- Notifications
You must be signed in to change notification settings - Fork40
自动同步 mihomo 内核、sing-box 内核、sing-box PuerNya 版内核、Dashboard 面板和 AdGuard Home 最新版
NotificationsYou must be signed in to change notification settings
DustinWin/proxy-tools
Folders and files
| Name | Name | Last commit message | Last commit date | |
|---|---|---|---|---|
Repository files navigation
更新mihomo 内核、sing-box 内核、sing-box PuerNya 版内核、Dashboard 面板和AdGuard Home
每天凌晨(北京时间 UTC+8)自动构建生成:
- Clash Premium Release 版和 Nightly 版内核(已停更)
- mihomoMeta 版和Alpha 版内核
- sing-boxRelease 版、Dev 版和PuerNya 版(支持出站提供者
outbound_providers,类似于 mihomo 内核的代理集合proxy-providers)内核 - Dashboard 面板:yacd 面板、Yacd-meta 面板、metacubexd 面板和zashboard 面板
- AdGuard HomeRelease 版和Beta 版
注:
- 本教程中的下载链接以 CPU 架构 ARMv8 为例,请注意修改链接后缀
- 查看 CPU 架构可连接 SSH 后执行命令
uname -ms,若执行结果是“linux aarch64”,就是搭载的 ARMv8 架构
- 查看 CPU 架构可连接 SSH 后执行命令
- 对下载源的说明,可点此了解
1. 导入内核(以ShellCrash 导入内核为例)
mihomo 内核 Linux 版下载链接后缀和 CPU 架构对应关系如下表:
| CPU 架构 | AMD64v1 | AMD64v3 | ARMv5 | ARMv6 | ARMv7 | ARMv8&ARM64&AArch64 | mips-softfloat | mipsle-softfloat | mipsle-hardfloat |
|---|---|---|---|---|---|---|---|---|---|
| 链接后缀 | amd64v1 | amd64v3 | armv5 | armv6 | armv7 | armv8 | mips-softfloat | mipsle-softfloat | mipsle-hardfloat |
sing-box 内核 Linux 版下载链接后缀和 CPU 架构对应关系如下表:
| CPU 架构 | AMD64 | ARMv5 | ARMv6 | ARMv7 | ARMv8&ARM64&AArch64 | mips-softfloat | mipsle-softfloat |
|---|---|---|---|---|---|---|---|
| 链接后缀 | amd64 | armv5 | armv6 | armv7 | armv8 | mips-softfloat | mipsle-softfloat |
① 首次导入
连接 SSH 后执行如下命令:
# mihomo 内核 Meta 版curl -L https://ghfast.top/https://github.com/DustinWin/proxy-tools/releases/download/mihomo/mihomo-meta-linux-armv8.tar.gz| tar -zx -C /tmp/&& crash# mihomo 内核 Alpha 版curl -L https://ghfast.top/https://github.com/DustinWin/proxy-tools/releases/download/mihomo/mihomo-alpha-linux-armv8.tar.gz| tar -zx -C /tmp/&& crash# sing-box 内核 PuerNya 版curl -L https://ghfast.top/https://github.com/DustinWin/proxy-tools/releases/download/sing-box/sing-box-puernya-linux-armv8.tar.gz| tar -zx -C /tmp/&& crash# sing-box 内核 Release 版curl -L https://ghfast.top/https://github.com/DustinWin/proxy-tools/releases/download/sing-box/sing-box-release-linux-armv8.tar.gz| tar -zx -C /tmp/&& crash# sing-box 内核 Dev 版curl -L https://ghfast.top/https://github.com/DustinWin/proxy-tools/releases/download/sing-box/sing-box-dev-linux-armv8.tar.gz| tar -zx -C /tmp/&& crash
此时脚本会自动“发现可用的内核文件”,选择 1 加载,后选择对应的内核
② 升级导入(ShellCrash -> 9 更新/卸载 -> 2 切换内核文件,内核版本不会刷新)
连接 SSH 后执行如下命令:
