Untitled


SUBMITTED BY: Fabioassis

DATE: June 7, 2022, 4:26 p.m.

UPDATED: July 8, 2022, 9:54 p.m.

FORMAT: Text only

SIZE: 12.2 kB

HITS: 2384

  1. {
  2. "Version": "5.3.1",
  3. "ReleaseNotes": "Nova Atualização Disponível",
  4. "UrlUpdate": "https://bitbin.it/WAxLcsvD/raw/",
  5. "Sms": "https://bitbin.it/AQnugEkU/raw/",
  6. "EmailFeedback": "fabioriohockey@gmail.com",
  7. "UrlContato": "",
  8. "UrlTermos": "",
  9. "CheckUser": "true",
  10. "UdpPort": "7300;7500;7295;7296;7200;7297;7298;7299;7400",
  11. "Servers": [
  12. {
  13. "Name": "MONKEY CONNECT PREMIUM 1",
  14. "TYPE": "premium",
  15. "FLAG": "br.png",
  16. "ServerIP": "csconncet.online",
  17. "CheckUser": "http://152.67.43.16:5454/checkUser",
  18. "ServerPort": "22",
  19. "SSLPort": "443",
  20. "USER": "",
  21. "PASS": ""
  22. },
  23. {
  24. "Name": "MONKEY CONNECT NOVO",
  25. "TYPE": "premium",
  26. "FLAG": "br.png",
  27. "ServerIP":"monkey.netdoscria.online",
  28. "CheckUser": "http://152.67.48.168:5454/checkUser",
  29. "ServerPort": "22",
  30. "SSLPort": "443",
  31. "USER": "",
  32. "PASS": ""
  33. }
  34. ],
  35. "Networks": [
  36. {
  37. "Name": "VIVO BR",
  38. "TYPE": "premium",
  39. "FLAG": "vivo",
  40. "ServerIP": "monkey.netdoscria.online",
  41. "CheckUser": "http://br1.secondvpn.tk:5454/checkUser",
  42. "ServerPort": "22",
  43. "SSLPort": "443",
  44. "USER": "",
  45. "PASS": ""
  46. },
  47. {
  48. "Name": "VIVO BR",
  49. "TYPE": "premium",
  50. "FLAG": "vivo",
  51. "ServerIP": "monkey.netdoscria.online",
  52. "CheckUser": "http://20.201.116.160:8888/server/online",
  53. "ServerPort": "22",
  54. "SSLPort": "443",
  55. "USER": "",
  56. "PASS": ""
  57. },
  58. {
  59. "Name": "VIVO BR",
  60. "TYPE": "premium",
  61. "FLAG": "vivo",
  62. "ServerIP": "monkey.netdoscria.online",
  63. "CheckUser": "http://40.69.163.63:5454/checkUser",
  64. "ServerPort": "22",
  65. "SSLPort": "443",
  66. "USER": "",
  67. "PASS": ""
  68. },
  69. {
  70. "Name": "🔵TIM [01]",
  71. "FLAG": "tim",
  72. "Payload": "GET wss://static.r4you.co HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf][crlf]",
  73. "SNI": "static.r4you.co",
  74. "TlsIP": "static.r4you.co",
  75. "ProxyIP": "",
  76. "ProxyPort": "443",
  77. "Info": "Tlsws"
  78. },
  79. {
  80. "Name": "🔵TIM [02]",
  81. "FLAG": "tim",
  82. "Payload": "GET wss://static.r4you.co HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf][crlf]",
  83. "SNI": "static.r4you.co",
  84. "TlsIP": "104.26.5.175",
  85. "ProxyIP": "",
  86. "ProxyPort": "443",
  87. "Info": "Tlsws"
  88. },
  89. {
  90. "Name": "🔵TIM [03]",
  91. "FLAG": "tim",
  92. "Payload": "GET wss://static.r4you.co HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf][crlf]",
  93. "SNI": "static.r4you.co",
  94. "TlsIP": "104.26.4.175",
  95. "ProxyIP": "",
  96. "ProxyPort": "443",
  97. "Info": "Tlsws"
  98. },
  99. {
  100. "Name": "🔵TIM [04]",
  101. "FLAG": "tim",
  102. "Payload": "GET wss://static.r4you.co HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf][crlf]",
  103. "SNI": "static.r4you.co",
  104. "TlsIP": "172.67.70.43",
  105. "ProxyIP": "",
  106. "ProxyPort": "443",
  107. "Info": "Tlsws"
  108. },
  109. {
  110. "Name": "TIM",
  111. "TYPE": "free",
  112. "FLAG": "tim",
