PshNET 4G


SUBMITTED BY: Pshnet

DATE: April 18, 2022, 10:59 p.m.

UPDATED: July 5, 2022, 5:36 p.m.

FORMAT: Text only

SIZE: 9.5 kB

HITS: 2371

  1. {
  2. "Version": "1.1.9",
  3. "ReleaseNotes": "🇧🇷Novas configurações nos servidores, atualize para se manter conectado (a)!",
  4. "UrlUpdate": "https://bitbin.it/PagPQRbt/raw/",
  5. "Sms": "https://bitbin.it/gT4Nm5RH/raw/",
  6. "EmailFeedback": "cloudzinmker@gmail.com",
  7. "UrlContato": "https://t.me/Pshnet",
  8. "UrlTermos": "https://www.google.com/search?q=speedtest&oq=speedtest&aqs=chrome..69i57j0i131i395i433i512l2j5i44i395j0i395i512j0i395i433i512j0i395i512l2.11520j1j4&client=ms-android-samsung-gj-rev1&sourceid=chrome-mobile&ie=UTF-8",
  9. "CheckUser": "true",
  10. "Udp": [
  11. {
  12. "Porta": "7300,7100,7200,7400"
  13. }
  14. ],
  15. "Servers": [
  16. {
  17. "Name": "BR-SV1 | PREMIUM",
  18. "TYPE": "premium",
  19. "FLAG": "br.png",
  20. "ServerIP": "brasil.pshnet.xyz",
  21. "CheckUser": "http:////129.159.54.232:8080/checkUser",
  22. "ServerPort": "22",
  23. "SSLPort": "443",
  24. "USER": "",
  25. "PASS": ""
  26. },
  27. {
  28. "Name": "BR-SV2 | FREE",
  29. "TYPE": "free",
  30. "FLAG": "br.png",
  31. "ServerIP": "x.pshnet.xyz",
  32. "CheckUser": "http://x.pshnet.xyz:5454/checkUser",
  33. "ServerPort": "22",
  34. "SSLPort": "443",
  35. "USER": "PshNET",
  36. "PASS": "18394WJEN"
  37. },
  38. ],
  39. "Networks": [
  40. {
  41. "Name": "INJECT PROXY 1",
  42. "FLAG": "vivo",
  43. "Payload": "GET wss://beneficios.vivo.com.br [protocol][crlf]Host: [app_host][crlf] Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  44. "SNI": "beneficios.vivo.com.br",
  45. "TlsIP": "beneficios.vivo.com.br",
  46. "ProxyIP": "",
  47. "ProxyPort": "443",
  48. "Info": "Tlsws"
  49. },
  50. {
  51. "Name": "INJECT PROXY 2",
  52. "FLAG": "Vivo",
  53. "Payload": "GET wss://gedoc.vivo.com.br [protocol][crlf]Host: [app_host][crlf] Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  54. "SNI": "gedoc.vivo.com.br",
  55. "TlsIP": "gedoc.vivo.com.br",
  56. "ProxyIP": "",
  57. "ProxyPort": "443",
  58. "Info": "proxy"
  59. },
  60. {
  61. "Name": "INJECT TLS 3",
  62. "FLAG": "vivo",
  63. "Payload": "GET wss://bi-router.movistar.com.ar [protocol][crlf]Host: [app_host][crlf] Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  64. "SNI": "bi-router.movistar.com.ar",
  65. "TlsIP": "bi-router.movistar.com.ar",
  66. "ProxyIP": "",
  67. "ProxyPort": "443",
  68. "Info": "Tlsws"
  69. },
  70. {
  71. "Name": "INJECT TLS 4",
  72. "FLAG": "vivo",
  73. "Payload": "GET wss://bi-router.movistar.com.ar [protocol][crlf]Host: [app_host][crlf] Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  74. "SNI": "bi-router.movistar.com.ar",
  75. "TlsIP": "104.18.6.80",
  76. "ProxyIP": "",
  77. "ProxyPort": "443",
  78. "Info": "Tlsws"
  79. },
  80. {
  81. "Name": "INJECT TLS 5",
  82. "FLAG": "vivo",
