A SOCKS5 VPN that tunnels raw TCP through a Google Apps Script web app to your own small VPS exit server. To anything on the network path your client only ever talks TLS to a Google IP with SNI=www.google.com. Everything in flight is AES-256-GCM encrypted end-to-end — Google never sees plaintext and never holds the key.
How it works in simple terms: Your browser/app talks SOCKS5 to this tool on your computer. The tool wraps every TCP byte in AES-GCM frames and posts them through a Google-facing HTTPS connection to a free Apps Script web app you control. The Apps Script forwards those bytes verbatim to your own VPS, which decrypts and opens the real connection. To the firewall/filter it looks like you're just talking to Google.
⚠️ You need a small VPS for the exit server. Unlike pure-Apps-Script proxies, this project tunnels raw TCP — anything SOCKS5 can carry — so a realnet.Dialhas to happen somewhere. A small $4/month VPS is plenty. In exchange you can tunnel SSH, IMAP, custom protocols, anything — not just HTTP.
If you like this project, please consider starring it on GitHub (⭐). It helps the project get discovered.
You can also support the project financially:
- TRX / USDT TRC20:
TSxg2WAXYnkoR2UiUTzCxbmqNARAt91aqB - BNB / USDT BEP20:
0xe7b48d8fd5fbbb4e3fa9a06723a62a88585139ea - TON:
UQDBzJqzJ5e7uZFPrmarTRSGGbD1UoFK2q5_jWh4D2nnNdUB
- Never share
tunnel_keywith anyone. Anyone with this key can use your tunnel/VPS as if they are you. - A server with public internet access is required. Your exit server must be reachable from Google Apps Script.
- Each Google Apps Script deployment ID has a quota of about 20,000 executions per day, and the quota resets around 10:30 AM Iran time (GMT+3:30).
- You do not need to install a local MITM certificate in this project. The certificate setup in
MasterHttpRelayVPNis for that project's architecture and is not required here. - This project was inspired by the idea in the main repository: https://github.com/masterking32/MasterHttpRelayVPN
GooseRelayVPN is provided for educational, testing, and research purposes only.
- Provided without warranty: This software is provided "AS IS", without express or implied warranty, including merchantability, fitness for a particular purpose, and non-infringement.
- Limitation of liability: The developers and contributors are not responsible for any direct, indirect, incidental, consequential, or other damages resulting from the use of this project.
- User responsibility: Running this project outside controlled test environments may affect networks, accounts, or connected systems. You are solely responsible for installation, configuration, and use.
- Legal compliance: You are responsible for complying with all local, national, and international laws and regulations before using this software.
- Google services compliance: If you use Google Apps Script with this project, you are responsible for complying with Google's Terms of Service, acceptable-use rules, quotas, and platform policies. Misuse may lead to suspension of your Google account or deployment.
- License terms: Use, copying, distribution, and modification are governed by the repository license. Any use outside those terms is prohibited.
Browser/App
-> SOCKS5 (127.0.0.1:1080)
-> AES-256-GCM raw-TCP frames
-> HTTPS to a Google edge IP (SNI=www.google.com, Host=script.google.com)
-> Apps Script doPost() (dumb forwarder, never sees plaintext)
-> Your VPS :8443/tunnel (decrypts, demuxes by session_id, dials target)
<- Same path in reverse via long-polling
Your application sends TCP bytes through the SOCKS5 listener on your computer. The client encrypts each chunk with AES-256-GCM and POSTs batches over a domain-fronted HTTPS connection to your Apps Script web app. The Apps Script is a ~30-line script that forwards the body verbatim to your VPS — it never decrypts and the AES key never touches Google. Your VPS decrypts, dials the real target, and pumps bytes back along the same path. The filter sees only TLS to Google.
You need a Linux VPS with a public IP. Any provider works.
You need two separate programs:
goose-client— runs on your own computer. This is what you run every day.goose-server— runs on your VPS. You set it up once and leave it running.
Option A — Download a pre-built release (recommended):
-
Go to the Releases page.
