Untitled


SUBMITTED BY: Fabioassis

DATE: June 7, 2022, 4:26 p.m.

UPDATED: July 8, 2022, 9:54 p.m.

FORMAT: Text only

SIZE: 11.0 kB

HITS: 2667

  1. {
  2. "Version": "4.1.1",
  3. "ReleaseNotes": "Nova Atualização Disponível",
  4. "UrlUpdate": "https://bitbin.it/WAxLcsvD/raw/",
  5. "Sms": "https://bitbin.it/AQnugEkU/raw/",
  6. "EmailFeedback": "fabioriohockey@gmail.com",
  7. "UrlContato": "",
  8. "UrlTermos": "",
  9. "CheckUser": "true",
  10. "UdpPort": "7300;7500;7295;7296;7200;7297;7298;7299;7400",
  11. "Servers": [
  12. {
  13. "Name": "MONKEY CONNECT PREMIUM 1",
  14. "TYPE": "premium",
  15. "FLAG": "br.png",
  16. "ServerIP": "csconncet.online",
  17. "CheckUser": "http://152.67.43.16:5454/checkUser",
  18. "ServerPort": "22",
  19. "SSLPort": "443",
  20. "USER": "",
  21. "PASS": ""
  22. },
  23. {
  24. "Name": "MONKEY CONNECT NOVO",
  25. "TYPE": "premium",
  26. "FLAG": "br.png",
  27. "ServerIP":"monkey.netdoscria.online",
  28. "CheckUser": "http://152.67.48.168:5454/checkUser",
  29. "ServerPort": "22",
  30. "SSLPort": "443",
  31. "USER": "",
  32. "PASS": ""
  33. }
  34. ],
  35. "Networks": [
  36. {
  37. "Name": "BR-SV1 | FREE",
  38. "TYPE": "premium",
  39. "FLAG": "br.png",
  40. "ServerIP": "monkey.netdoscria.online",
  41. "CheckUser": "http://br1.secondvpn.tk:5454/checkUser",
  42. "ServerPort": "22",
  43. "SSLPort": "443",
  44. "USER": "",
  45. "PASS": ""
  46. },
  47. {
  48. "Name": "BR-SV2 | FREE",
  49. "TYPE": "premium",
  50. "FLAG": "br.png",
  51. "ServerIP": "monkey.netdoscria.online",
  52. "CheckUser": "http://20.201.116.160:8888/server/online",
  53. "ServerPort": "22",
  54. "SSLPort": "443",
  55. "USER": "",
  56. "PASS": ""
  57. },
  58. {
  59. "Name": "BR-SV3 | FREE",
  60. "TYPE": "premium",
  61. "FLAG": "br.png",
  62. "ServerIP": "monkey.netdoscria.online",
  63. "CheckUser": "http://40.69.163.63:5454/checkUser",
  64. "ServerPort": "22",
  65. "SSLPort": "443",
  66. "USER": "",
  67. "PASS": ""
  68. },
  69. {
  70. "Name": "CA-SV4 | FREE",
  71. "TYPE": "free",
  72. "FLAG": "ca.png",
  73. "ServerIP": "monkey.netdoscria.online",
  74. "CheckUser": "http://cas-2.opensvr.net:5454/checkUser",
  75. "ServerPort": "22",
  76. "SSLPort": "443",
  77. "USER": "",
  78. "PASS": ""
  79. },
  80. {
  81. "Name": "US-SV5 | FREE",
  82. "TYPE": "free",
  83. "FLAG": "us.png",
  84. "ServerIP": "monkey.netdoscria.online",
  85. "CheckUser": "http://uss-3.opensvr.net:5454/checkUser",
  86. "ServerPort": "22",
  87. "SSLPort": "443",
  88. "USER": "",
  89. "PASS": ""
  90. },
  91. ],
  92. "Networks": [
  93. {
  94. "Name": "INJECT PROXY 1",
  95. "FLAG": "vivo",
  96. "Payload": "GET wss://unpkg.com// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  97. "SNI": "unpkg.com",
  98. "TlsIP": "unpkg.com",
  99. "ProxyIP": "",
  100. "ProxyPort": "443",
  101. "Info": "Tlsws"
  102. },
  103. {
  104. "Name": "INJECT PROXY 2",
  105. "FLAG": "vivo",
  106. "Payload": "GET wss://carrinho-pos-familia.vivo.com.br [protocol][crlf]Host: [app_host][crlf]X-Forwarded-For: [app_host][crlf]Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf][crlf]",
  107. "SNI": "carrinho-pos-familia.vivo.com.br",
  108. "TlsIP": "172.67.165.43",
  109. "ProxyIP": "",
  110. "ProxyPort": "443",
  111. "Info": "Tlsws"
  112. },
  113. {
  114. "Name": "INJECT PROXY 3",
  115. "FLAG": "vivo",
  116. "Payload": "GET wss://carrinho-pos-familia.vivo.com.br// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  117. "SNI": "carrinho-pos-familia.vivo.com.br",