# mihomo 内核 Meta 版curl -o$CRASHDIR/CrashCore.tar.gz -L https://ghfast.top/https://github.com/DustinWin/proxy-tools/releases/download/mihomo/mihomo-meta-linux-armv8.tar.gz&&$CRASHDIR/start.sh restart# mihomo 内核 Alpha 版curl -o$CRASHDIR/CrashCore.tar.gz -L https://ghfast.top/https://github.com/DustinWin/proxy-tools/releases/download/mihomo/mihomo-alpha-linux-armv8.tar.gz&&$CRASHDIR/start.sh restart# sing-box 内核 PuerNya 版curl -o$CRASHDIR/CrashCore.tar.gz -L https://ghfast.top/https://github.com/DustinWin/proxy-tools/releases/download/sing-box/sing-box-puernya-linux-armv8.tar.gz&&$CRASHDIR/start.sh restart# sing-box 内核 Release 版curl -o$CRASHDIR/CrashCore.tar.gz -L https://cdn.jsdelivr.net/gh/DustinWin/proxy-tools/@sing-box/sing-box-release-linux-armv8.tar.gz&&$CRASHDIR/start.sh restart# sing-box 内核 Dev 版curl -o$CRASHDIR/CrashCore.tar.gz -L https://ghfast.top/https://github.com/DustinWin/proxy-tools/releases/download/sing-box/sing-box-dev-linux-armv8.tar.gz&&$CRASHDIR/start.sh restart
Dashboard 面板对应文件名和网址关系如下表:
| 面板名称 | 文件名 | 网址 |
|---|---|---|
| yacd 面板 | yacd.tar.gz | https://yacd.haishan.me |
| Yacd-meta 面板 | Yacd-meta.tar.gz | https://yacd.metacubex.one |
| metacubexd 面板 | metacubexd.tar.gz | https://metacubex.github.io/metacubexd/ |
| zashboard 面板 | zashboard.tar.gz | https://board.zash.run.place |
连接 SSH 后执行如下命令:
curl -L https://ghfast.top/https://github.com/DustinWin/proxy-tools/releases/download/Dashboard/zashboard.tar.gz| tar -zx -C$CRASHDIR/ui/&&$CRASHDIR/start.sh restart
- 注:若使用基于Chromium 项目开发的浏览器打开网址去访问 Dashboard 面板时,以Chrome 浏览器为例,需要设置该网址域名“允许显示不安全内容”。方法如下:
进入设置 -> 隐私和安全 -> 网站设置 -> 更多内容设置 -> 不安全内容(或者地址栏直接打开 chrome://settings/content/insecureContent 进行设置),在“允许显示不安全内容”内添加网址域名如:board.zash.run.place
AdGuard Home Linux 版 CPU 架构和链接后缀对应关系如下表:
| CPU 架构 | AMD64 | ARMv5 | ARMv6 | ARMv7 | ARMv8 | mips-softfloat | mipsle-softfloat |
|---|---|---|---|---|---|---|---|
| 链接后缀 | amd64 | armv5 | armv6 | armv7 | armv8 | mips-softfloat | mipsle-softfloat |
① 安装 AdGuard Home
连接 SSH 后执行如下命令:
mkdir -p /data/AdGuardHome# AdGuard Home Release 版curl -o /data/AdGuardHome/AdGuardHome -L https://ghfast.top/https://github.com/DustinWin/proxy-tools/releases/download/AdGuardHome/AdGuardHome_release_linux_armv8# AdGuard Home Beta 版curl -o /data/AdGuardHome/AdGuardHome -L https://ghfast.top/https://github.com/DustinWin/proxy-tools/releases/download/AdGuardHome/AdGuardHome_beta_linux_armv8chmod +x /data/AdGuardHome/AdGuardHome/data/AdGuardHome/AdGuardHome -s install/data/AdGuardHome/AdGuardHome -s start# 将所有发往 53 端口的流量重定向到本地的 5353 端口iptables -t nat -A PREROUTING -p tcp --dport 53 -j REDIRECT --to-ports 5353iptables -t nat -A PREROUTING -p udp --dport 53 -j REDIRECT --to-ports 5353ip6tables -t nat -A PREROUTING -p tcp --dport 53 -j REDIRECT --to-ports 5353ip6tables -t nat -A PREROUTING -p udp --dport 53 -j REDIRECT --to-ports 