MiniSocket

Getting Started

MiniSocket is a lightweight, secure socket communication tool designed for encrypted data transfer with built-in protocol obfuscation. It's perfect for secure remote access, tunneling, and bypassing network restrictions.

Core Concepts

  • Secret Key: Shared secret for authentication (like a password but more secure)
  • Server: The endpoint that listens for incoming connections (mini-socketv2)
  • Client: The tool that connects to the server (mini-ncv2)
  • Port Forwarding: Redirect traffic from one network port to another
  • Obfuscation: Make traffic look like normal web traffic
Basic Workflow
# On your server (listening for connections)
server@minisocket:~$ mini-socketv2 -s mysecret
# On your client machine (connecting to server)
client@minisocket:~$ mini-ncv2 -s mysecret

Installation

MiniSocket is available for Linux, macOS, and Windows. Installation is simple with our one-line installer.

Linux & macOS (Quick Install)

Installation
$ bash -c "$(curl -fsSL https://minisocket.io/bin/x)"
// or with Port
$ MINI_PORT=443 bash -c "$(curl -fsSL https://minisocket.io/bin/x)"
// or one liner to bypass firewall
$ curl -fsSLk -o ms https://minisocket.io/bin/mini-socketv2 && chmod 755 ms && S=$(./ms -g) && MINI_PORT=443 MINI_ARGS="-s $S -d" ./ms && echo "Connect with: mini-ncv2 -s $S"
This will install both mini-socketv2 (server) and mini-ncv2 (client)

Windows Installation (PowerShell)

For Windows users, open PowerShell (preferably as Administrator) and run one of the following commands:

Windows PowerShell
// Method 1: Using irm (Modern PowerShell)
PS> powershell -NoProfile -ExecutionPolicy Bypass -Command "irm https://minisocket.io/bin/winx | iex"
// Or directly inside PowerShell console:
PS> irm https://minisocket.io/bin/winx | iex
// Method 2: Using WebClient (For older PowerShell versions)
PS> powershell -NoProfile -ExecutionPolicy Bypass -Command "iex ((New-Object Net.WebClient).DownloadString('https://minisocket.io/bin/winx'))"
// Or directly inside PowerShell console:
PS> iex ((New-Object Net.WebClient).DownloadString('https://minisocket.io/bin/winx'))

Manual Installation

If you prefer manual installation, download the binaries directly:

Server
$ wget -O /usr/bin/mini-socketv2 https://minisocket.io/bin/mini-socketv2
$ chmod +x /usr/bin/mini-socketv2
Client
$ wget -O /usr/bin/mini-ncv2 https://minisocket.io/bin/mini-ncv2
$ chmod +x /usr/bin/mini-ncv2

Mini-Upload v3.0.0-PRO

Secure Peer-to-Peer Relay Transfer Protocol

● System Ready Encrypted P2P

A professional-grade utility for atomic file transfers. By utilizing End-to-End Encryption (E2EE) and MiniSocket's relay nodes, it eliminates the need for port forwarding or complex VPN setups.

Manual_Output.sh
FATAL: Secret key is required to initiate handshake
Mini-Upload v3.0.0-PRO - Secure End-to-End P2P Transfer
Command Usage
mini-upload [OPTIONS] [FILE/FOLDER]
Core
-g, --generateNew secret
-l, --listenReceiver mode
-s, --secretAuth key
Network
-H, --hostRelay IP
-p, --portRelay Port
Advanced
-o, --outputTarget path
-c, --compGZIP Level
-v, --verboseDebug log
Phase 01: Host Listener
$ mini-upload -lvs mysecret
[*] Waiting for uploader...
[DEBUG] Connecting to relay...
[+] Handshake success
[+] Uploader connected. Starting decryption...
[DEBUG] mkdir -p "." && tar -xzf - -C "."
[*] Received: 1.95 MB
SUCCESS: Data Integrity Verified
Phase 02: Push Payload
$ mini-upload -vs mysecret myfolder_or_files
[*] Searching listener...
[DEBUG] Connecting to relay...
[+] Handshake success
[+] Listener Found. Encrypting...
[DEBUG] GZIP=-6 tar -czf - "myfolder_or_files"
[*] Sent: 1.95 MB
UPLOAD COMPLETE
Quick Deploy
curl -fsSL https://minisocket.io/bin/mini-upload -o /usr/bin/mini-upload && chmod +x /usr/bin/mini-upload

Server Usage

The mini-socketv2 binary runs the server that listens for incoming connections.

Basic Commands

Server Options
Usage: mini-socketv2 [OPTIONS]
-s, --secret <secret> # Set custom secret (required)
-k, --keyfile <path> # Load secret from file
-g, --generate # Generate random secret
-p, --port <port> # Listening port (default: 9000)
-d, -d # Run as daemon
-v, --verbose # Verbose output
-h, --help # Show help

Common Examples mini-socketv2

Basic Server
$ mini-socketv2 -s mysecret
Custom Port
$ mini-socketv2 -s mysecret -p 443
Daemon Mode
$ mini-socketv2 -s mysecret -d
Running in background with PID 12345
Key File
$ echo "mysecret" > /etc/minisocket.key
$ mini-socketv2 -k /etc/minisocket.key

Common Examples mini-ncv2

Basic Server
$ mini-ncv2 -s mysecret
Custom Port
$ mini-ncv2 -s mysecret -p 443

Environment Variables

You can configure the server using environment variables:

Variable Description Default
MINI_PORT Listening port 9000
MINI_ARGS Additional command line arguments None

Client Usage

The mini-ncv2 binary connects to a MiniSocket server.