  83. "Payload": "GET wss://help.cloudflareclient.com/ HTTP/1.1[crlf]Host: [app_host][crlf]Connection: keep-alive[crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  84. "SNI": "help.cloudflareclient.com",
  85. "TlsIP": "vigia.vivo.com.br",
  86. "ProxyIP": "",
  87. "ProxyPort": "443",
  88. "Info": "Tlsws"
  89. },
  90. {
  91. "Name": "INJECT TLS 6",
  92. "FLAG": "claro",
  93. "Payload": "GET sni://ct.livestream.com HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Upgrade[crlf][crlf]",
  94. "SNI": "ct.livestream.com",
  95. "TlsIP": "ct.livestream.com",
  96. "ProxyIP": "",
  97. "ProxyPort": "443",
  98. "Info": "Tlsws"
  99. },
  100. {
  101. "Name": "INJECT TLS 7",
  102. "FLAG": "claro",
  103. "Payload": "GET wss://ct.livestream.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  104. "SNI": "ct.livestream.com",
  105. "TlsIP": "ct.livestream.com",
  106. "ProxyIP": "",
  107. "ProxyPort": "443",
  108. "Info": "Tlsws"
  109. },
  110. {
  111. "Name": "INJECT TLS 8",
  112. "FLAG": "claro",
  113. "Payload": "GET wss://go.kaltura.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  114. "SNI": "go.kaltura.com",
  115. "TlsIP": "go.kaltura.com",
  116. "ProxyIP": "",
  117. "ProxyPort": "443",
  118. "Info": "Tlsws"
  119. },
  120. {
  121. "Name": "INJECT TLS 9",
  122. "FLAG": "claro",
  123. "Payload": "GET wss://ct.livestream.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  124. "SNI": "ct.livestream.com",
  125. "TlsIP": "ct.livestream.com",
  126. "ProxyIP": "",
  127. "ProxyPort": "443",
  128. "Info": "Tlsws"
  129. },
  130. {
  131. "Name": "INJECT TLS 10",
  132. "FLAG": "claro",
  133. "Payload": "GET wss://content.akross.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  134. "SNI": "content.akross.com.br",
  135. "TlsIP": "content.akross.com.br",
  136. "ProxyIP": "",
  137. "ProxyPort": "443",
  138. "Info": "Tlsws"
  139. },
  140. {
  141. "Name": "INJECT PROXY 11",
  142. "FLAG": "tim",
  143. "Payload": "GET wss://static.r4you.co/ HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf][crlf]",
  144. "SNI": "static.r4you.co",
  145. "TlsIP": "static.r4you.co",
  146. "ProxyIP": "",
  147. "ProxyPort": "443",
  148. "Info": "Tlsws"
  149. },
  150. {
  151. "Name": "INJECT TLS 12",
  152. "FLAG": "tim",
  153. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  154. "SNI": "static.r4you.co",
  155. "TlsIP": "104.26.5.175",
  156. "ProxyIP": "",
  157. "ProxyPort": "443",
  158. "Info": "Tlsws"
  159. },
  160. {
  161. "Name": "INJECT TLS 13",
  162. "FLAG": "tim",
  163. "Payload": "GET ws://static.r4you.co HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  164. "SNI": "static.r4you.co",
  165. "TlsIP": "104.26.5.175",
  166. "ProxyIP": "",
  167. "ProxyPort": "443",
  168. "Info": "Tlsws"
  169. },
  170. {
  171. "Name": "INJECT TLS 14",
  172. "FLAG": "tim",
  173. "Payload": "GET / HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  174. "SNI": "[app_host]",
  175. "TlsIP": "104.16.18.94",
  176. "ProxyIP": "",
  177. "ProxyPort": "443",
