Aula4g


SUBMITTED BY: Faustino

DATE: July 1, 2022, 2:34 a.m.

UPDATED: June 27, 2024, 6:13 p.m.

FORMAT: Text only

SIZE: 9.2 kB

HITS: 2567

  1. on": "3.0.1",
  2. "ReleaseNotes": "",
  3. "UrlUpdate": "https://bitbin.it/0RQB6Ybb/raw/",
  4. "Sms": "",
  5. "EmailFeedback": "ailsonfaustino123@gmail.com",
  6. "UrlContato": "https://t.me/AilsonJ1",
  7. "UrlTermos": "null",
  8. "CheckUser": "true",
  9. "Udp": [
  10. {
  11. "Porta": "7300"
  12. }
  13. ],
  14. "Servers": [
  15. {
  16. "Name": "⚔AILSONVIP NET",
  17. "TYPE": "premium",
  18. "FLAG": "br.png",
  19. "ServerIP": "br1.ailson.online",
  20. "CheckUser": "http://38.9.117.79:5454/checkUser",
  21. "ServerPort": "22",
  22. "SSLPort": "443",
  23. "USER": "",
  24. "PASS": ""
  25. }
  26. ],
  27. "Networks": [
  28. {
  29. "Name": "INJECT PROXY 1",
  30. "FLAG": "vivo",
  31. "Payload": "GET wss://support.deezer.com// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  32. "SNI": "support.deezer.com",
  33. "TlsIP": "172.67.165.43",
  34. "ProxyIP": "",
  35. "ProxyPort": "443",
  36. "Info": "Tlsws"
  37. },
  38. {
  39. "Name": "INJECT PROXY 2",
  40. "FLAG": "vivo",
  41. "Payload": "GET wss://carrinho-pos-familia.vivo.com.br [protocol][crlf]Host: [app_host][crlf]X-Forwarded-For: [app_host][crlf]Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf][crlf]",
  42. "SNI": "carrinho-pos-familia.vivo.com.br",
  43. "TlsIP": "172.67.165.43",
  44. "ProxyIP": "",
  45. "ProxyPort": "443",
  46. "Info": "Tlsws"
  47. },
  48. {
  49. "Name": "INJECT PROXY 3",
  50. "FLAG": "vivo",
  51. "Payload": "GET wss://carrinho-pos-familia.vivo.com.br// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  52. "SNI": "carrinho-pos-familia.vivo.com.br",
  53. "TlsIP": "172.67.165.43",
  54. "ProxyIP": "",
  55. "ProxyPort": "443",
  56. "Info": "Tlsws"
  57. },
  58. {
  59. "Name": "INJECT TLS 4",
  60. "FLAG": "vivo",
  61. "Payload": "GET wss://carrinho-pos-familia.vivo.com.br// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  62. "SNI": "carrinho-pos-familia.vivo.com.br",
  63. "TlsIP": "172.67.165.43",
  64. "ProxyIP": "",
  65. "ProxyPort": "443",
  66. "Info": "Tlsws"
  67. },
  68. {
  69. "Name": "INJECT TLS 5",
  70. "FLAG": "vivo",
  71. "Payload": "GET wss://cdnjs.cloudflare.com [protocol][crlf]Host: [app_host][crlf] Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  72. "SNI": "cdnjs.cloudflare.com",
  73. "TlsIP": "172.67.165.43",
  74. "ProxyIP": "",
  75. "ProxyPort": "443",
  76. "Info": "Tlsws"
  77. },
  78. {
  79. "Name": "INJECT TLS 6",
  80. "FLAG": "vivo",
  81. "Payload": "GET wss://beneficios.vivo.com.br/ HTTP/1.1[crlf]Host: [app_host][crlf]Connection: keep-alive[crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  82. "SNI": "beneficios.vivo.com.br",
  83. "TlsIP": "172.67.165.43",
  84. "ProxyIP": "",
  85. "ProxyPort": "443",
  86. "Info": "Tlsws"
  87. },
  88. {
  89. "Name": "INJECT TLS 7",
  90. "FLAG": "claro",
  91. "Payload": "GET sni://go.kaltura.com HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Upgrade[crlf][crlf]",
  92. "SNI": "go.kaltura.com",
  93. "TlsIP": "go.kaltura.com",
  94. "ProxyIP": "",
  95. "ProxyPort": "443",
  96. "Info": "Tlsws"
  97. },
  98. {
  99. "Name": "INJECT TLS 8",
  100. "FLAG": "claro",
  101. "Payload": "GET wss://connect.kaltura.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  102. "SNI": "connect.kaltura.com",
  103. "TlsIP": "connect.kaltura.com",
  104. "ProxyIP": "",
  105. "ProxyPort": "443",
  106. "Info": "Tlsws"
  107. },
  108. {
  109. "Name": "INJECT TLS 9",
  110. "FLAG": "claro",
  111. "Payload": "GET wss://go.kaltura.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  112. "SNI": "go.kaltura.com",
  113. "TlsIP": "go.kaltura.com",
  114. "ProxyIP": "",
  115. "ProxyPort": "443",
  116. "Info": "Tlsws"
  117. },
  118. {
  119. "Name": "INJECT TLS 10",
  120. "FLAG": "claro",
  121. "Payload": "GET wss://go.kaltura.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  122. "SNI": "go.kaltura.com",
  123. "TlsIP": "go.kaltura.com",
  124. "ProxyIP": "",
  125. "ProxyPort": "443",
  126. "Info": "Tlsws"
  127. },
  128. {
  129. "Name": "INJECT TLS 11",
  130. "FLAG": "claro",
  131. "Payload": "GET wss://content.akross.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  132. "SNI": "content.akross.com.br",
