) ,下轮检测将在你设置的30秒后自动执行" && sleep 30s)
+done
+}
+SOCKS5wgcf4(){
+while true; do
+info
+[[ "$result" == "200" && "$region" = "dd" ]] && green "目前socks5的IP($s5ip)支持奈飞,WARP默认地区为$(eval echo \$$region) ,设置的地区为$(eval echo \$dd) ,下轮检测将在你设置的45秒后自动执行" && sleep 45s || (s5c && yellow "目前socks5的IP($s5ip) $NF,WARP默认地区为$(eval echo \$$region) ,设置的地区为$(eval echo \$dd) ,下轮检测将在你设置的30秒后自动执行" && sleep 30s)
+[[ "$result4" == "200" && "$region" = "dd" ]] && green "目前wgcf-ipv4的IP($v4)支持奈飞,WARP默认地区为$(eval echo \$$region) ,设置的地区为$(eval echo \$dd) ,下轮检测将在你设置的45秒后自动执行" && sleep 45s || (BEndpoint && yellow "目前wgcf-ipv4的IP($v4) $NF4,WARP默认地区为$(eval echo \$$region) ,设置的地区为$(eval echo \$dd) ,下轮检测将在你设置的30秒后自动执行" && sleep 30s)
+done
+}
+SOCKS5wgcf6(){
+while true; do
+info
+[[ "$result" == "200" && "$region" = "dd" ]] && green "目前socks5的IP($s5ip)支持奈飞,WARP默认地区为$(eval echo \$$region) ,设置的地区为$(eval echo \$dd) ,下轮检测将在你设置的45秒后自动执行" && sleep 45s || (s5c && yellow "目前socks5的IP($s5ip) $NF,WARP默认地区为$(eval echo \$$region) ,设置的地区为$(eval echo \$dd) ,下轮检测将在你设置的30秒后自动执行" && sleep 30s)
+[[ "$result6" == "200" && "$region" = "dd" ]] && green "目前wgcf-ipv6的IP($v6)支持奈飞,WARP默认地区为$(eval echo \$$region) ,设置的地区为$(eval echo \$dd) ,下轮检测将在你设置的45秒后自动执行" && sleep 45s || (BEndpoint && yellow "目前wgcf-ipv6的IP($v6) $NF6,WARP默认地区为$(eval echo \$$region) ,设置的地区为$(eval echo \$dd) ,下轮检测将在你设置的30秒后自动执行" && sleep 30s)
+done
+}
+WGCFV4V6(){
+while true; do
+info
+[[ "$result4" == "200" && "$region" = "dd" ]] && green "目前wgcf-ipv4的IP($v4)支持奈飞,WARP默认地区为$(eval echo \$$region) ,设置的地区为$(eval echo \$dd) ,下轮检测将在你设置的45秒后自动执行" && sleep 45s || (BEndpoint && yellow "目前wgcf-ipv4的IP($v4) $NF4,WARP默认地区为$(eval echo \$$region) ,设置的地区为$(eval echo \$dd) ,下轮检测将在你设置的30秒后自动执行" && sleep 30s)
+[[ "$result6" == "200" && "$region" = "dd" ]] && green "目前wgcf-ipv6的IP($v6)支持奈飞,WARP默认地区为$(eval echo \$$region) ,设置的地区为$(eval echo \$dd) ,下轮检测将在你设置的45秒后自动执行" && sleep 45s || (BEndpoint && yellow "目前wgcf-ipv6的IP($v6) $NF6,WARP默认地区为$(eval echo \$$region) ,设置的地区为$(eval echo \$dd) ,下轮检测将在你设置的30秒后自动执行" && sleep 30s)
+done
+}
+[[ $(warp-cli --accept-tos status 2>/dev/null ) =~ 'Connected' && $wgcfv6 =~ on|plus ]] && green "双栈WARP循环执行:刷socks5与wgcf-ipv6的IP" && SOCKS5wgcf6
+[[ $(warp-cli --accept-tos status 2>/dev/null ) =~ 'Connected' && $wgcfv4 =~ on|plus ]] && green "双栈WARP循环执行:刷socks5与wgcf-ipv4的IP" && SOCKS5wgcf4
+if [[ $(warp-cli --accept-tos status 2>/dev/null ) =~ 'Connected' ]]; then
+[[ ! $wgcfv6 =~ on|plus && ! $wgcfv4 =~ on|plus ]] && green "单栈WARP循环执行:刷socks5的IP" && SOCKS5warp
+fi
+[[ $wgcfv6 =~ on|plus && $wgcfv4 =~ on|plus ]] && green "双栈WARP单v4循环执行:仅刷wgcf-ipv4的IP" && WGCFV4
+[[ $wgcfv6 = off && $wgcfv4 =~ on|plus ]] && green "单栈WARP循环执行:刷wgcf-ipv4的IP" && WGCFV4
