ATT CONECTA


SUBMITTED BY: isaias

DATE: June 9, 2022, 1:51 p.m.

UPDATED: Oct. 9, 2022, 4:18 p.m.

FORMAT: Text only

SIZE: 12.2 kB

HITS: 8505

  1. {
  2. "Version": "1.6.5",
  3. "ReleaseNotes": "🟢Novas configuraƧƵes foram Atualizadas. INJECT PROXY REGIƕES foi adicionado. FaƧa o teste em sua regiĆ£o.",
  4. "UrlUpdate": "https://bitbin.it/0sROAzUz/raw/",
  5. "Sms": "https://bitbin.it/oKgMpLx1/raw/",
  6. "EmailFeedback": "cloudzinmaker@gmail.com",
  7. "UrlContato": "https://t.me/satancloud",
  8. "UrlTermos": "https://linkmenu.cc/cloudrocket",
  9. "CheckUser": "true",
  10. "Udp": [
  11. {
  12. "Porta": "7300"
  13. }
  14. ],
  15. "Servers": [
  16. {
  17. "Name": "AUTOMATICO",
  18. "TYPE": "premium",
  19. "FLAG": "id.png",
  20. "ServerIP": "cloudzinssh.tk",
  21. "ServerIP": "cloudspacehost.tk",
  22. "ServerIP": "gregohostonline.tk",
  23. "CheckUser": "http://20.206.74.49:5454/checkUser",
  24. "ServerPort": "22",
  25. "SSLPort": "443",
  26. "USER": "",
  27. "PASS": ""
  28. },
  29. {
  30. "Name": "BR-SV1 | FREE",
  31. "TYPE": "premium",
  32. "FLAG": "br.png",
  33. "ServerIP": "vivo
  34. cloudeclypse.cf",
  35. "CheckUser": "http://cloudeclypse.cf:5454/checkUser",
  36. "ServerPort": "22",
  37. "SSLPort": "443",
  38. "USER": "",
  39. "PASS": ""
  40. },
  41. {
  42. "Name": "BR-SV2 | FREE",
  43. "TYPE": "premium",
  44. "FLAG": "br.png",
  45. "ServerIP": "pshnet.xyz",
  46. "CheckUser": "http://pshnet.xyz:5454/checkUser",
  47. "ServerPort": "22",
  48. "SSLPort": "443",
  49. "USER": "",
  50. "PASS": ""
  51. },
  52. {
  53. "Name": "BR-SV3 | FREE",
  54. "TYPE": "premium",
  55. "FLAG": "br.png",
  56. "ServerIP": "claro.cloudeclypse.cf",
  57. "CheckUser": "http://54.233.198.71:5454/checkUser",
  58. "ServerPort": "22",
  59. "SSLPort": "443",
  60. "USER": "",
  61. "PASS": ""
  62. },
  63. {
  64. "Name": "BR-SV4 | FREE",
  65. "TYPE": "premium",
  66. "FLAG": "br.png",
  67. "ServerIP": "tim.cloudeclypse.cf",
  68. "CheckUser": "http://br2.denyssnett.xyz:5454/checkUser",
  69. "ServerPort": "22",
  70. "SSLPort": "443",
  71. "USER": "",
  72. "PASS": ""
  73. },
  74. ],
  75. "Networks": [
  76. {
  77. "Name": "INJECT PROXY AZION 1",
  78. "FLAG": "vivo",
  79. "Payload": "GET / HTTP/1.1[crlf]Host: r3872bbdu8.map.azionedge.net[crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf][crlf]",
  80. "SNI": "",
  81. "TlsIP": "r3872bbdu8.map.azionedge.net",
  82. "ProxyIP": "r3872bbdu8.map.azionedge.net",
  83. "ProxyPort": "80",
  84. "Info": "Proxy"
  85. },
  86. {
  87. "Name": "INJECT DIGITEL",
  88. "FLAG": "vivo",
  89. "Payload": "CONNECT [host_port] [protocol][crlf]Host: [app_host][crlf]X-Online-Host: gprs.digitel.com.ve[crlf]X-Forwarded-For: gprs.digitel.com.ve[crlf]Connection: Keep-Alive[crlf]User-Agent: [ua][crlf][crlf]",
  90. "SNI": "planosvivointernet.com.br",
  91. "TlsIP": "65.8.214.21",
  92. "ProxyIP": "",
  93. "ProxyPort": "443",
  94. "Info": "Tlsws"
  95. },
  96. {
  97. "Name": "INJECT PROXY 3",
  98. "FLAG": "vivo",
  99. "Payload": "GET wss://equipamentos01.vivo.com.br/ HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  100. "SNI": "equipamentos01.vivo.com.br",
  101. "TlsIP": "172.67.165.43",
  102. "ProxyIP": "",
  103. "ProxyPort": "443",
  104. "Info": "Tlsws"
  105. },
  106. {
  107. "Name": "INJECT TLS 4",
  108. "FLAG": "vivo",
  109. "Payload": "GET wss://www.vivorio.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  110. "SNI": "www.vivorio.com.br",
  111. "TlsIP": "172.67.165.43",
  112. "ProxyIP": "",
  113. "ProxyPort": "443",
  114. "Info": "Tlsws"
  115. },
  116. {
  117. "Name": "INJECT TLS 5",
  118. "FLAG": "vivo",
  119. "Payload": "GET wss://backoffice-equipamentos01.vivo.com.br// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  120. "SNI": "backoffice-equipamentos01.vivo.com.br",
