Fork: 114 Star: 3380 (更新于 2023-11-28 01:25:30)
Selfhosted alternative to 12ft.io. and 1ft.io bypass paywalls with a proxy ladder and remove CORS headers from any URL
最后发布版本： v0.0.20 (2023-11-26 07:05:07)
Freedom of information is an essential pillar of democracy and informed decision-making. While media organizations have legitimate financial interests, it is crucial to strike a balance between profitability and the public's right to access information. The proliferation of paywalls raises concerns about the erosion of this fundamental freedom, and it is imperative for society to find innovative ways to preserve access to vital information without compromising the sustainability of journalism. In a world where knowledge should be shared and not commodified, paywalls should be critically examined to ensure that they do not undermine the principles of an open and informed society.
Disclaimer: This project is intended for educational purposes only. The author does not endorse or encourage any unethical or illegal activity. Use this tool at your own risk.
How it works
sequenceDiagram client->>+ladder: GET ladder-->>ladder: apply RequestModifications ladder->>+website: GET website->>-ladder: 200 OK ladder-->>ladder: apply ResultModifications ladder->>-client: 200 OK
- Bypass Paywalls
- Remove CORS headers from responses, assets, and images ...
- Apply domain based ruleset/code to modify response / requested URL
- Keep site browsable
- Fetch RAW HTML
- Custom User Agent
- Custom X-Forwarded-For IP
- Docker container (amd64, arm64)
- Linux binary
- Mac OS binary
- Windows binary (untested)
- Removes most of the ads (unexpected side effect ¯\_(ツ)_/¯ )
- Basic Auth
- Disable logs
- No Tracking
- Limit the proxy to a list of domains
- Expose Ruleset to other ladders
- Fetch from Google Cache
- Optional TOR proxy
- A key to share only one URL
Some sites do not expose their content to search engines, which means that the proxy cannot access the content. A future version will try to fetch the content from Google Cache.
Warning: If your instance will be publicly accessible, make sure to enable Basic Auth. This will prevent unauthorized users from using your proxy. If you do not enable Basic Auth, anyone can use your proxy to browse nasty/illegal stuff. And you will be responsible for it.
- Download binary here
- Unpack and run the binary
./ladder -r https://t.ly/14PSf
- Open Browser (Default: http://localhost:8080)
docker run -p 8080:8080 -d --env RULESET=https://t.ly/14PSf --name ladder ghcr.io/everywall/ladder:latest
curl https://raw.githubusercontent.com/everywall/ladder/main/docker-compose.yaml --output docker-compose.yaml docker-compose up -d
See README.md in helm-chart sub-directory for more information.
- Open Browser (Default: http://localhost:8080)
- Enter URL
- Press Enter
Or direct by appending the URL to the end of the proxy URL: http://localhost:8080/https://www.example.com
Or create a bookmark with the following URL:
curl -X GET "http://localhost:8080/api/https://www.example.com"
||Port to listen on||
||Spawn multiple server instances||
||User agent to emulate||
||IP forwarder address||
||Enables Basic Auth, format
||Log fetched URL's||
||Disables URL Form Frontpage||
||Path to custom Form HTML||``|
||Path or URL to a ruleset file, accepts local directories||
||Make your Ruleset available to other ladders||
||Comma separated list of allowed domains. Empty = no limitations||``|
||Allow Domains from Ruleset. false = no limitations||
ALLOWED_DOMAINS_RULESET are joined together. If both are empty, no limitations are applied.
It is possible to apply custom rules to modify the response or the requested URL. This can be used to remove unwanted or modify elements from the page. The ruleset is a YAML file, a directory with YAML Files, or an URL to a YAML file that contains a list of rules for each domain. These rules are loaded on startup.
There is a basic ruleset available in a separate repository ruleset.yaml. Feel free to add your own rules and create a pull request.
- domain: example.com # Includes all subdomains domains: # Additional domains to apply the rule - www.example.de - www.beispiel.de headers: x-forwarded-for: none # override X-Forwarded-For header or delete with none referer: none # override Referer header or delete with none user-agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/188.8.131.52 Safari/537.36 content-security-policy: script-src 'self'; # override response header cookie: privacy=1 regexRules: - match: <script\s+([^>]*\s+)?src="(/)([^"]*)" replace: <script $1 script="/https://www.example.com/$3" injections: - position: head # Position where to inject the code append: | # possible keys: append, prepend, replace <script> window.localStorage.clear(); console.log("test"); alert("Hello!"); </script> - domain: www.anotherdomain.com # Domain where the rule applies paths: # Paths where the rule applies - /article googleCache: false # Use Google Cache to fetch the content regexRules: # Regex rules to apply - match: <script\s+([^>]*\s+)?src="(/)([^"]*)" replace: <script $1 script="/https://www.example.com/$3" injections: - position: .left-content article .post-title # Position where to inject the code into DOM replace: | <h1>My Custom Title</h1> - position: .left-content article # Position where to inject the code into DOM prepend: | <h2>Subtitle</h2> - domain: demo.com headers: content-security-policy: script-src 'self'; user-agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/184.108.40.206 Safari/537.36 urlMods: # Modify the URL query: - key: amp # (this will append ?amp=1 to the URL) value: 1 domain: - match: www # regex to match part of domain replace: amp # (this would modify the domain from www.demo.de to amp.demo.de) path: - match: ^ # regex to match part of path replace: /amp/ # (modify the url from https://www.demo.com/article/ to https://www.demo.de/amp/article/)
To run a development server at http://localhost:8080:
echo "dev" > handlers/VERSION RULESET="./ruleset.yaml" go run cmd/main.go
Optional: Live reloading development server with cosmtrek/air
Install air according to the installation instructions.
Run a development server at http://localhost:8080:
air # or the path to air if you haven't added a path alias to your .bashrc or .zshrc
2023-11-26 07:05:07 v0.0.20
2023-11-16 04:51:51 v0.0.19
2023-11-15 05:11:31 v0.0.18
2023-11-12 06:47:35 v0.0.17
2023-11-11 05:57:25 v0.0.16-1
2023-11-10 06:56:09 v0.0.14
2023-11-09 16:35:17 v0.0.13
2023-11-08 22:50:22 v0.0.12
2023-11-06 06:37:58 v0.0.11
2023-11-06 06:01:36 v0.0.10
bypass, cors, cors-proxy, paywall, paywall-blocker, paywall-bypasser
2023-12-03 16:46:19 SagerNet/sing-box
2023-12-02 21:54:31 samber/lo
2023-12-02 19:32:16 minio/minio
2023-12-02 07:39:19 argoproj/argo-cd
2023-12-02 03:19:42 aws/aws-sdk-go
2023-12-02 01:12:07 moby/moby