+[[ $wgcfv6 =~ on|plus && $wgcfv4 = off ]] && green "单栈WARP循环执行:刷wgcf-ipv6的IP" && WGCFV6
+[[ -z $wgcfv6 && $wgcfv4 =~ on|plus ]] && green "单栈WARP循环执行:刷wgcf-ipv4的IP" && WGCFV4
+[[ $wgcfv6 =~ on|plus && -z $wgcfv4 ]] && green "单栈WARP循环执行:刷wgcf-ipv6的IP" && WGCFV6
diff --git a/socks5.py b/socks5.py
new file mode 100644
index 0000000..8482314
--- /dev/null
+++ b/socks5.py
@@ -0,0 +1,558 @@
+#!/usr/bin/env python3
+
+import argparse
+import logging
+import os
+import platform
+import signal
+import struct
+import sys
+import threading
+from socket import AF_INET, SOCK_STREAM, socket
+from socketserver import BaseServer, StreamRequestHandler, ThreadingTCPServer
+
+__author__ = 'Youchao Feng'
+support_os = ('Darwin', 'Linux')
+current_os = platform.system()
+
+
+def byte_to_int(b):
+ """
+ Convert Unsigned byte to int
+ :param b: byte value
+ :return: int value
+ """
+ return b & 0xFF
+
+
+def port_from_byte(b1, b2):
+ """
+ :param b1: First byte of port
+ :param b2: Second byte of port
+ :return: Port in Int
+ """
+ return byte_to_int(b1) << 8 | byte_to_int(b2)
+
+
+def host_from_ip(a, b, c, d):
+ a = byte_to_int(a)
+ b = byte_to_int(b)
+ c = byte_to_int(c)
+ d = byte_to_int(d)
+ return "%d.%d.%d.%d" % (a, b, c, d)
+
+
+def get_command_name(value):
+ """
+ Gets command name by value
+ :param value: value of Command
+ :return: Command Name
+ """
+ if value == 1:
+ return 'CONNECT'
+ elif value == 2:
+ return 'BIND'
+ elif value == 3:
+ return 'UDP_ASSOCIATE'
+ else:
+ return None
+
+
+def build_command_response(reply):
+ start = b'\x05%s\x00\x01\x00\x00\x00\x00\x00\x00'
+ return start % reply.get_byte_string()
+
+
+def close_session(session):
+ session.get_client_socket().close()
+ logging.info("Session[%s] closed", session.get_id())
+
+
+def run_daemon_process(stdout='/dev/null',
+ stderr=None,
+ stdin='/dev/null',
+ pid_file=None,
+ start_msg='started with pid %s'):
+ """
+ This forks the current process into a daemon.
+ The stdin, stdout, and stderr arguments are file names that
+ will be opened and be used to replace the standard file descriptors
+ in sys.stdin, sys.stdout, and sys.stderr.
+ These arguments are optional and default to /dev/null.
+ Note that stderr is opened unbuffered, so
+ if it shares a file with stdout then interleaved output
+ may not appear in the order that you expect.
+ """
+ # flush io
+ sys.stdout.flush()
+ sys.stderr.flush()
+ # Do first fork.
+ try:
+ if os.fork() > 0:
+ sys.exit(0) # Exit first parent.
+ except OSError as e:
+ sys.stderr.write("fork #1 failed: (%d) %s\n" % (e.errno, e.strerror))
+ sys.exit(1)
+ # Decouple from parent environment.
+ os.chdir("/")
+ os.umask(0)
+ os.setsid()
+ # Do second fork.
