I’ve been looking for a webproxy that would work with big websites like YouTube. So far I’ve found only very outdated and abandoned ones. Is there any up-to-date and actually functional webproxy I could host?
Edit: The reason I need this is that there are some locked up Windows computers I can’t install any traditional VPNs on and that are used by non-tech-savvy people.
I can’t pin the comment with the solution so here’s the link
Acronyms, initialisms, abbreviations, contractions, and other phrases which expand to something larger, that I’ve seen in this thread:
Fewer Letters More Letters HTTP Hypertext Transfer Protocol, the Web VPN Virtual Private Network VPS Virtual Private Server (opposed to shared hosting)
[Thread #155 for this comm, first seen 11th Mar 2026, 20:20] [FAQ] [Full list] [Contact] [Source code]
you can’t going wrong with squid. It was around forever, and still in development.
Thanks! I’ll look into it
I agree. It’s a bit tedious to configure, but rock solid and has all the features you could ask from a proxy.
Yeah you want the titanium networks projects, which are essentially a bunch of web proxies exactly like what you ask for.
I used to use Metallic, but it’s not actually that good and not maintained anymore.
Here is a public instance of holy unblocker: https://uc.robby.blue/scramjet
This is one of their flagship projects, and is what you want. Self hostable of course, code on github. I preferred the projects that give you internal tabs though, like hypertabs or anura.
Public anura instance: https://anura.pro/ (but anura looks like a pain to self host, it’s much more complex)
That’s exactly what I need, thanks!
Ssh includes a built in socks proxy. What are you actually trying to accomplish?
I’m trying to find an alternative to VPN to be used on a locked up Windows device I can’t install any apps on. And it should be easy enough to be usable by non-tech-savvy people. @[email protected] already provided a good solution
Dante is what ive always used.
Why not run your own socks5 proxy server?
What exactly do you mean by web proxy? Something site specific like Invidious? Or an HTTP or SOCKS5 proxy like danted?
Close to invidious but not specific to any particular site. A page that allows to open other pages through it, like a browser inside a web page except it’s only for opening a website and has no other browser functionality. Here’s a proprietary example: croxyproxy.com
Yeah what you want is a SOCKS5 proxy then just launch another browser with the proxy config.
You can run a browser inside a docker or VM, and then use webvnc or something. I just don’t see the point.
Thanks! SOCKS5 proxy is a good option, I don’t know why I didn’t think of it from the very beginning…
My goal is to bypass local censorship on university computers that don’t allow running any executables except those provided by the administrator. And I’m trying to help professors who aren’t particularly tech-savvy, so a webproxy is actually still a better option.
A browser inside a docker is a very viable solution, however my VPS is super small, so I don’t have resources for that unfortunately.
These kinds of setups are used to bypass agressive network filtering and content censhorship. All the traffic is http(s). And then the way only a browser is needed means it works on locked down devices like chromebooks.
The browser in docker is something I have used, but it requires more resources to host and can only be used by one person at once if you are using something like linuxserver’s webtop.
Then SOCKS is what you want. It can be used on a Chromebook as well.
These proxying websites are running full browser instances in the background. It’s the only way to guarantee all the traffic is routed through it.I just had a look at croxy you’re right, it doesn’t run a full browser… and there’s a TON of data that doesn’t get proxied.
No, Socks5 does not work for this usecase. You don’t get permissions to run it locally via crostini (or use crostini in general) and the relevant proxy settings are locked in the chromebook settings. In addition to this, it is too easy to fingerprint, and some of the more aggressive setups will catch it and block it. For example, my high school would autodetect wireguard and then kick you off of the network for 10 minutes if you attempted to connect.