-
Download the right archive for your OS:
- Windows:
GooseRelayVPN-client-vX.Y.Z-windows-amd64.zip - macOS (Intel):
GooseRelayVPN-client-vX.Y.Z-darwin-amd64.tar.gz - macOS (M1/M2/M3):
GooseRelayVPN-client-vX.Y.Z-darwin-arm64.tar.gz - Linux:
GooseRelayVPN-client-vX.Y.Z-linux-amd64.tar.gz - Android / Termux (arm64):
GooseRelayVPN-client-vX.Y.Z-android-arm64.tar.gz
- Windows:
-
For the server, SSH into your VPS and download the binary for your server OS:
- Linux (most common):
wget https://github.com/kianmhz/GooseRelayVPN/releases/latest/download/GooseRelayVPN-server-vX.Y.Z-linux-amd64.tar.gz tar -xzf GooseRelayVPN-server-vX.Y.Z-linux-amd64.tar.gz
- Windows Server: download
GooseRelayVPN-server-vX.Y.Z-windows-amd64.zipfrom the Releases page and extract it to a folder such asC:\goose-relay\. See Step 8 (Windows) below for service setup.
(Replace
vX.Y.Zwith the latest version number from the Releases page.) - Linux (most common):
💡 If the Releases page doesn't open, you can download directly using these links (replace
vX.Y.Zwith the latest version):
- Client — Windows:
https://github.com/Kianmhz/GooseRelayVPN/releases/download/vX.Y.Z/GooseRelayVPN-client-vX.Y.Z-windows-amd64.zip- Client — macOS (Apple Silicon):
https://github.com/Kianmhz/GooseRelayVPN/releases/download/vX.Y.Z/GooseRelayVPN-client-vX.Y.Z-darwin-arm64.tar.gz- Client — macOS (Intel):
https://github.com/Kianmhz/GooseRelayVPN/releases/download/vX.Y.Z/GooseRelayVPN-client-vX.Y.Z-darwin-amd64.tar.gz- Client — Linux:
https://github.com/Kianmhz/GooseRelayVPN/releases/download/vX.Y.Z/GooseRelayVPN-client-vX.Y.Z-linux-amd64.tar.gz- Client — Android/Termux:
https://github.com/Kianmhz/GooseRelayVPN/releases/download/vX.Y.Z/GooseRelayVPN-client-vX.Y.Z-android-arm64.tar.gz- Server — Linux:
https://github.com/Kianmhz/GooseRelayVPN/releases/download/vX.Y.Z/GooseRelayVPN-server-vX.Y.Z-linux-amd64.tar.gz
Option B — Build from source (Go 1.22+) — not recommended, may be unstable:
git clone https://github.com/kianmhz/GooseRelayVPN.git
cd GooseRelayVPN
go build -o goose-client ./cmd/client
go build -o goose-server ./cmd/serverRun this once:
openssl rand -hex 32Copy the 64-character string it prints. You'll use the same value in both the client and server configs. Keep it secret — anyone with this key can use your tunnel.
Copy the example configs:
cp client_config.example.json client_config.json
cp server_config.example.json server_config.jsonOpen both files and paste your key into the tunnel_key field. Leave script_keys empty for now.
client_config.json:
{
"socks_host": "127.0.0.1",
"socks_port": 1080,
"google_host": "216.239.38.120",
"sni": "www.google.com",
"script_keys": ["PASTE_DEPLOYMENT_ID"],
"tunnel_key": "PASTE_OUTPUT_OF_GEN_KEY"
}server_config.json:
{
"server_host": "0.0.0.0",
"server_port": 8443,
"tunnel_key": "SAME_VALUE_AS_CLIENT"
}This is the free Google-side piece that hides your traffic.
- Go to Google Apps Script and sign in.
- Click New project.
- Delete the default code and paste everything from
apps_script/Code.gs. - Change this line to your VPS IP:
const VPS_URL = 'http://YOUR.VPS.IP:8443/tunnel';
- Click Deploy → New deployment → set type to Web app.
- Set Execute as: Me and Who has access: Anyone.
- Click Deploy. A dialog appears showing the Deployment ID. Copy that value and paste it into
script_keys. - Paste that ID into
script_keysinclient_config.json.