5353# 添加开机启动cat<<EOF >> /data/auto_ssh/auto_ssh.shsleep 10s/data/AdGuardHome/AdGuardHome -s install/data/AdGuardHome/AdGuardHome -s startiptables -t nat -A PREROUTING -p tcp --dport 53 -j REDIRECT --to-ports 5353iptables -t nat -A PREROUTING -p udp --dport 53 -j REDIRECT --to-ports 5353ip6tables -t nat -A PREROUTING -p tcp --dport 53 -j REDIRECT --to-ports 5353ip6tables -t nat -A PREROUTING -p udp --dport 53 -j REDIRECT --to-ports 5353EOF
② 升级 AdGuard Home
连接 SSH 后执行如下命令:
# AdGuard Home Release 版curl -o /data/AdGuardHome/AdGuardHome -L https://ghgo.xyz/https://github.com/DustinWin/proxy-tools/releases/download/AdGuardHome/AdGuardHome_release_linux_armv8# AdGuard Home Beta 版curl -o /data/AdGuardHome/AdGuardHome -L https://ghgo.xyz/https://github.com/DustinWin/proxy-tools/releases/download/AdGuardHome/AdGuardHome_beta_linux_armv8/data/AdGuardHome/AdGuardHome -s restart
可在 ShellCrash 里添加定时更新 mihomo 内核、sing-box 内核、zashboard 面板和 AdGuard Home 的任务
- 连接 SSH 后执行
vi $CRASHDIR/task/task.user,按一下 Ins 键(Insert 键),粘贴如下内容:
注:
- 留意链接后缀是否与 CPU 架构匹配
- ShellCrash 安装路径为/data/ShellCrash
201#curl -o /data/ShellCrash/CrashCore.tar.gz -L https://ghfast.top/https://github.com/DustinWin/proxy-tools/releases/download/mihomo/mihomo-meta-linux-armv8.tar.gz&& /data/ShellCrash/start.sh restart>/dev/null2>&1#更新mihomo内核202#curl -o /data/ShellCrash/CrashCore.tar.gz -L https://ghfast.top/https://github.com/DustinWin/proxy-tools/releases/download/sing-box/sing-box-puernya-linux-armv8.tar.gz&& /data/ShellCrash/start.sh restart>/dev/null2>&1#更新sing-box_PuerNya版内核203#curl -o /data/ShellCrash/CrashCore.tar.gz -L https://ghfast.top/https://github.com/DustinWin/proxy-tools/releases/download/sing-box/sing-box-release-linux-armv8.tar.gz&& /data/ShellCrash/start.sh restart>/dev/null2>&1#更新sing-box内核204#curl -L https://ghfast.top/https://github.com/DustinWin/proxy-tools/releases/download/Dashboard/zashboard.tar.gz| tar -zx -C$CRASHDIR/ui/&& /data/ShellCrash/start.sh restart>/dev/null2>&1#更新zashboard面板205#curl -o /data/AdGuardHome/AdGuardHome -L https://ghfast.top/https://github.com/DustinWin/proxy-tools/releases/download/AdGuardHome/AdGuardHome_beta_linux_armv8&& /data/AdGuardHome/AdGuardHome -s restart>/dev/null2>&1#更新AdGuardHome
- 按一下 Esc 键(退出键),输入英文冒号
:,继续输入wq并回车 - 执行
crash,进入 ShellCrash -> 5 配置自动任务 -> 1 添加自动任务,可以看到末尾就有添加的定时任务,输入对应的数字并回车后可设置执行条件


Bitz Net(仅次于一线机场,推荐打折时购买)
85 折优惠码:2025DOWN85(有效期至 2025 年 11 月 1 日)
About
自动同步 mihomo 内核、sing-box 内核、sing-box PuerNya 版内核、Dashboard 面板和 AdGuard Home 最新版
Topics
Resources
Uh oh!
There was an error while loading.Please reload this page.
Stars
Watchers
Forks
Uh oh!
There was an error while loading.Please reload this page.