Skip to content

ZloyTeam Knowledge Base

Welcome to the official documentation for ZloyTeam products.

Here you will find detailed instructions on deploying, configuring, and using our ecosystem of solutions for deep traffic anonymization and ensuring stable operation with modern WAFs and advanced anti-fraud systems.

Select the product you’re interested in to get started:


🖲️ ZloyRouter

Hardware gateway for client-side traffic anonymization (Raspberry Pi)

Software that turns a microcomputer into a specialized network gateway. The ideal solution for creating a “clean” local environment, physical protection against leaks (Kill Switch), and routing all device traffic (WebRTC, DNS, QUIC) without installing software on workstations.


⚡ ZloyProxy

Proxy server for emulating application-level fingerprints (TLS / HTTP/2)

Specialized server software for successfully passing checks by Cloudflare, Akamai, and other modern WAFs. ZloyProxy emulates TLS (JA3/JA4) and HTTP/2 fingerprints, allowing your automated traffic to achieve the maximum Trust Score, identical to requests from real browsers (Chrome, Safari, Firefox).


🧬 ZloyTrinity

Deep network fingerprint spoofing kernel (TCP/IP / p0f)

Server software running at the lowest level—the OS kernel level. Trinity modifies the structure of network packets (TTL, Window Size, MSS, TCP parameters), allowing a server (e.g., on Linux) to emit passive fingerprints (Passive OS Fingerprinting) identical to those of target operating systems (Windows, macOS, Android, iOS).


💡 How do the products work together?

ZloyTeam solutions can be used either separately or as a single ecosystem to achieve 100% obfuscation across all layers of the OSI model:

  1. ZloyRouter (At Home/In the Office): Encapsulates traffic from physical devices into a secure tunnel, hiding local leaks.
  2. ZloyTrinity (On the server): Masks the server itself, making its network packets indistinguishable from those of a regular user (TCP/IP).
  3. ZloyProxy (On the server): Receives traffic and generates perfect TLS and HTTP/2 requests to end-user sites.

💬 Still have questions?
Contact our support on Telegram: @zl0y0 or visit our official website: zl0y.team.