⚠️ Every time you editCode.gsyou must create a new deployment (Deploy → New deployment) and updatescript_keys. Just saving the code is not enough.
The server needs port 8443 to be reachable from the internet. On your VPS run:
sudo ufw allow 8443/tcpThen verify it works from your own computer (replace with your real VPS IP):
curl http://YOUR.VPS.IP:8443/healthzYou should get an empty response with HTTP 200. If curl times out or refuses, also check your cloud provider's firewall (called "Security Groups" on AWS/Hetzner, "Firewall Rules" on DigitalOcean/Vultr, etc.) and add an inbound rule for TCP port 8443.
On your VPS, run the server binary:
Linux:
./goose-server -config server_config.jsonWindows Server:
.\goose-server.exe -config server_config.jsonYou should see it print the listening address and the healthz/tunnel URLs. Leave this terminal open, or set up the systemd/NSSM service (Step 8) to keep it running after reboots.
If you want the exit server to start automatically after a VPS reboot, create a systemd service.
Run on your VPS:
sudo nano /etc/systemd/system/goose-relay.servicePaste this (adjust the path if your binary is in a different location):
[Unit]
Description=GooseRelayVPN exit server
After=network.target
[Service]
Type=simple
WorkingDirectory=/root
ExecStart=/root/goose-server -config /root/server_config.json
Restart=always
RestartSec=3
StandardOutput=journal
StandardError=journal
[Install]
WantedBy=multi-user.targetThen run:
sudo systemctl daemon-reload
sudo systemctl enable goose-relay
sudo systemctl start goose-relay
sudo systemctl status goose-relay --no-pagerIf your VPS runs Windows Server, use NSSM (Non-Sucking Service Manager) to register goose-server as a Windows service instead of systemd. The goose-server.exe binary is a plain Go binary — no installer needed.
1. Open port 8443 in Windows Firewall (run as Administrator in Command Prompt):
netsh advfirewall firewall add rule name="GooseRelayVPN" protocol=TCP dir=in localport=8443 action=allowAlso add an inbound TCP/8443 rule in your cloud provider's firewall panel (Security Groups / Firewall Rules).
2. Download NSSM from https://nssm.cc/download, extract it, and note the path to nssm.exe (e.g. C:\nssm\win64\nssm.exe).
3. Register and start the service (run as Administrator):
C:\nssm\win64\nssm.exe install GooseRelayVPN "C:\goose-relay\goose-server.exe"
C:\nssm\win64\nssm.exe set GooseRelayVPN AppParameters "-config C:\goose-relay\server_config.json"
C:\nssm\win64\nssm.exe set GooseRelayVPN AppDirectory "C:\goose-relay"
C:\nssm\win64\nssm.exe set GooseRelayVPN Start SERVICE_AUTO_START
C:\nssm\win64\nssm.exe start GooseRelayVPN4. Verify it is running:
C:\nssm\win64\nssm.exe status GooseRelayVPN
curl http://YOUR.VPS.IP:8443/healthzTo stop or uninstall later:
C:\nssm\win64\nssm.exe stop GooseRelayVPN
C:\nssm\win64\nssm.exe remove GooseRelayVPN confirm./goose-client -config client_config.jsonYou should see output like this:
CLIENT INFO GooseRelayVPN client starting
CLIENT INFO SOCKS5 proxy: socks5://127.0.0.1:1080
CLIENT INFO pre-flight OK: relay healthy, AES key matches end-to-end
CLIENT INFO ready: local SOCKS5 is listening on 127.0.0.1:1080
The pre-flight check runs automatically at startup and verifies that Apps Script is reachable, the VPS is up, and the AES key matches. If it fails, the message tells you what went wrong.
Now set your browser to use SOCKS5 proxy 127.0.0.1:1080:
- Firefox: Settings → Network Settings → Manual proxy → SOCKS5 host
127.0.0.1port1080. Check Proxy DNS when using SOCKS v5. - Chrome/Edge: Use an extension like FoxyProxy or SwitchyOmega.
- System-wide on macOS/Linux: Set SOCKS5 in network settings.