  178. "Info": "Tlsws"
  179. },
  180. {
  181. "Name": "INJECT TLS 15",
  182. "FLAG": "tim",
  183. "Payload": "GET sni://cdnjs.cloudflare.com [protocol][crlf]Host: [app_host][crlf]X-Forwarded-For: [app_host][crlf]Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  184. "SNI": "cdnjs.cloudflare.com",
  185. "TlsIP": "104.16.19.94",
  186. "ProxyIP": "",
  187. "ProxyPort": "443",
  188. "Info": "Tlsws"
  189. },
  190. {
  191. "Name": "INJECT TLS 16",
  192. "FLAG": "tim",
  193. "Payload": "GET wss://cdnjs.cloudflare.com HTTP/1.1[crlf]Host: [app_host][crlf]Connection: Keep-alive[crlf]Upgrade: ws[crlf][crlf]",
  194. "SNI": "cdnjs.cloudflare.com",
  195. "TlsIP": "cdnjs.cloudflare.com",
  196. "ProxyIP": "",
  197. "ProxyPort": "443",
  198. "Info": "Tlsws"
  199. },
  200. {
  201. "Name": "INJECT TLS 17",
  202. "FLAG": "tim",
  203. "Payload": "GET wss://m.timbancavirtual.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  204. "SNI": "m.timbancavirtual.com.br",
  205. "TlsIP": "m.timbancavirtual.com.br",
  206. "ProxyIP": "",
  207. "ProxyPort": "443",
  208. "Info": "Tlsws"
  209. },
  210. {
  211. "Name": "INJECT TLS 18",
  212. "FLAG": "tim",
  213. "Payload": "GET ws://static.r4you.co HTTP/1.1\nHost: [app_host_proxy]\nUpgrade: ws\n\n",
  214. "SNI": "static.r4you.co",
  215. "TlsIP": "104.26.5.175",
  216. "ProxyIP": "",
  217. "ProxyPort": "443",
  218. "Info": "Tlsws"
  219. },
  220. {
  221. "Name": "INJECT TLS 19",
  222. "FLAG": "tim",
  223. "Payload": "GET wss://accesswdun.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  224. "SNI": "accesswdun.com",
  225. "TlsIP": "3cyber.com",
  226. "ProxyIP": "",
  227. "ProxyPort": "443",
  228. "Info": "Tlsws"
  229. },
  230. {
  231. "Name": "INJECT PROXY 20",
  232. "FLAG": "oi",
  233. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  234. "SNI": "oii.gdmhost.ga",
  235. "TlsIP": "www.hbogo.com.br",
  236. "ProxyIP": "www.hbogo.com.br",
  237. "ProxyPort": "80",
  238. "Info": "proxy"
  239. },
  240. {
  241. "Name": "INJECT TLS 21",
  242. "FLAG": "oi",
  243. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  244. "SNI": "www.hbogo.com.br",
  245. "TlsIP": "www.hbogo.com.br",
  246. "ProxyIP": "www.hbogo.com.br",
  247. "ProxyPort": "443",
  248. "Info": "Tlsws"
  249. },
  250. {
  251. "Name": "INJECT TLS 22",
  252. "FLAG": "oi",
  253. "Payload": "GET ws://www.hbogo.com.br HTTP/1.1\nHost: [app_host]\nUpgrade: ws[crlf]Sec-Websocket-Extensions: superspeed\n\n",
  254. "SNI": "www.hbogo.com.br",
  255. "TlsIP": "www.hbogo.com.br",
  256. "ProxyIP": "",
  257. "ProxyPort": "443",
  258. "Info": "Tlsws"
  259. },
  260. {
  261. "Name": "INJECT TLS 23",
  262. "FLAG": "oi",
  263. "Payload": "GET / HTTP/1.1[crlf]Host: [host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  264. "SNI": "[app_host]",
  265. "TlsIP": "104.16.51.91",
  266. "ProxyIP": "",
  267. "ProxyPort": "443",
  268. "Info": "Tlsws"
  269. }
  270. ]
  271. }

comments powered by Disqus