Getting Started
MiniSocket is a lightweight, secure socket communication tool designed for encrypted data transfer with built-in protocol obfuscation. It's perfect for secure remote access, tunneling, and bypassing network restrictions.
Core Concepts
- Secret Key: Shared secret for authentication (like a password but more secure)
- Server: The endpoint that listens for incoming connections (mini-socketv2)
- Client: The tool that connects to the server (mini-ncv2)
- Port Forwarding: Redirect traffic from one network port to another
- Obfuscation: Make traffic look like normal web traffic
Installation
MiniSocket is available for Linux, macOS, and Windows. Installation is simple with our one-line installer.
Linux & macOS (Quick Install)
Windows Installation (PowerShell)
For Windows users, open PowerShell (preferably as Administrator) and run one of the following commands:
Manual Installation
If you prefer manual installation, download the binaries directly:
Mini-Upload v3.0.0-PRO
Secure Peer-to-Peer Relay Transfer Protocol
A professional-grade utility for atomic file transfers. By utilizing End-to-End Encryption (E2EE) and MiniSocket's relay nodes, it eliminates the need for port forwarding or complex VPN setups.
Server Usage
The mini-socketv2 binary runs the server that listens for incoming connections.
Basic Commands
Common Examples mini-socketv2
Common Examples mini-ncv2
Environment Variables
You can configure the server using environment variables:
| Variable | Description | Default |
|---|---|---|
MINI_PORT |
Listening port | 9000 |
MINI_ARGS |
Additional command line arguments | None |
Client Usage
The mini-ncv2 binary connects to a MiniSocket server.
Basic Commands
Common Examples
[+] Connected. Please enter to use
root@myserver:/#
Usage: mini-ncv2 [OPTIONS]
Options:
-s
-p
-h Show this help message
If no secret is provided via -s, you will be prompted to enter one.
Configuration
MiniSocket can be configured through command line arguments, environment variables, or configuration files.
Systemd Service
For Linux servers, create a systemd service file at /etc/systemd/system/minisocket.service:
[Unit] Description=MiniSocket Secure Tunnel After=network.target [Service] Type=simple User=minisocket ExecStart=/usr/bin/mini-socketv2 -k /etc/minisocket.key -d Restart=always RestartSec=5 [Install] WantedBy=multi-user.target
Then enable and start the service:
Tips & Trick
client@minisocket:~$ mini-ncv2 -s mysecret
client@minisocket:~$ mini-ncv2 -s mysecret -p 443
server@minisocket:~$ MINI_PORT=80 bash -c "$(curl -fsSL https://minisocket.io/bin/x)"
client@minisocket:~$ mini-ncv2 -s mysecret -p 80
server@minisocket:~$ MINI_PORT=22 bash -c "$(curl -fsSL https://minisocket.io/bin/x)"
client@minisocket:~$ mini-ncv2 -s mysecret -p 22
server@minisocket:~$ MINI_PORT=53 bash -c "$(curl -fsSL https://minisocket.io/bin/x)"
client@minisocket:~$ mini-ncv2 -s mysecret -p 53
client@minisocket:~$ mini-ncv2 -s mysecret -p 443
server@minisocket:~$ curl -fsSLk -o ms https://minisocket.io/bin/mini-socketv2 && chmod 755 ms && S=$(./ms -g) && MINI_PORT=80 MINI_ARGS="-s $S -d" ./ms && echo "Connect with: mini-ncv2 -s $S"
client@minisocket:~$ mini-ncv2 -s mysecret -p 80
server@minisocket:~$ curl -fsSLk -o ms https://minisocket.io/bin/mini-socketv2 && chmod 755 ms && S=$(./ms -g) && MINI_PORT=22 MINI_ARGS="-s $S -d" ./ms && echo "Connect with: mini-ncv2 -s $S"
client@minisocket:~$ mini-ncv2 -s mysecret -p 22
server@minisocket:~$ curl -fsSLk -o ms https://minisocket.io/bin/mini-socketv2 && chmod 755 ms && S=$(./ms -g) && MINI_PORT=53 MINI_ARGS="-s $S -d" ./ms && echo "Connect with: mini-ncv2 -s $S"
client@minisocket:~$ mini-ncv2 -s mysecret -p 53
Security Features
MiniSocket implements multiple layers of security to protect your communications.
Encryption
- AES-256 Encryption: Military-grade encryption for all communications
- Key Rotation: Encryption keys rotate every 60 seconds automatically
- Perfect Forward Secrecy: Ephemeral keys ensure past communications can't be decrypted if keys are compromised
- HMAC Authentication: All messages are authenticated to prevent tampering
Obfuscation Techniques
Protocol Mimicry
Traffic appears as normal HTTPS or WebSocket traffic to deep packet inspection systems.
Random Padding
All packets include random padding to prevent size-based analysis.
Traffic Shaping
Packet timing is randomized to prevent timing analysis attacks.
Port Hopping
Option to automatically switch ports periodically to evade blocking.
Best Practices
- Use long, random secrets (minimum 32 characters)
- Store secrets in files with restricted permissions (600)
- Run the server as a non-root user when possible
- Use port 443 (HTTPS) or 80 (HTTP) for best obfuscation
- Regularly rotate your secrets
- Monitor connection logs for unusual activity
Troubleshooting
Common Issues
Connection Timeout
Possible causes: Firewall blocking, wrong IP/port, server not running
Solution: Verify server is running, check firewall rules, try different ports (443, 80, 53)
Authentication Failed
Possible causes: Secret mismatch, key file permissions, encoding issues
Solution: Verify secret on both ends, check key file permissions (should be 600), ensure no extra whitespace
High Latency
Possible causes: Network congestion, server load, encryption overhead
Solution: Try different ports, reduce MTU size, check network routes