RustRay is a next-generation, high-performance universal proxy core written entirely in memory-safe Rust. It functions as a 100% drop-in replacement for legacy systems like RustRay-core, merging standard JSON APIs with cutting-edge proprietary evasion techniques built natively into the runtime.
- Uncompromising Performance: Built securely on
tokio,quiche, andsmoltcpfor extreme throughput and zero-copy packet passing (bytes). - Legacy Compatibility: Reads standard
rustrayconfigurations, handling routing and outbounds without breaking your existing CI pipelines. - Radical Stealth: Leverages
ayaeBPF hooking and advanced app-layer desynchronization to effectively disappear from stateful Deep Packet Inspection.
- Brutal-QUIC Congestion Controller: Replaces classic TCP Cubic/BBR with a fixed-rate QUIC pump, tearing through packet-loss walls set up by ISPs.
- DNS-over-QUIC (DoQ) Signaling: Encrypted signaling using
hickory-resolverfor resilient, low-latency peer discovery and configuration fetching. - Secure mDNS Peer Announcements: Local mesh discovery using AES-256-GCM encrypted mDNS, enabling zero-config peer-to-peer relaying in restricted LANs.
- Elastic FEC: Reed-Solomon Forward Error Correction calculates invisible repair packets alongside your traffic, rebuilding dropped data without a single retransmission ping.
RustRay ships with Flow-J, a dynamic polyglot protocol that shapeshifts under pressure:
- Mode A (Direct Stealth): Standard Chrome-fingerprint TLS 1.3 / REALITY.
- Mode B (CDN Relay): Disguises streams through HTTP-Upgrade xhttp headers to hide behind major CDNs.
- Mode C (IoT Camouflage): Traffic is encapsulated into MQTT smart-sensor telemetry or Industrial Parasite steganography, ignoring all web-focused firewall rules entirely.
- The eBPF Handshake Mutilator: On Linux,
rustrayinjects eBPF-based transport enhancements into the kernel, intentionally slicing our own TLS ClientHello packets at specific boundary limits to crash or evade inline DPI firewalls. - Autonomous Fallback Orchestrator: Monitors health with a 5MB failover buffer. If a server is IP-blackholed, RustRay instantly races all available transports and hot-swaps to the lowest-latency path.
- Carrier-Aware ISP Tuning: Automatically detects mobile carriers (MCI, MTN, Rightel) via ASNs and applies optimal MTU/MSS clamping and packet pacing presets to bypass carrier-specific throttling.
RustRay natively targets Linux, Windows, macOS, and via UniFFI, Android (JNI) and iOS.
To compile the headless proxy core with all evasion features active:
cargo build --release --features ebpf,quic,p2p
./target/release/rustray -c config.json# Run with a custom config
./rustray run -c config.jsonIf you are a developer looking to integrate RustRay or contribute to the core:
- Developer Guide: Architecture, FFI/UniFFI, and transport extension.
- gRPC API Integration: Managing the engine via HandlerService/StatsService.
- Testing Guide: How to run unit and integration tests.
- Contributing: Branching models and coding standards.
Detailed roadmap can be found in FUTURE_IMPLEMENTATION_PLAN.md.
- Phase 7: Complete Transport Architecture (eBPF, QUIC, P2P)
- Phase 8: Ghost-Bucket (S3 Asynchronous Bridge)
- Phase 9: Industrial Parasite (MQTT Steganography)
- Phase 10: XDP Kernel Jitter & Window Control
- Phase 11: Global Orchestrator (Handshake Race & Seamless Fallback)
- Phase 12: Post-Quantum Cryptography (PQC) Integration (In Progress)
We ❤️ open source! We are actively looking for contributors to help make RustRay the gold standard for privacy and performance.
- Check out our CONTRIBUTING.md to get started.
- See "Good First Issues" on our Issue Tracker.
- Help us improve our Test Coverage!
Security is our top priority. Please review our SECURITY.md for vulnerability disclosure policies.
- GitHub Discussions: Join the conversation
- Telegram: @RustRayCommunity (Placeholder)
- Discord: Join our Server (Placeholder)
Copyright (c) 2024-2026 EdgeRay Team. Licensed under MIT.