  121. "TlsIP": "172.67.165.43",
  122. "ProxyIP": "",
  123. "ProxyPort": "443",
  124. "Info": "Tlsws"
  125. },
  126. {
  127. "Name": "INJECT TLS 6",
  128. "FLAG": "vivo",
  129. "Payload": "GET / HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf][crlf]",
  130. "SNI": "",
  131. "TlsIP": "",
  132. "ProxyIP": "104.16.122.175",
  133. "ProxyPort": "80",
  134. "Info": "Proxy"
  135. },
  136. {
  137. "Name": "INJECT TLS 7",
  138. "FLAG": "vivo",
  139. "Payload": "GET wss://portaljud.vivo.com.br// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  140. "SNI": "portaljud.vivo.com.br",
  141. "TlsIP": "104.21.11.51",
  142. "ProxyIP": "",
  143. "ProxyPort": "443",
  144. "Info": "Tlsws"
  145. },
  146. {
  147. "Name": "INJECT TLS 8",
  148. "FLAG": "vivo",
  149. "Payload": "GET wss://support.deezer.com// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  150. "SNI": "support.deezer.com",
  151. "TlsIP": "104.21.11.51",
  152. "ProxyIP": "",
  153. "ProxyPort": "443",
  154. "Info": "Tlsws"
  155. },
  156. {
  157. "Name": "INJECT TLS 9",
  158. "FLAG": "vivo",
  159. "Payload": "GET wss://support.deezer.com// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  160. "SNI": "support.deezer.com",
  161. "TlsIP": "172.67.165.43",
  162. "ProxyIP": "",
  163. "ProxyPort": "443",
  164. "Info": "Tlsws"
  165. },
  166. {
  167. "Name": "INJECT TLS 10",
  168. "FLAG": "vivo",
  169. "Payload": "GET wss://vpoweb.vivo.com.br// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  170. "SNI": "vpoweb.vivo.com.br",
  171. "TlsIP": "104.16.57.6",
  172. "ProxyIP": "",
  173. "ProxyPort": "443",
  174. "Info": "Tlsws"
  175. },
  176. {
  177. "Name": "INJECT TLS 11",
  178. "FLAG": "claro",
  179. "Payload": "GET sni://4.icanhazip.com HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Upgrade[crlf][crlf]",
  180. "SNI": "4.icanhazip.com",
  181. "TlsIP": "4.icanhazip.com",
  182. "ProxyIP": "",
  183. "ProxyPort": "443",
  184. "Info": "Tlsws"
  185. },
  186. {
  187. "Name": "INJECT TLS 12",
  188. "FLAG": "claro",
  189. "Payload": "GET wss://ipv4.icanhazip.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  190. "SNI": "ipv4.icanhazip.com",
  191. "TlsIP": "ipv4.icanhazip.com",
  192. "ProxyIP": "",
  193. "ProxyPort": "443",
  194. "Info": "Tlsws"
  195. },
  196. {
  197. "Name": "INJECT TLS 13",
  198. "FLAG": "claro",
  199. "Payload": "GET wss://platzi.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  200. "SNI": "platiz.com",
  201. "TlsIP": "104.17.175.85",
  202. "ProxyIP": "",
  203. "ProxyPort": "443",
  204. "Info": "Tlsws"
  205. },
  206. {
  207. "Name": "INJECT TLS 14",
  208. "FLAG": "claro",
  209. "Payload": "GET wss://2403821-1.mediaspace.kaltura.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  210. "SNI": "2403821-1.mediaspace.kaltura.com",
  211. "TlsIP": "2403821-1.mediaspace.kaltura.com",
  212. "ProxyIP": "",
  213. "ProxyPort": "443",
  214. "Info": "Tlsws"
  215. },
  216. {
  217. "Name": "INJECT TLS 15",
  218. "FLAG": "claro",
  219. "Payload": "GET wss://content.akross.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  220. "SNI": "content.akross.com.br",
  221. "TlsIP": "content.akross.com.br",
  222. "ProxyIP": "",
  223. "ProxyPort": "443",
  224. "Info": "Tlsws"
  225. },
  226. {
  227. "Name": "INJECT PROXY 16",
  228. "FLAG": "tim",
  229. "Payload": "GET wss://texugo.alura.com.br/ HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf][crlf]",
  230. "SNI": "texugo.alura.com.br",
  231. "TlsIP": "104.21.84.78",
  232. "ProxyIP": "",
  233. "ProxyPort": "443",
  234. "Info": "Tlsws"
  235. },
  236. {
  237. "Name": "INJECT TLS 17",
  238. "FLAG": "tim",