The Android client runs inside Termux — there is no APK. Follow these steps:
1. Install and set up Termux:
apt update && apt upgrade -y
pkg install wget tar -y2. Download and extract the client:
wget https://github.com/Kianmhz/GooseRelayVPN/releases/latest/download/GooseRelayVPN-client-v1.4.1-android-arm64.tar.gz
tar -xzvf GooseRelayVPN-client-v1.4.1-android-arm64.tar.gz
cd GooseRelayVPN-client-v1.4.1-android-arm64/3. Create your config:
cp client_config.example.json client_config.json
nano client_config.jsonFill in your script_keys and tunnel_key, then save with Ctrl+X.
4. Run the client:
./goose-client -config client_config.jsonWhen you see ready: local SOCKS5 is listening on 127.0.0.1:1080 it's working.
5. Connect your apps:
Use a SOCKS5-aware app to route traffic through 127.0.0.1:1080. NekoBox and v2rayNG both work well:
- Add a SOCKS5 proxy pointing to
127.0.0.1:1080 - In per-app settings, enable the proxy for the apps you want and exclude Termux from the VPN so the tunnel itself stays connected
By default the client listens on 127.0.0.1:1080 so only your computer can use it. To share with other devices on your local network, set socks_host to 0.0.0.0 in client_config.json and restart.
⚠️ Security note: Anyone on your LAN can then proxy through your tunnel and consume your Apps Script quota. Only do this on trusted networks.
The ~20,000 calls/day quota applies per Google account, not per deployment or project — all deployments under the same account share one quota pool. The client polls about once per second when idle, so a single deployment can sustain steady use, but heavy days hit the cap. Real-time apps like Telegram or X can drain the quota within a few hours due to constant polling. To go beyond that, deploy Code.gs across different Google accounts and put all the Deployment IDs into script_keys:
{
"script_keys": [
"FIRST_DEPLOYMENT_ID",
"SECOND_DEPLOYMENT_ID",
"THIRD_DEPLOYMENT_ID"
]
}What the client does for you automatically:
- Round-robin across all configured deployments.
- Health-aware blacklist — if one starts failing, the client backs off from it (3 s, 6 s, 12 s, … up to ~48 s) and keeps using the others.
- Same-poll failover — if a poll fails on one deployment, the same payload is retried on another within the same poll cycle, so no traffic is lost during transient quota or 5xx events.
💡 All deployments must use the same
tunnel_keybecause they all forward to the same VPS, which only has one AES key. You don't need to change anything on the VPS when you add more deployments.
💡 You can paste either just the Deployment ID (the part between
/s/and/exec) or the full/execURL — the client extracts the ID either way.
⚠️ Recommended range: 3–4 deployment IDs. More is not always better — each key adds 3 concurrent poll workers, and going too high creates unnecessary load on Google's infrastructure without meaningful speed gains. Stick to 3–4 for reliable, stable performance.
| Field | Default | What it does |
|---|---|---|
socks_host |
127.0.0.1 |
Host/IP for the local SOCKS5 listener. Set to 0.0.0.0 for LAN sharing. |
socks_port |
1080 |
Port for the local SOCKS5 listener. |
google_host |
216.239.38.120 |
Google edge IP/host to dial (port is fixed to 443). |
sni |
www.google.com |
SNI presented during the TLS handshake. Accepts a single string or an array — ["www.google.com", "mail.google.com", "accounts.google.com"] — where each SNI host gets its own connection and throttle bucket, which can multiply available bandwidth in regions that rate-limit per domain name. |
script_keys |
— | Array of Apps Script Deployment IDs (no full URL needed). One ID is required; add more to increase throughput and quota — each ID spawns 3 concurrent poll workers and adds ~20,000 req/day quota. Recommended: 3–4 IDs. Going higher adds load without meaningful gains. |
tunnel_key |
— | 64-char hex AES-256 key. Must match the server byte-for-byte. |
socks_user |
(optional) | SOCKS5 username (RFC 1929). When set, clients must authenticate or the connection is rejected. Must be paired with socks_pass — set both or neither. |
socks_pass |
(optional) | SOCKS5 password paired with socks_user. |
| Field | Default | What it does |
|---|---|---|
server_host |
0.0.0.0 |
Host/IP where the exit server binds. |
server_port |
8443 |
Port where the exit server listens. Must be reachable from Google's network. |
tunnel_key |
— | 64-char hex AES-256 key. Must match the client. |
upstream_proxy |
(optional) | Route all outbound connections through a local SOCKS5 proxy. Useful when your VPS datacenter IP is blocked by certain sites. Set to socks5://127.0.0.1:40000 to use Cloudflare WARP (DNS is resolved by the proxy, so target sites see the Cloudflare IP instead of your VPS IP). Leave empty or omit to dial directly. |
debug_timing |
false |
When true, logs per-session DNS and TCP dial latency so you can pinpoint where time is going. |
If you change Code.gs — for example to point at a new VPS IP — you must create a new deployment in the Apps Script editor (Deploy → New deployment, not just "Manage deployments"). Saving alone does nothing; the live /exec URL serves the published version. After redeploying, update script_keys in client_config.json.
