{ "name": "Spoofy", "subtitle": "A native iOS DPI bypass tool inspired by SpoofDPI", "description": "Spoofy runs a local proxy that intercepts HTTPS connections and fragments TLS ClientHello packets, preventing DPI engines from reading the SNI and blocking your traffic. Features multiple TLS fragmentation strategies, DNS-over-HTTPS, and per-domain profiles with wildcard matching.", "iconURL": "https://raw.githubusercontent.com/ringolol/Spoofy/main/icon.png", "website": "https://github.com/ringolol/Spoofy", "tintColor": "#F54F32", "featuredApps": [ "com.rnglol.Spoofy" ], "apps": [ { "name": "Spoofy", "bundleIdentifier": "com.rnglol.Spoofy", "developerName": "ringolol", "version": "1.5.8", "versionDate": "2026-03-26", "versionDescription": "Support SOCKS5 connections to the Proxy", "downloadURL": "https://github.com/ringolol/Spoofy/releases/download/v1.5.8/Spoofy.ipa", "localizedDescription": "A native iOS DPI bypass tool. Spoofy runs a local proxy that intercepts HTTPS connections and fragments TLS ClientHello packets, preventing DPI engines from reading the SNI and blocking your traffic.", "iconURL": "https://raw.githubusercontent.com/ringolol/Spoofy/main/icon_macos.png", "size": 356944, "screenshotURLs": [ "https://raw.githubusercontent.com/ringolol/Spoofy/main/Docs/main_screen.PNG", "https://raw.githubusercontent.com/ringolol/Spoofy/main/Docs/settings_screen.PNG", "https://raw.githubusercontent.com/ringolol/Spoofy/main/Docs/profile_screen.PNG", "https://raw.githubusercontent.com/ringolol/Spoofy/main/Docs/profile_vpn_screen.jpg" ] } ], "news": [] }