  239. "Payload": "GET ws://blog.alura.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  240. "SNI": "blog.alura.com.br",
  241. "TlsIP": "104.26.5.175",
  242. "ProxyIP": "",
  243. "ProxyPort": "443",
  244. "Info": "Tlsws"
  245. },
  246. {
  247. "Name": "INJECT TLS 18",
  248. "FLAG": "tim",
  249. "Payload": "GET ws://blog.alura.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  250. "SNI": "static.r4you.co",
  251. "TlsIP": "104.21.84.78",
  252. "ProxyIP": "",
  253. "ProxyPort": "443",
  254. "Info": "Tlsws"
  255. },
  256. {
  257. "Name": "INJECT TLS 19",
  258. "FLAG": "tim",
  259. "Payload": "GET ws://empresas.alura.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  260. "SNI": empresas.alura.com.br",
  261. "TlsIP": "104.18.40.41",
  262. "ProxyIP": "",
  263. "ProxyPort": "443",
  264. "Info": "Tlsws"
  265. },
  266. {
  267. "Name": "INJECT TLS 20",
  268. "FLAG": "tim",
  269. "Payload": "GET sni://cdnjs.cloudflare.com [protocol][crlf]Host: [app_host][crlf]X-Forwarded-For: [app_host][crlf]Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  270. "SNI": "cdnjs.cloudflare.com",
  271. "TlsIP": "104.16.19.94",
  272. "ProxyIP": "",
  273. "ProxyPort": "443",
  274. "Info": "Tlsws"
  275. },
  276. {
  277. "Name": "INJECT TLS 21",
  278. "FLAG": "tim",
  279. "Payload": "GET wss://cdnjs.cloudflare.com HTTP/1.1[crlf]Host: [app_host][crlf]Connection: Keep-alive[crlf]Upgrade: ws[crlf][crlf]",
  280. "SNI": "cdnjs.cloudflare.com",
  281. "TlsIP": "cdnjs.cloudflare.com",
  282. "ProxyIP": "",
  283. "ProxyPort": "443",
  284. "Info": "Tlsws"
  285. },
  286. {
  287. "Name": "INJECT TLS 22",
  288. "FLAG": "tim",
  289. "Payload": "GET wss://m.timbancavirtual.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  290. "SNI": "m.timbancavirtual.com.br",
  291. "TlsIP": "m.timbancavirtual.com.br",
  292. "ProxyIP": "",
  293. "ProxyPort": "443",
  294. "Info": "Tlsws"
  295. },
  296. {
  297. "Name": "INJECT TLS 23",
  298. "FLAG": "tim",
  299. "Payload": "GET ws://consultatim.com.br HTTP/1.1\nHost: [app_host_proxy]\nUpgrade: ws\n\n",
  300. "SNI": "consultatim.com.br",
  301. "TlsIP": "consultatim.com.br",
  302. "ProxyIP": "",
  303. "ProxyPort": "443",
  304. "Info": "Tlsws"
  305. },
  306. {
  307. "Name": "INJECT TLS 24",
  308. "FLAG": "tim",
  309. "Payload": "GET wss://accesswdun.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  310. "SNI": "accesswdun.com",
  311. "TlsIP": "3cyber.com",
  312. "ProxyIP": "",
  313. "ProxyPort": "443",
  314. "Info": "Tlsws"
  315. },
  316. {
  317. "Name": "INJECT PROXY 25",
  318. "FLAG": "oi",
  319. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  320. "SNI": "oii.gdmhost.ga",
  321. "TlsIP": "www.hbogo.com.br",
  322. "ProxyIP": "www.hbogo.com.br",
  323. "ProxyPort": "80",
  324. "Info": "proxy"
  325. },
  326. {
  327. "Name": "INJECT TLS 26",
  328. "FLAG": "oi",
  329. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  330. "SNI": "www.hbogo.com.br",
  331. "TlsIP": "www.hbogo.com.br",
  332. "ProxyIP": "www.hbogo.com.br",
  333. "ProxyPort": "443",
  334. "Info": "Tlsws"
  335. },
  336. {
  337. "Name": "INJECT TLS 27",
  338. "FLAG": "oi",
  339. "Payload": "GET ws://www.hbogo.com.br HTTP/1.1\nHost: [app_host]\nUpgrade: ws[crlf]Sec-Websocket-Extensions: superspeed\n\n",
  340. "SNI": "www.hbogo.com.br",
  341. "TlsIP": "www.hbogo.com.br",
  342. "ProxyIP": "",
  343. "ProxyPort": "443",
  344. "Info": "Tlsws"
  345. },
  346. {
  347. "Name": "INJECT TLS 28",
  348. "FLAG": "oi",
  349. "Payload": "GET / HTTP/1.1[crlf]Host: [host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  350. "SNI": "[app_host]",
  351. "TlsIP": "104.16.51.91",
  352. "ProxyIP": "",
  353. "ProxyPort": "443",
  354. "Info": "Tlsws"
  355. }
  356. ]
  357. }

comments powered by Disqus