+ try:
+ if os.fork() > 0:
+ sys.exit(0) # Exit second parent.
+ except OSError as e:
+ sys.stderr.write("fork #2 failed: (%d) %s\n" % (e.errno, e.strerror))
+ sys.exit(1)
+ # Open file descriptors and print start message
+ if not stderr:
+ stderr = stdout
+ si = open(stdin, 'r')
+ so = open(stdout, 'a+')
+ se = open(stderr, 'ba+', 0) # unbuffered
+ pid = str(os.getpid())
+ sys.stderr.write(start_msg % pid)
+ sys.stderr.flush()
+ if pid_file:
+ open(pid_file, 'w+').write("%s\n" % pid)
+ # Redirect standard file descriptors.
+ os.dup2(si.fileno(), sys.stdin.fileno())
+ os.dup2(so.fileno(), sys.stdout.fileno())
+ os.dup2(se.fileno(), sys.stderr.fileno())
+
+
+class Session:
+ index = 0
+
+ def __init__(self, client_socket):
+ Session.index += 1
+ self.__id = Session.index
+ self.__client_socket = client_socket
+ self._attr = {}
+
+ def get_id(self):
+ return self.__id
+
+ def set_attr(self, key, value):
+ self._attr[key] = value
+
+ def get_client_socket(self):
+ return self.__client_socket
+
+
+class AddressType:
+ IPV4 = 1
+ DOMAIN_NAME = 3
+ IPV6 = 4
+
+
+class SocksCommand:
+ CONNECT = 1
+ BIND = 2
+ UDP_ASSOCIATE = 3
+
+
+class SocksMethod:
+ NO_AUTHENTICATION_REQUIRED = 0
+ GSS_API = 1
+ USERNAME_PASSWORD = 2
+
+
+class ServerReply:
+ def __init__(self, value):
+ self.__value = value
+
+ def get_byte_string(self):
+ if self.__value == 0:
+ return b'\x00'
+ elif self.__value == 1:
+ return b'\x01'
+ elif self.__value == 2:
+ return b'\x02'
+ elif self.__value == 3:
+ return b'\x03'
+ elif self.__value == 4:
+ return b'\x04'
+ elif self.__value == 5:
+ return b'\x05'
+ elif self.__value == 6:
+ return b'\x06'
+ elif self.__value == 7:
+ return b'\x07'
+ elif self.__value == 8:
+ return b'\x08'
+
+ def get_value(self):
+ return self.__value
+
+
+class ReplyType:
+ SUCCEEDED = ServerReply(0)
+ GENERAL_SOCKS_SERVER_FAILURE = ServerReply(1)
+ CONNECTION_NOT_ALLOWED_BY_RULESET = ServerReply(2)
+ NETWORK_UNREACHABLE = ServerReply(3)
+ HOST_UNREACHABLE = ServerReply(4)
+ CONNECTION_REFUSED = ServerReply(5)
+ TTL_EXPIRED = ServerReply(6)
+ COMMAND_NOT_SUPPORTED = ServerReply(7)
+ ADDRESS_TYPE_NOT_SUPPORTED = ServerReply(8)
+
+
+class SocketPipe:
+ BUFFER_SIZE = 1024 * 1024
+
+ def __init__(self, socket1, socket2):
+ self._socket1 = socket1
+ self._socket2 = socket2
+ self.__running = False
+
+ self.t1 = threading.Thread(target=self.__transfer, args=(self._socket1, self._socket2))
+ self.t2 = threading.Thread(target=self.__transfer, args=(self._socket2, self._socket1))
+
+ def __transfer(self, socket1, socket2):
+ while self.__running:
+ try:
+ data = socket1.recv(self.BUFFER_SIZE)
+ if len(data) > 0:
+ socket2.sendall(data)
+ else:
+ break
+ except IOError:
+ self.stop()
+ self.stop()
+
+ def start(self):
+ self.__running = True
+
+ self.t1.start()
+ self.t2.start()
+
+ def stop(self):
+ self._socket1.close()
+ self._socket2.close()
+ self.__running = False
+
+ def is_running(self):
+ return self.__running
+
+
+class CommandExecutor:
+ def __init__(self, remote_server_host, remote_server_port, session):
+ self.__proxy_socket = socket(AF_INET, SOCK_STREAM)
+ self.__remote_server_host = remote_server_host
+ self.__remote_server_port = remote_server_port
+ self.__client = session.get_client_socket()
+ self.__session = session
+
+ def do_connect(self):
+ """
+ Do SOCKS CONNECT method
+ :return: None
+ """
+ address = self.__get_address()
+ logging.info("Connect request to %s", address)
