Untitled


SUBMITTED BY: Gabrielferon

DATE: June 22, 2022, 6:18 p.m.

UPDATED: Aug. 7, 2022, 12:52 p.m.

FORMAT: Text only

SIZE: 5.2 kB

HITS: 828

  1. {
  2. "Version": "9.3.0",
  3. "ReleaseNotes": "NOVAS CONFIGURAÇÕES VIVO, TIM e CLARO e OI, CLIQUE EM ATUALIZAR",
  4. "UrlUpdate": "https://bitbin.it/VdR0BDTw/raw/",
  5. "Sms": "",
  6. "EmailFeedback": "gilbertoaparecidocaetano@gmail.com",
  7. "UrlContato": "https://wa.me/5515997338078",
  8. "UrlTermos": "https://kiritosshxd.github.io/Conecta4g_site/termos.html",
  9. "CheckUser": "true",
  10. "Udp": [
  11. {
  12. "Porta": "7100"
  13. },
  14. {
  15. "Porta": "7200"
  16. },
  17. {
  18. "Porta": "7300"
  19. },
  20. {
  21. "Porta": "7400"
  22. }
  23. ],
  24. "Servers": [
  25. {
  26. "Name": "SERVIDOR QNAX BR",
  27. "TYPE": "premium",
  28. "FLAG": "br.png",
  29. "ServerIP": "br.realnet1.xyz",
  30. "CheckUser": "http://45.162.230.253:5454/checkUser",
  31. "ServerPort": "22",
  32. "SSLPort": "443",
  33. "USER": "",
  34. "PASS": ""
  35. }
  36. ],
  37. "Networks": [
  38. {
  39. "Name": "VIVO NOVA 01",
  40. "FLAG": "vivo",
  41. "Payload": "GET / HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf][crlf]",
  42. "SNI": "",
  43. "TlsIP": "",
  44. "ProxyIP": "104.16.122.175",
  45. "ProxyPort": "80",
  46. "Info": "Proxy"
  47. },
  48. {
  49. "Name": "VIVO 05",
  50. "FLAG": "vivo",
  51. "Payload": "GET wss://unpkg.com/ HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf][crlf]",
  52. "SNI": "unpkg.com",
  53. "TlsIP": "unpkg.com",
  54. "ProxyIP": "",
  55. "ProxyPort": "443",
  56. "Info": "Tlsws"
  57. },
  58. {
  59. "Name": "🔴CLARO [07]",
  60. "FLAG": "claro",
  61. "Payload": "GET wss://4.icanhazip.com/
  62. HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf][crlf]",
  63. "SNI": "4.icanhazip.com",
  64. "TlsIP": "4.icanhazip.com",
  65. "ProxyIP": "4.icanhazip.com",
  66. "ProxyPort": "443",
  67. "Info": "Tlsws"
  68. },
  69. {
  70. "Name": "🔴CLARO [08]",
  71. "FLAG": "claro",
  72. "Payload": "GET wss://ipv4.icanhazip.com/
  73. HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf][crlf]",
  74. "SNI": "ipv4.icanhazip.com",
  75. "TlsIP": "ipv4.icanhazip.com",
  76. "ProxyIP": "ipv4.icanhazip.com",
  77. "ProxyPort": "443",
  78. "Info": "Tlsws"
  79. },
  80. {
  81. "Name": "INJECT TLS 9",
  82. "FLAG": "claro",
  83. "Payload": "GET wss://go.kaltura.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  84. "SNI": "go.kaltura.com",
  85. "TlsIP": "go.kaltura.com",
  86. "ProxyIP": "",
  87. "ProxyPort": "443",
  88. "Info": "Tlsws"
  89. },
  90. {
  91. "Name": "INJECT TLS 10",
  92. "FLAG": "claro",
  93. "Payload": "GET wss://go.kaltura.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  94. "SNI": "go.kaltura.com",
  95. "TlsIP": "go.kaltura.com",
  96. "ProxyIP": "",
  97. "ProxyPort": "443",
  98. "Info": "Tlsws"
  99. },
  100. {
  101. "Name": "INJECT TLS 11",
  102. "FLAG": "claro",
  103. "Payload": "GET wss://content.akross.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  104. "SNI": "content.akross.com.br",
  105. "TlsIP": "content.akross.com.br",
  106. "ProxyIP": "",
  107. "ProxyPort": "443",
  108. "Info": "Tlsws"
  109. },
  110. {
  111. "Name": "TIM [01]",
  112. "FLAG": "tim",
  113. "Payload": "GET wss://texugo.alura.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf][crlf]",
  114. "SNI": "texugo.alura.com.br",
  115. "TlsIP": "104.21.84.78",
  116. "ProxyIP": "",
  117. "ProxyPort": "443",
  118. "Info": "Tlsws"
  119. },
  120. {
  121. "Name": "TIM [02]",
  122. "FLAG": "tim",
  123. "Payload": "GET wss://static.r4you.co HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf][crlf]",
  124. "SNI": "static.r4you.co",
  125. "TlsIP": "104.26.5.175",
  126. "ProxyIP": "",
  127. "ProxyPort": "443",
  128. "Info": "Tlsws"
  129. },
  130. {
  131. "Name": "INJECT PROXY 21",
  132. "FLAG": "oi",
  133. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  134. "SNI": "oii.gdmhost.ga",
  135. "TlsIP": "www.hbogo.com.br",
  136. "ProxyIP": "www.hbogo.com.br",
  137. "ProxyPort": "80",
  138. "Info": "proxy"
  139. },
  140. {
  141. "Name": "INJECT TLS 22",
  142. "FLAG": "oi",
  143. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  144. "SNI": "www.hbogo.com.br",
  145. "TlsIP": "www.hbogo.com.br",
  146. "ProxyIP": "www.hbogo.com.br",
  147. "ProxyPort": "443",
  148. "Info": "Tlsws"
  149. },
  150. {
  151. "Name": "INJECT TLS 23",
  152. "FLAG": "oi",
  153. "Payload": "GET ws://www.hbogo.com.br HTTP/1.1\nHost: [app_host]\nUpgrade: ws[crlf]Sec-Websocket-Extensions: superspeed\n\n",
  154. "SNI": "www.hbogo.com.br",
  155. "TlsIP": "www.hbogo.com.br",
  156. "ProxyIP": "",
  157. "ProxyPort": "443",
  158. "Info": "Tlsws"
  159. },
  160. {
  161. "Name": "INJECT TLS 24",
  162. "FLAG": "oi",
  163. "Payload": "GET / HTTP/1.1[crlf]Host: [host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  164. "SNI": "[app_host]",
  165. "TlsIP": "104.16.51.91",
  166. "ProxyIP": "",
  167. "ProxyPort": "443",
  168. "Info": "Tlsws"
  169. }
  170. ]
  171. }

comments powered by Disqus