  118. "TlsIP": "172.67.165.43",
  119. "ProxyIP": "",
  120. "ProxyPort": "443",
  121. "Info": "Tlsws"
  122. },
  123. {
  124. "Name": "INJECT TLS 4",
  125. "FLAG": "vivo",
  126. "Payload": "GET wss://carrinho-pos-familia.vivo.com.br// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  127. "SNI": "carrinho-pos-familia.vivo.com.br",
  128. "TlsIP": "172.67.165.43",
  129. "ProxyIP": "",
  130. "ProxyPort": "443",
  131. "Info": "Tlsws"
  132. },
  133. {
  134. "Name": "INJECT TLS 5",
  135. "FLAG": "vivo",
  136. "Payload": "GET wss://cdnjs.cloudflare.com [protocol][crlf]Host: [app_host][crlf] Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  137. "SNI": "cdnjs.cloudflare.com",
  138. "TlsIP": "172.67.165.43",
  139. "ProxyIP": "",
  140. "ProxyPort": "443",
  141. "Info": "Tlsws"
  142. },
  143. {
  144. "Name": "INJECT TLS 6",
  145. "FLAG": "vivo",
  146. "Payload": "GET wss://live.vivo.com.br/ HTTP/1.1[crlf]Host: [app_host][crlf]Connection: keep-alive[crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  147. "SNI": "live.vivo.com.br",
  148. "TlsIP": "172.67.165.43",
  149. "ProxyIP": "",
  150. "ProxyPort": "443",
  151. "Info": "Tlsws"
  152. },
  153. {
  154. "Name": "INJECT TLS 7",
  155. "FLAG": "claro",
  156. "Payload": "GET sni://go.kaltura.com HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Upgrade[crlf][crlf]",
  157. "SNI": "go.kaltura.com",
  158. "TlsIP": "go.kaltura.com",
  159. "ProxyIP": "",
  160. "ProxyPort": "443",
  161. "Info": "Tlsws"
  162. },
  163. {
  164. "Name": "INJECT TLS 8",
  165. "FLAG": "claro",
  166. "Payload": "GET wss://connect.kaltura.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  167. "SNI": "connect.kaltura.com",
  168. "TlsIP": "connect.kaltura.com",
  169. "ProxyIP": "",
  170. "ProxyPort": "443",
  171. "Info": "Tlsws"
  172. },
  173. {
  174. "Name": "INJECT TLS 9",
  175. "FLAG": "claro",
  176. "Payload": "GET wss://go.kaltura.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  177. "SNI": "go.kaltura.com",
  178. "TlsIP": "go.kaltura.com",
  179. "ProxyIP": "",
  180. "ProxyPort": "443",
  181. "Info": "Tlsws"
  182. },
  183. {
  184. "Name": "INJECT TLS 10",
  185. "FLAG": "claro",
  186. "Payload": "GET wss://go.kaltura.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  187. "SNI": "go.kaltura.com",
  188. "TlsIP": "go.kaltura.com",
  189. "ProxyIP": "",
  190. "ProxyPort": "443",
  191. "Info": "Tlsws"
  192. },
  193. {
  194. "Name": "INJECT TLS 11",
  195. "FLAG": "claro",
  196. "Payload": "GET wss://content.akross.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  197. "SNI": "content.akross.com.br",
  198. "TlsIP": "content.akross.com.br",
  199. "ProxyIP": "",
  200. "ProxyPort": "443",
  201. "Info": "Tlsws"
  202. },
  203. {
  204. "Name": "INJECT PROXY 12",
  205. "FLAG": "tim",
  206. "Payload": "GET wss://beringtime.com/ HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf][crlf]",
  207. "SNI": "beringtime.com",
  208. "TlsIP": "beringtime.com",
  209. "ProxyIP": "",
  210. "ProxyPort": "443",
  211. "Info": "Tlsws"
  212. },
  213. {
  214. "Name": "INJECT TLS 13",
  215. "FLAG": "tim",
  216. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  217. "SNI": "static.r4you.co",
  218. "TlsIP": "104.26.5.175",
  219. "ProxyIP": "",
  220. "ProxyPort": "443",
  221. "Info": "Tlsws"
  222. },
  223. {
  224. "Name": "INJECT TLS 14",
  225. "FLAG": "tim",