+ result = self.__proxy_socket.connect_ex(address)
+ if result == 0:
+ self.__client.send(build_command_response(ReplyType.SUCCEEDED))
+ socket_pipe = SocketPipe(self.__client, self.__proxy_socket)
+ socket_pipe.start()
+ while socket_pipe.is_running():
+ pass
+ elif result == 60:
+ self.__client.send(build_command_response(ReplyType.TTL_EXPIRED))
+ elif result == 61:
+ self.__client.send(build_command_response(ReplyType.NETWORK_UNREACHABLE))
+ else:
+ logging.error('Connection Error:[%s] is unknown', result)
+ self.__client.send(build_command_response(ReplyType.NETWORK_UNREACHABLE))
+
+ def do_bind(self):
+ pass
+
+ def do_udp_associate(self):
+ pass
+
+ def __get_address(self):
+ return self.__remote_server_host, self.__remote_server_port
+
+
+class User:
+ def __init__(self, username, password):
+ self.__username = username
+ self.__password = password
+
+ def get_username(self):
+ return self.__username
+
+ def get_password(self):
+ return self.__password
+
+ def __repr__(self):
+ return '' % (self.get_username(), self.__password)
+
+
+class UserManager:
+ def __init__(self):
+ self.__users = {}
+
+ def add_user(self, user):
+ self.__users[user.get_username()] = user
+
+ def remove_user(self, username):
+ if username in self.__users:
+ del self.__users[username]
+
+ def check(self, username, password):
+ if username in self.__users and self.__users[username].get_password() == password:
+ return True
+ else:
+ return False
+
+ def get_user(self, username):
+ return self.__users[username]
+
+ def get_users(self):
+ return self.__users
+
+
+class Socks5RequestHandler(StreamRequestHandler):
+ def __init__(self, request, client_address, server):
+ StreamRequestHandler.__init__(self, request, client_address, server)
+
+ def handle(self):
+ session = Session(self.connection)
+ logging.info('Create session[%s] for %s:%d', 1, self.client_address[0], self.client_address[1])
+ # print(self.server.allowed)
+ if self.server.allowed and self.client_address[0] not in self.server.allowed:
+ logging.info('Remote IP not in allowed list. Closing connection')
+ close_session(session)
+ return
+ client = self.connection
+ client.recv(1)
+ method_num, = struct.unpack('b', client.recv(1))
+ meth_bytes = client.recv(method_num)
+ methods = struct.unpack('b' * method_num, meth_bytes)
+ auth = self.server.is_auth()
+ if methods.__contains__(SocksMethod.NO_AUTHENTICATION_REQUIRED) and not auth:
+ client.send(b"\x05\x00")
+ elif methods.__contains__(SocksMethod.USERNAME_PASSWORD) and auth:
+ client.send(b"\x05\x02")
+ if not self.__do_username_password_auth():
+ logging.info('Session[%d] authentication failed', session.get_id())
+ close_session(session)
+ return
+ else:
+ logging.info('Client requested unknown method (%s, %s->%s). Cannot continue.', methods, method_num,
+ meth_bytes)
+ client.send(b"\x05\xFF")
+ return
+
+ version, command, reserved, address_type = struct.unpack('B' * 4, client.recv(4))
+ host = None
+ port = None
+ if address_type == AddressType.IPV4:
+ ip_a, ip_b, ip_c, ip_d, port = struct.unpack('!' + ('b' * 4) + 'H', client.recv(6))
+ host = host_from_ip(ip_a, ip_b, ip_c, ip_d)
+ elif address_type == AddressType.DOMAIN_NAME:
+ host_length, = struct.unpack('b', client.recv(1))
+ host = client.recv(host_length)
+ port, = struct.unpack('!H', client.recv(2))
+ elif address_type == AddressType.IPV6:
+ ip6_01, ip6_02, ip6_03, ip6_04, \
+ ip6_05, ip6_06, ip6_07, ip6_08, \
+ ip6_09, ip6_10, ip6_11, ip6_12, \
