Isp dropping openvpn and wireguard

using Beryl-MT-1300 and have working wirguard/ovpn
I travel around and test wifi to home Beryl-mt-1300 ,so i get home dedicated ip
some isp are blocking ,dropping wireguard handshakes but allowing openvpn
some others have deep packet inspection and dropping both vpns openvpn and wireguard
already tried to use port 443 as inbound
using port 53 as inbound is not working for some reason ?
found few articles to use localproxy socks5 but im not using linux box at home and not sure if works
if any work arounds using Beryl-MT-1300 to get wireguard or openvpn when isp is dropping all ?

If they use DPI you can't get around it, I am sorry.

At least not with a default setup and without using plain OpenWrt.

What is a solution that can work to connect home VPN even with deep packet inspection drops
Is there a localhost setup

Shadowsocks might be helpful; but not supported in GL firmware.

From reading on red dit ,the handshake if routed via proxy can work but not fully understand it's setup via a tiny Linux server in cloud

Don’t know if this will help (fouling TG chat):

#!/bin/sh
echo "WARNING: Proceeding will modify network configurations."
read -p "Do you wish to continue? (y/n): " confirm && [[ $confirm == [yY] ]] || { echo "Aborted."; exit 1; }

read -p "Select mode: 1 for Client, 2 for Server: " mode

case $mode in
    1)
        read -p "Enter your Shadowsocks server IP: " SS_SERVER
        read -p "Enter your Shadowsocks server port: " SS_PORT
        read -p "Enter your Shadowsocks password: " SS_PASSWORD
        read -p "Enter your Shadowsocks encryption method (e.g., aes-256-cfb): " SS_METHOD
        
        opkg update
        opkg install shadowsocks-libev curl
        
        CONFIG_JSON=$(cat << END
        {
          "server":"$SS_SERVER",
          "server_port":$SS_PORT,
          "local_address": "127.0.0.1",
          "local_port":1080,
          "password":"$SS_PASSWORD",
          "timeout":300,
          "method":"$SS_METHOD"
        }
        END
        )
        
        echo "$CONFIG_JSON" > /etc/shadowsocks.json
        
        ss-local -c /etc/shadowsocks.json &
        
        echo "Client setup completed successfully."
        ;;
    
    2)
        read -p "Enter your Shadowsocks server port: " SS_PORT
        read -p "Enter your Shadowsocks password: " SS_PASSWORD
        read -p "Enter your Shadowsocks encryption method (e.g., aes-256-cfb): " SS_METHOD
        
        opkg update
        opkg install shadowsocks-libev
        
        SERVER_CONFIG="/etc/shadowsocks-server.json"
        cat << EOF > $SERVER_CONFIG
        {
          "server":"0.0.0.0",
          "server_port":$SS_PORT,
          "local_address": "127.0.0.1",
          "local_port":1080,
          "password":"$SS_PASSWORD",
          "timeout":300,
          "method":"$SS_METHOD"
        }
        EOF
        
        ss-server -c $SERVER_CONFIG &
        
        echo "Shadowsocks server started successfully."
        
        check_connection
        ;;
    
    *)
        echo "Invalid mode selected. Exiting."
        exit 1
        ;;
esac

revert_changes() {
    rm /etc/shadowsocks.json
    killall ss-local ss-server
    opkg remove shadowsocks-libev
    iptables -F
    ip route flush table 100
    ip rule del fwmark 0x01
    echo "Changes reverted."
}

check_connection() {
    wget --quiet --spider https://google.com &>/dev/null
    if [ $? -ne 0 ]; then
        echo "No Internet"
        read -p "Do you want to revert changes? (y/n): " revert_choice
        if [[ $revert_choice == [yY] ]]; then
            revert_changes
        else
            echo "Not reverting changes."
        fi
    fi
}

check_connection