
85.98 MB
Android 7.0+
11
arm64-v8a
Verified safeScanned with ClamAV, APKiD, and Quark-Engine. No threats detected.
What's New
https://github.com/enkinvsh/dropweb-app/compare/v0.4.14...v0.4.15/
Description
Cross-platform proxy client powered by mihomo (Clash Meta) core. Fork of FlClashX focused on local scanning protection, DPI bypass, and a utilitarian interface.
Built for a specific task: give engineers a tool they can deploy to non-technical users (or use themselves) for stable access to international services, without detection risks or broken configs.
Features
- Protocols: VLESS, VMess, Trojan, Shadowsocks, Hysteria2, TUIC, WireGuard (Xray-core compatible)
- Subscriptions: Import via URL/QR, auto-update in background
- Routing: Split tunneling — local traffic direct, blocked traffic through proxy (GeoIP/Geosite)
- UI: Stripped down to essentials, only necessary controls
Why Fork and Detection Protection
FlClashX is an excellent client, but most popular apps (Happ, v2rayNG, Hiddify, Neko Box) are vulnerable to local scanning. Any app on the device can find the standard SOCKS port (7890) without root — this is actively used for VPN user detection.
How dropweb solves this:
- Dynamic ports — randomization instead of defaults 7890/7891
- SOCKS authentication — enforced; scanners can't verify traffic type
- TUN only — system proxy removed (readable from OS settings), all routing via virtual interface
Known Issues
- Aggressive battery optimization (MIUI, ColorOS) may kill the VPN in the background. Disable battery optimization for dropweb.
- Android devices with <3GB RAM may crash with heavy GeoIP databases.
License
GNU General Public License v3.0
Rate this app
Ratings & reviews
No reviews yet.