+ ip6_13, ip6_14, ip6_15, ip6_16, \
+ port = struct.unpack('!' + ('b' * 16) + 'H', client.recv(18))
+
+ logging.warn("Address type not implemented: %s (IPV6 Connect)", address_type)
+ logging.info("Params: %s, port: %s", (
+ ip6_01, ip6_02, ip6_03, ip6_04, ip6_05, ip6_06, ip6_07, ip6_08, ip6_09, ip6_10, ip6_11, ip6_12, ip6_13,
+ ip6_14, ip6_15, ip6_16), port)
+ client.send(build_command_response(ReplyType.ADDRESS_TYPE_NOT_SUPPORTED))
+ return
+
+ else: # address type not support
+ logging.warn("Address type not supported: %s", address_type)
+ client.send(build_command_response(ReplyType.ADDRESS_TYPE_NOT_SUPPORTED))
+ return
+
+ command_executor = CommandExecutor(host, port, session)
+ if command == SocksCommand.CONNECT:
+ logging.info("Session[%s] Request connect %s:%s", session.get_id(), host, port)
+ command_executor.do_connect()
+ close_session(session)
+
+ def __do_username_password_auth(self):
+ client = self.connection
+ client.recv(1)
+ length = byte_to_int(struct.unpack('b', client.recv(1))[0])
+ username = client.recv(length)
+ length = byte_to_int(struct.unpack('b', client.recv(1))[0])
+ password = client.recv(length)
+ user_manager = self.server.get_user_manager()
+ if user_manager.check(username, password):
+ client.send(b"\x01\x00")
+ return True
+ else:
+ client.send(b"\x01\x01")
+ return False
+
+
+class Socks5Server(ThreadingTCPServer):
+ """
+ SOCKS5 proxy server
+ """
+
+ def __init__(self, port, auth=False, user_manager=UserManager(), allowed=None):
+ ThreadingTCPServer.__init__(self, ('', port), Socks5RequestHandler)
+ self.__port = port
+ self.__users = {}
+ self.__auth = auth
+ self.__user_manager = user_manager
+ self.__sessions = {}
+ self.allowed = allowed
+
+ self.th = threading.Thread(target=self.serve_forever)
+
+ def serve_forever(self, poll_interval=0.5):
+ logging.info("Create SOCKS5 server at port %d", self.__port)
+ ThreadingTCPServer.serve_forever(self, poll_interval)
+
+ def finish_request(self, request, client_address):
+ BaseServer.finish_request(self, request, client_address)
+
+ def is_auth(self):
+ return self.__auth
+
+ def set_auth(self, auth):
+ self.__auth = auth
+
+ def get_all_managed_session(self):
+ return self.__sessions
+
+ def get_bind_port(self):
+ return self.__port
+
+ def get_user_manager(self):
+ return self.__user_manager
+
+ def set_user_manager(self, user_manager):
+ self.__user_manager = user_manager
+
+ def run_in_thread(self):
+ self.th.start()
+
+ def stop_server_thread(self):
+ self.server_close()
+ self.shutdown()
+ self.th.join()
+
+
+def check_os_support():
+ if not support_os.__contains__(current_os):
+ print('Not support in %s' % current_os)
+ sys.exit()
+
+
+def stop(pid_file):
+ check_os_support()
+ print('Stopping server...', end=' ')
+ try:
+ f = open(pid_file, 'r')
+ pid = int(f.readline())
+ os.kill(pid, signal.SIGTERM)
+ os.remove(pid_file)
+ print(" [OK]")
+ except OSError:
+ print("pysocks is not running")
+ except IOError:
+ print("pysocks is not running")
+
+
+def status(pid_file):
+ check_os_support()
+ try:
+ f = open(pid_file, 'r')
+ pid = int(f.readline())
+ print('pysocks(pid %d) is running...' % pid)
+ except IOError:
+ print("pysocks is stopped")
+
+
+def start_command(args):
+ enable_log = True
+ log_file = args.logfile
+ auth = args.auth is not None
+ pid_file = args.pidfile
+ user_manager = UserManager()
+ should_daemonisze = not args.foreground
+ if auth:
+ for user in args.auth:
+ user_pwd = user.split(':')
+ user_manager.add_user(User(user_pwd[0], user_pwd[1]))
+ if enable_log:
+ logging.basicConfig(level=logging.INFO,
+ format='%(asctime)s %(levelname)s - %(message)s',
+ filename=log_file,
+ filemode='a')
+ console = logging.StreamHandler(sys.stdout)
+ console.setLevel(logging.INFO)
+ formatter = logging.Formatter('%(asctime)s %(levelname)-5s %(lineno)-3d - %(message)s')
+ console.setFormatter(formatter)
+ logging.getLogger().addHandler(console)
+
+ Socks5Server.allow_reuse_address = True
+ socks5_server = Socks5Server(args.port, auth, user_manager, allowed=args.allow_ip)
+ try:
+ if support_os.__contains__(current_os) and should_daemonisze:
+ run_daemon_process(pid_file=pid_file, start_msg='Start SOCKS5 server at pid %s\n')
+ socks5_server.serve_forever()
+ except KeyboardInterrupt:
+ socks5_server.server_close()
+ socks5_server.shutdown()
+ logging.info("SOCKS5 server shutdown")
+
+
+def stop_command(args):
+ pid_file = pid_file = args.pidfile
+ stop(pid_file)
+ sys.exit()
+
+
+def status_command(args):
+ pid_file = args.pidfile
+ status(pid_file)
+ sys.exit()
+
+
+def main():
+ default_pid_file = os.path.join(os.path.expanduser('~'), '.pysocks.pid')
+ default_log_file = os.path.join(os.path.expanduser('~'), 'pysocks.log')
+ parser = argparse.ArgumentParser(description='start a simple socks5 server',
+ formatter_class=argparse.ArgumentDefaultsHelpFormatter)
+ subparsers = parser.add_subparsers(help='sub-command help')
+ parser_start = subparsers.add_parser('start', help='start a SOCKS5 server', description='start a SOCKS5 server',
+ formatter_class=argparse.ArgumentDefaultsHelpFormatter)
+ parser_start.add_argument('-p', '--port', type=int, help='specify server port, default 1080', default=1080)
+ parser_start.add_argument('-f', '--foreground', help='stay in foreground (prevents daemonization)',
+ action='store_true', default=False)
+ parser_start.add_argument('-i', '--allow-ip', nargs='+', help='allowed client IP list')
+ parser_start.add_argument('-a', '--auth', nargs='+', help='allowed users')
+ parser_start.add_argument('-L', '--logfile', help='log file', default=default_log_file)
+ parser_start.add_argument('-P', '--pidfile', help='pid file', default=default_pid_file)
+ parser_start.set_defaults(func=start_command)
+ parser_stop = subparsers.add_parser('stop', help='stop a SOCKS5 server', description='stop a SOCKS5 server',
+ formatter_class=argparse.ArgumentDefaultsHelpFormatter)
+ parser_stop.add_argument('-P', '--pidfile', help='pid file', default=default_pid_file)
+ parser_stop.set_defaults(func=stop_command)
+ parser_status = subparsers.add_parser('status', help='print SOCKS5 server status',
+ description='print SOCKS5 server status',
+ formatter_class=argparse.ArgumentDefaultsHelpFormatter)
+ parser_status.add_argument('-P', '--pidfile', help='pid file', default=default_pid_file)
+ parser_status.set_defaults(func=status_command)
+ args = parser.parse_args()
+ args.func(args)
+
+
+if __name__ == '__main__':
+ main()
diff --git a/wgcf_2.2.15_amd64 b/wgcf_2.2.15_amd64
new file mode 100644
index 0000000..a81050a
Binary files /dev/null and b/wgcf_2.2.15_amd64 differ
diff --git a/wgcf_2.2.15_arm64 b/wgcf_2.2.15_arm64
new file mode 100644
index 0000000..5476a36
Binary files /dev/null and b/wgcf_2.2.15_arm64 differ
diff --git a/wireguard-go b/wireguard-go
new file mode 100644
index 0000000..2e1dbc6
Binary files /dev/null and b/wireguard-go differ