┌─────────┐ ┌──────────────┐ ┌──────────────┐ ┌─────────────┐ ┌──────────┐
│ Browser │──►│ goose-client │──►│ Google edge │──►│ Apps Script │──►│ Your │──► Internet
│ / App │◄──│ (SOCKS5) │◄──│ TLS, fronted │◄──│ doPost() │◄──│ VPS │◄──
└─────────┘ └──────────────┘ └──────────────┘ └─────────────┘ └──────────┘
AES-256-GCM SNI=www.google dumb forwarder decrypt +
session multiplex Host=script.… no plaintext net.Dial
Key invariants:
- Authentication = AES-GCM tag. No shared password, no certificates. Frames that fail
Open()are dropped silently. - Apps Script never sees plaintext. The script is a ~30-line forwarder; the AES key lives only on your machine and the VPS.
- DNS travels through the tunnel. The SOCKS5 server uses a no-op resolver; use
socks5h://so DNS is resolved at the exit, not locally. - Long-poll, full-duplex. The VPS holds each request open for up to 8s waiting for downstream bytes; the client runs 3 concurrent poll workers per deployment ID — so 3 script keys = 9 workers, 6 keys = 18 workers. More keys means more parallelism, not just more quota. Downstream frames are coalesced in a small (~25 ms) window so streaming workloads send fewer, larger HTTP responses.
- Health-aware multi-deployment. When
script_keyslists more than one deployment, the client picks endpoints in round-robin and exponentially blacklists any that misbehave; one same-poll retry is attempted on a fresh deployment so transient failures don't drop traffic.
- Frame (plaintext, inside the sealed batch):
session_id (16) || seq (u64 BE) || flags (u8) || target_len (u8) || target || payload_len (u32 BE) || payload - Batch seal (AES-GCM): the entire batch is sealed once —
nonce (12 bytes) || AES-GCM(u16 frame_count || [u32 frame_len || frame_bytes] …)— one nonce and auth-tag per HTTP body, not per frame. - HTTP body:
base64(nonce || ciphertext+tag), base64 so it survives Apps Script'sContentServicetext round-trip.
GooseRelayVPN/
├── cmd/
│ ├── client/main.go # Entry point: SOCKS5 listener + carrier loop
│ └── server/main.go # Entry point: VPS HTTP handler
├── internal/
│ ├── frame/ # Wire format, AES-GCM seal/open, batch packer
│ ├── session/ # Per-connection state, seq counters, rx/tx queues
│ ├── socks/ # SOCKS5 server + VirtualConn (net.Conn adapter)
│ ├── carrier/ # Long-poll loop + domain-fronted HTTPS client
│ ├── exit/ # VPS HTTP handler: decrypt, demux, dial upstream
│ └── config/ # JSON config loaders
├── bench/
│ ├── harness/main.go # E2E benchmark: real binaries, loopback sink
│ ├── sink/main.go # TCP sink (echo / sized / source / quick modes)
│ ├── diff/main.go # JSON result comparator with noise-floor logic
│ ├── baselines/ # Committed baseline JSON files
│ └── bench.sh # Build + run + compare orchestrator
├── apps_script/
│ └── Code.gs # ~30-line dumb forwarder
├── scripts/
│ └── goose-relay.service # systemd unit template
├── client_config.example.json
└── server_config.example.json
- Using too many deployment IDs can cause instability. There is a current known issue where configuring a large number of
script_keysdegrades performance or causes connection problems. Until this is resolved, stick to 3–4 deployment IDs.