  226. "Payload": "GET ws://static.r4you.co HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  227. "SNI": "static.r4you.co",
  228. "TlsIP": "104.26.5.175",
  229. "ProxyIP": "",
  230. "ProxyPort": "443",
  231. "Info": "Tlsws"
  232. },
  233. {
  234. "Name": "INJECT TLS 15",
  235. "FLAG": "tim",
  236. "Payload": "GET / HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  237. "SNI": "[app_host]",
  238. "TlsIP": "104.16.18.94",
  239. "ProxyIP": "",
  240. "ProxyPort": "443",
  241. "Info": "Tlsws"
  242. },
  243. {
  244. "Name": "INJECT TLS 16",
  245. "FLAG": "tim",
  246. "Payload": "GET sni://cdnjs.cloudflare.com [protocol][crlf]Host: [app_host][crlf]X-Forwarded-For: [app_host][crlf]Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  247. "SNI": "cdnjs.cloudflare.com",
  248. "TlsIP": "104.16.19.94",
  249. "ProxyIP": "",
  250. "ProxyPort": "443",
  251. "Info": "Tlsws"
  252. },
  253. {
  254. "Name": "INJECT TLS 17",
  255. "FLAG": "tim",
  256. "Payload": "GET wss://cdnjs.cloudflare.com HTTP/1.1[crlf]Host: [app_host][crlf]Connection: Keep-alive[crlf]Upgrade: ws[crlf][crlf]",
  257. "SNI": "cdnjs.cloudflare.com",
  258. "TlsIP": "cdnjs.cloudflare.com",
  259. "ProxyIP": "",
  260. "ProxyPort": "443",
  261. "Info": "Tlsws"
  262. },
  263. {
  264. "Name": "INJECT TLS 18",
  265. "FLAG": "tim",
  266. "Payload": "GET wss://m.timbancavirtual.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  267. "SNI": "m.timbancavirtual.com.br",
  268. "TlsIP": "m.timbancavirtual.com.br",
  269. "ProxyIP": "",
  270. "ProxyPort": "443",
  271. "Info": "Tlsws"
  272. },
  273. {
  274. "Name": "INJECT TLS 19",
  275. "FLAG": "tim",
  276. "Payload": "GET ws://consultatim.com.br HTTP/1.1\nHost: [app_host_proxy]\nUpgrade: ws\n\n",
  277. "SNI": "consultatim.com.br",
  278. "TlsIP": "consultatim.com.br",
  279. "ProxyIP": "",
  280. "ProxyPort": "443",
  281. "Info": "Tlsws"
  282. },
  283. {
  284. "Name": "INJECT TLS 20",
  285. "FLAG": "tim",
  286. "Payload": "GET wss://accesswdun.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  287. "SNI": "accesswdun.com",
  288. "TlsIP": "3cyber.com",
  289. "ProxyIP": "",
  290. "ProxyPort": "443",
  291. "Info": "Tlsws"
  292. },
  293. {
  294. "Name": "INJECT PROXY 21",
  295. "FLAG": "oi",
  296. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  297. "SNI": "oii.gdmhost.ga",
  298. "TlsIP": "www.hbogo.com.br",
  299. "ProxyIP": "www.hbogo.com.br",
  300. "ProxyPort": "80",
  301. "Info": "proxy"
  302. },
  303. {
  304. "Name": "INJECT TLS 22",
  305. "FLAG": "oi",
  306. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  307. "SNI": "www.hbogo.com.br",
  308. "TlsIP": "www.hbogo.com.br",
  309. "ProxyIP": "www.hbogo.com.br",
  310. "ProxyPort": "443",
  311. "Info": "Tlsws"
  312. },
  313. {
  314. "Name": "INJECT TLS 23",
  315. "FLAG": "oi",
  316. "Payload": "GET ws://www.hbogo.com.br HTTP/1.1\nHost: [app_host]\nUpgrade: ws[crlf]Sec-Websocket-Extensions: superspeed\n\n",
  317. "SNI": "www.hbogo.com.br",
  318. "TlsIP": "www.hbogo.com.br",
  319. "ProxyIP": "",
  320. "ProxyPort": "443",
  321. "Info": "Tlsws"
  322. },
  323. {
  324. "Name": "INJECT TLS 24",
  325. "FLAG": "oi",
  326. "Payload": "GET / HTTP/1.1[crlf]Host: [host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  327. "SNI": "[app_host]",
  328. "TlsIP": "104.16.51.91",
  329. "ProxyIP": "",
  330. "ProxyPort": "443",
  331. "Info": "Tlsws"
  332. }
  333. ]
  334. }

comments powered by Disqus