  133. "TlsIP": "content.akross.com.br",
  134. "ProxyIP": "",
  135. "ProxyPort": "443",
  136. "Info": "Tlsws"
  137. },
  138. {
  139. "Name": "INJECT PROXY 12",
  140. "FLAG": "tim",
  141. "Payload": "GET wss://beringtime.com/ HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf][crlf]",
  142. "SNI": "beringtime.com",
  143. "TlsIP": "beringtime.com",
  144. "ProxyIP": "",
  145. "ProxyPort": "443",
  146. "Info": "Tlsws"
  147. },
  148. {
  149. "Name": "INJECT TLS 13",
  150. "FLAG": "tim",
  151. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  152. "SNI": "static.r4you.co",
  153. "TlsIP": "104.26.5.175",
  154. "ProxyIP": "",
  155. "ProxyPort": "443",
  156. "Info": "Tlsws"
  157. },
  158. {
  159. "Name": "INJECT TLS 14",
  160. "FLAG": "tim",
  161. "Payload": "GET ws://static.r4you.co HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  162. "SNI": "static.r4you.co",
  163. "TlsIP": "104.26.5.175",
  164. "ProxyIP": "",
  165. "ProxyPort": "443",
  166. "Info": "Tlsws"
  167. },
  168. {
  169. "Name": "INJECT TLS 15",
  170. "FLAG": "tim",
  171. "Payload": "GET / HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  172. "SNI": "[app_host]",
  173. "TlsIP": "104.16.18.94",
  174. "ProxyIP": "",
  175. "ProxyPort": "443",
  176. "Info": "Tlsws"
  177. },
  178. {
  179. "Name": "INJECT TLS 16",
  180. "FLAG": "tim",
  181. "Payload": "GET sni://cdnjs.cloudflare.com [protocol][crlf]Host: [app_host][crlf]X-Forwarded-For: [app_host][crlf]Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  182. "SNI": "cdnjs.cloudflare.com",
  183. "TlsIP": "104.16.19.94",
  184. "ProxyIP": "",
  185. "ProxyPort": "443",
  186. "Info": "Tlsws"
  187. },
  188. {
  189. "Name": "INJECT TLS 17",
  190. "FLAG": "tim",
  191. "Payload": "GET wss://cdnjs.cloudflare.com HTTP/1.1[crlf]Host: [app_host][crlf]Connection: Keep-alive[crlf]Upgrade: ws[crlf][crlf]",
  192. "SNI": "cdnjs.cloudflare.com",
  193. "TlsIP": "cdnjs.cloudflare.com",
  194. "ProxyIP": "",
  195. "ProxyPort": "443",
  196. "Info": "Tlsws"
  197. },
  198. {
  199. "Name": "INJECT TLS 18",
  200. "FLAG": "tim",
  201. "Payload": "GET wss://m.timbancavirtual.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  202. "SNI": "m.timbancavirtual.com.br",
  203. "TlsIP": "m.timbancavirtual.com.br",
  204. "ProxyIP": "",
  205. "ProxyPort": "443",
  206. "Info": "Tlsws"
  207. },
  208. {
  209. "Name": "INJECT TLS 19",
  210. "FLAG": "tim",
  211. "Payload": "GET ws://consultatim.com.br HTTP/1.1\nHost: [app_host_proxy]\nUpgrade: ws\n\n",
  212. "SNI": "consultatim.com.br",
  213. "TlsIP": "consultatim.com.br",
  214. "ProxyIP": "",
  215. "ProxyPort": "443",
  216. "Info": "Tlsws"
  217. },
  218. {
  219. "Name": "INJECT TLS 20",
  220. "FLAG": "tim",
  221. "Payload": "GET wss://accesswdun.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  222. "SNI": "accesswdun.com",
  223. "TlsIP": "3cyber.com",
  224. "ProxyIP": "",
  225. "ProxyPort": "443",
  226. "Info": "Tlsws"
  227. },
  228. {
  229. "Name": "INJECT PROXY 21",
  230. "FLAG": "oi",
  231. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  232. "SNI": "oii.gdmhost.ga",
  233. "TlsIP": "www.hbogo.com.br",
  234. "ProxyIP": "www.hbogo.com.br",
  235. "ProxyPort": "80",
  236. "Info": "proxy"
  237. },
  238. {
  239. "Name": "INJECT TLS 22",
  240. "FLAG": "oi",
  241. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  242. "SNI": "www.hbogo.com.br",
  243. "TlsIP": "www.hbogo.com.br",
  244. "ProxyIP": "www.hbogo.com.br",
  245. "ProxyPort": "443",
  246. "Info": "Tlsws"
  247. },
  248. {
  249. "Name": "INJECT TLS 23",
  250. "FLAG": "oi",
  251. "Payload": "GET ws://www.hbogo.com.br HTTP/1.1\nHost: [app_host]\nUpgrade: ws[crlf]Sec-Websocket-Extensions: superspeed\n\n",
  252. "SNI": "www.hbogo.com.br",
  253. "TlsIP": "www.hbogo.com.br",
  254. "ProxyIP": "",
  255. "ProxyPort": "443",
  256. "Info": "Tlsws"
  257. },
  258. {
  259. "Name": "INJECT TLS 24",
  260. "FLAG": "oi",
  261. "Payload": "GET / HTTP/1.1[crlf]Host: [host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  262. "SNI": "[app_host]",
  263. "TlsIP": "104.16.51.91",
  264. "ProxyIP": "",
  265. "ProxyPort": "443",
  266. "Info": "Tlsws"
  267. }
  268. ]
  269. }

comments powered by Disqus