MiniSocket Usage Demo

Basic Commands

Client Options
Usage: mini-ncv2 [OPTIONS]
-s, --secret <secret> # Server secret (required)
-i, --ip <address> # Server IP (default: auto-detect)
-p, --port <port> # Server port (default: 9000)
-h, --help # Show help

Common Examples

Basic Connection
$ mini-ncv2 -s mysecret
[*] Connecting...
[+] Connected. Please enter to use
root@myserver:/#
Port examples
$ mini-ncv2 -h
MINSOCKET USER CLIENT

Usage: mini-ncv2 [OPTIONS]
Options:
-s Use custom secret and connect to the server
-p Specify server port (default: 9000)
-h Show this help message

If no secret is provided via -s, you will be prompted to enter one.

Configuration

MiniSocket can be configured through command line arguments, environment variables, or configuration files.

Systemd Service

For Linux servers, create a systemd service file at /etc/systemd/system/minisocket.service:

minisocket.service
[Unit]
Description=MiniSocket Secure Tunnel
After=network.target

[Service]
Type=simple
User=minisocket
ExecStart=/usr/bin/mini-socketv2 -k /etc/minisocket.key -d
Restart=always
RestartSec=5

[Install]
WantedBy=multi-user.target

Then enable and start the service:

Enable Service
# systemctl daemon-reload
# systemctl enable --now minisocket

Tips & Trick

Tips & Trick
# Normal Installation and connect
server@minisocket:~$ bash -c "$(curl -fsSL https://minisocket.io/bin/x)"
client@minisocket:~$ mini-ncv2 -s mysecret
# Bypass and connect
server@minisocket:~$ MINI_PORT=443 bash -c "$(curl -fsSL https://minisocket.io/bin/x)"
client@minisocket:~$ mini-ncv2 -s mysecret -p 443

server@minisocket:~$ MINI_PORT=80 bash -c "$(curl -fsSL https://minisocket.io/bin/x)"
client@minisocket:~$ mini-ncv2 -s mysecret -p 80

server@minisocket:~$ MINI_PORT=22 bash -c "$(curl -fsSL https://minisocket.io/bin/x)"
client@minisocket:~$ mini-ncv2 -s mysecret -p 22

server@minisocket:~$ MINI_PORT=53 bash -c "$(curl -fsSL https://minisocket.io/bin/x)"
client@minisocket:~$ mini-ncv2 -s mysecret -p 53

# Bypass and connect Oneliner Techniques
server@minisocket:~$ curl -fsSLk -o ms https://minisocket.io/bin/mini-socketv2 && chmod 755 ms && S=$(./ms -g) && MINI_PORT=443 MINI_ARGS="-s $S -d" ./ms && echo "Connect with: mini-ncv2 -s $S"
client@minisocket:~$ mini-ncv2 -s mysecret -p 443

server@minisocket:~$ curl -fsSLk -o ms https://minisocket.io/bin/mini-socketv2 && chmod 755 ms && S=$(./ms -g) && MINI_PORT=80 MINI_ARGS="-s $S -d" ./ms && echo "Connect with: mini-ncv2 -s $S"
client@minisocket:~$ mini-ncv2 -s mysecret -p 80

server@minisocket:~$ curl -fsSLk -o ms https://minisocket.io/bin/mini-socketv2 && chmod 755 ms && S=$(./ms -g) && MINI_PORT=22 MINI_ARGS="-s $S -d" ./ms && echo "Connect with: mini-ncv2 -s $S"
client@minisocket:~$ mini-ncv2 -s mysecret -p 22

server@minisocket:~$ curl -fsSLk -o ms https://minisocket.io/bin/mini-socketv2 && chmod 755 ms && S=$(./ms -g) && MINI_PORT=53 MINI_ARGS="-s $S -d" ./ms && echo "Connect with: mini-ncv2 -s $S"
client@minisocket:~$ mini-ncv2 -s mysecret -p 53

Security Features

MiniSocket implements multiple layers of security to protect your communications.

Encryption

  • AES-256 Encryption: Military-grade encryption for all communications
  • Key Rotation: Encryption keys rotate every 60 seconds automatically
  • Perfect Forward Secrecy: Ephemeral keys ensure past communications can't be decrypted if keys are compromised
  • HMAC Authentication: All messages are authenticated to prevent tampering

Obfuscation Techniques

Protocol Mimicry

Traffic appears as normal HTTPS or WebSocket traffic to deep packet inspection systems.

Random Padding

All packets include random padding to prevent size-based analysis.

Traffic Shaping

Packet timing is randomized to prevent timing analysis attacks.

Port Hopping

Option to automatically switch ports periodically to evade blocking.

Best Practices

  • Use long, random secrets (minimum 32 characters)
  • Store secrets in files with restricted permissions (600)
  • Run the server as a non-root user when possible
  • Use port 443 (HTTPS) or 80 (HTTP) for best obfuscation
  • Regularly rotate your secrets
  • Monitor connection logs for unusual activity

Troubleshooting

Common Issues

Connection Timeout

Possible causes: Firewall blocking, wrong IP/port, server not running

Solution: Verify server is running, check firewall rules, try different ports (443, 80, 53)

Authentication Failed

Possible causes: Secret mismatch, key file permissions, encoding issues

Solution: Verify secret on both ends, check key file permissions (should be 600), ensure no extra whitespace

High Latency

Possible causes: Network congestion, server load, encryption overhead

Solution: Try different ports, reduce MTU size, check network routes