Network Proxy Client Supported by Tuic Protocol

What is the TUIC Protocol? #

The TUIC protocol is a network protocol written in the Rust programming language. Rust is a very fast and secure programming language comparable to C, making the TUIC protocol equally safe and stable.

  • TUIC is built on top of the QUIC protocol
  • TUIC consumes fewer resources, runs efficiently, and is suitable for large-scale projects such as games
  • TUIC is highly secure, ideal for transmitting sensitive data
  • TUIC is difficult to detect
  • TUIC is suitable for scenarios like bypassing internet censorship, live video streaming, game acceleration, and voice calls

1. Windows Clients — v2rayN, Hiddify Next #

  1. v2rayN nekobox-21001.jpg

v2rayN is a Windows client based on the V2Ray core, featuring a graphical interface and supporting multiple protocols such as TUIC, Hysteria2, VLESS, VMess, Shadowsocks (SS), Trojan, SOCKS, and more. Its primary purpose is to provide network proxy services, encrypt traffic, evade censorship, and remain undetected — making it an excellent tool for bypassing internet restrictions.

  1. Hiddify Next nekobox-21001.jpg

Hiddify Next is a multi-protocol proxy application based on Sing-box, allowing users to access the internet securely and privately. It supports various proxy protocols, including TUIC, VLESS, VMess, SS, Trojan, HTTP, and Hysteria2.

2. Android Clients — Nekobox, Hiddify Next #

  1. Nekobox Nekobox is a network proxy tool based on the Sing-box core, supporting multiple protocols including the latest TUIC. It has both Android and Windows versions.
  1. Hiddify Next Hiddify Next also offers Android and macOS versions.

3. iOS Clients — Stash, Surge #

  1. Stash nekobox-21001.jpg

Stash is a network proxy tool for Apple devices, based on the Clash core. It’s very popular among iOS users, but downloading requires an overseas Apple ID.

  1. Surge Surge is another network proxy tool for Apple devices, supporting multiple protocols.
  • The following services charge based on data usage. Installation and usage tutorials for the software are available on the websites.
  • After purchasing data, there are no time limits; the data is valid until it’s used up.
Name Price Data Nodes
Maojie 1 Yuan 2G 48
Pikachu 4.5 Yuan 10G 42
Net Express 7 Yuan 20G 54
Feiniaoyun 10 Yuan 200G 30
Yifen 12 Yuan 100G 40
Nongfu Spring 15 Yuan 200G 30
Niubi 13 Yuan 200G 41
Xinggui 12 Yuan 60G 57
Mineral Water 70 Yuan 80G 43
ChaoShihui 34 Yuan 666G 40
Colosseo 30 Yuan 200G 27
Xinglian 15 Yuan 1000G 40
Feitu 30 Yuan 100G 80
ofopp 40 Yuan 100G 70
Qiansu Mao 68 Yuan 512G 46
Naiyun 98 Yuan 280G 140
  • Languages English