| Problem | Solution |
|---|---|
Pre-flight fails: cannot reach Apps Script |
Your internet connection can't reach Google. Check google_host — try a different IP from the 216.239.x.120 range. |
Pre-flight fails: HTTP 204 — key mismatch |
The tunnel_key in client_config.json doesn't match the one in server_config.json on the VPS. They must be byte-identical. |
Pre-flight fails: Apps Script cannot reach your VPS |
Port 8443 on your VPS is not reachable. Run sudo ufw allow 8443/tcp on the VPS and check your cloud provider's firewall rules. |
Log says relay returned non-batch payload |
Apps Script returned an HTML page instead of an encrypted batch. Either the deployment in script_keys isn't live, or Who has access is not set to Anyone. Re-deploy (Deploy → New deployment) and update script_keys. |
Log says relay returned HTTP 404 via … |
The Deployment ID in your config doesn't match a live /exec. Re-deploy and update the config. |
Log says relay returned HTTP 500 via … |
Apps Script can't reach VPS_URL. Check the server address in Code.gs, confirm the VPS is up, and confirm inbound TCP/8443 is open. curl http://your.vps.ip:8443/healthz should return 200. |
Log says relay request failed via …: timeout |
Fronted connection to Google is failing. Try a different google_host — any 216.239.x.120 served by Google works. |
| Browser hangs on every request | Make sure your browser extension uses SOCKS5 with DNS through proxy enabled (not plain SOCKS5). In Firefox, check Proxy DNS when using SOCKS v5. |
[exit] dial X: ... timeout on the VPS server logs |
The target host blocks datacenter IPs, or your VPS has no outbound connectivity for that port. |
| Cloudflare-protected sites show captchas | Expected. Your VPS's IP is on a datacenter ASN, which Cloudflare's bot scoring often flags. Not a tunnel bug. |
| YouTube buffers a lot at 1080p | Expected. The tunnel adds ~300-800ms per round trip due to Apps Script dispatch overhead. 480p is comfortable. Deploying multiple script_keys (see above) helps with sustained throughput. |
| One deployment hits quota mid-session | If script_keys has more than one entry, the client automatically blacklists the failing one for a few seconds and keeps going on the others. With only one entry, browsing stops until the quota resets (~10:30 AM Iran time / midnight Pacific). |
| Mismatched AES keys | Symptom: client logs no errors but no traffic flows; VPS logs no dial ... lines. Confirm tunnel_key is byte-identical in both configs. |
- Never share
client_config.jsonorserver_config.json— the AES key is in there and a leaked key means anyone can tunnel through your VPS. - Generate a fresh key with
openssl rand -hex 32for every deployment. Don't reuse keys across hosts. - AES-GCM is the only authentication. There's no password, no rate-limiting, no per-user accounting. Treat the key like a server-admin password.
- Apps Script logs every
doPostinvocation in Google's dashboard (count and duration only — Apps Script never sees plaintext). - Keep
socks_hoston the client at127.0.0.1unless you specifically want LAN sharing. - Each Apps Script deployment is rate-limited to ~20,000 calls/day on free Google accounts.
Pull requests are welcome. For any change that touches the carrier loop, session layer, or poll behavior, please include benchmark results so reviewers can evaluate the performance impact.
The bench/ directory contains an end-to-end harness that spins up real goose-client and goose-server binaries against a loopback TCP sink and measures throughput, TTFB, session rate, and idle CPU.
# Build the binaries and run the full benchmark suite
bash bench/bench.shThe harness compares your working tree against the committed baseline in bench/baselines/ and prints a side-by-side table. Regressions above the noise floor fail the script with exit code 1. Include the output in your PR description.
To record a new baseline from a specific git ref:
bash bench/bench.sh --update <ref> # e.g. --update v1.3.0 or --update HEADSpecial thanks to @abolix for making this project possible.
MIT