  113. "ServerIP": "monkey.netdoscria.online",
  114. "CheckUser": "http://cas-2.opensvr.net:5454/checkUser",
  115. "ServerPort": "22",
  116. "SSLPort": "443",
  117. "USER": "",
  118. "PASS": ""
  119. },
  120. {
  121. "Name": "TIM",
  122. "TYPE": "free",
  123. "FLAG": "tim",
  124. "ServerIP": "monkey.netdoscria.online",
  125. "CheckUser": "http://uss-3.opensvr.net:5454/checkUser",
  126. "ServerPort": "22",
  127. "SSLPort": "443",
  128. "USER": "",
  129. "PASS": ""
  130. },
  131. {
  132. "Name": "INJECT PROXY 1",
  133. "FLAG": "vivo",
  134. "Payload": "GET wss://unpkg.com// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  135. "SNI": "unpkg.com",
  136. "TlsIP": "unpkg.com",
  137. "ProxyIP": "",
  138. "ProxyPort": "443",
  139. "Info": "Tlsws"
  140. },
  141. {
  142. "Name": "INJECT PROXY 2",
  143. "FLAG": "vivo",
  144. "Payload": "GET wss://carrinho-pos-familia.vivo.com.br [protocol][crlf]Host: [app_host][crlf]X-Forwarded-For: [app_host][crlf]Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf][crlf]",
  145. "SNI": "carrinho-pos-familia.vivo.com.br",
  146. "TlsIP": "172.67.165.43",
  147. "ProxyIP": "",
  148. "ProxyPort": "443",
  149. "Info": "Tlsws"
  150. },
  151. {
  152. "Name": "INJECT PROXY 3",
  153. "FLAG": "vivo",
  154. "Payload": "GET wss://carrinho-pos-familia.vivo.com.br// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  155. "SNI": "carrinho-pos-familia.vivo.com.br",
  156. "TlsIP": "172.67.165.43",
  157. "ProxyIP": "",
  158. "ProxyPort": "443",
  159. "Info": "Tlsws"
  160. },
  161. {
  162. "Name": "INJECT TLS 4",
  163. "FLAG": "vivo",
  164. "Payload": "GET wss://carrinho-pos-familia.vivo.com.br// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  165. "SNI": "carrinho-pos-familia.vivo.com.br",
  166. "TlsIP": "172.67.165.43",
  167. "ProxyIP": "",
  168. "ProxyPort": "443",
  169. "Info": "Tlsws"
  170. },
  171. {
  172. "Name": "INJECT TLS 5",
  173. "FLAG": "vivo",
  174. "Payload": "GET wss://cdnjs.cloudflare.com [protocol][crlf]Host: [app_host][crlf] Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  175. "SNI": "cdnjs.cloudflare.com",
  176. "TlsIP": "172.67.165.43",
  177. "ProxyIP": "",
  178. "ProxyPort": "443",
  179. "Info": "Tlsws"
  180. },
  181. {
  182. "Name": "INJECT TLS 6",
  183. "FLAG": "vivo",
  184. "Payload": "GET wss://live.vivo.com.br/ HTTP/1.1[crlf]Host: [app_host][crlf]Connection: keep-alive[crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  185. "SNI": "live.vivo.com.br",
  186. "TlsIP": "172.67.165.43",
  187. "ProxyIP": "",
  188. "ProxyPort": "443",
  189. "Info": "Tlsws"
  190. },
  191. {
  192. "Name": "INJECT TLS 7",
  193. "FLAG": "claro",
  194. "Payload": "GET sni://go.kaltura.com HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Upgrade[crlf][crlf]",
  195. "SNI": "go.kaltura.com",
  196. "TlsIP": "go.kaltura.com",
  197. "ProxyIP": "",
  198. "ProxyPort": "443",
  199. "Info": "Tlsws"
  200. },
  201. {
  202. "Name": "INJECT TLS 8",
  203. "FLAG": "claro",
  204. "Payload": "GET wss://connect.kaltura.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  205. "SNI": "connect.kaltura.com",
  206. "TlsIP": "connect.kaltura.com",
  207. "ProxyIP": "",
  208. "ProxyPort": "443",
  209. "Info": "Tlsws"
  210. },
  211. {
  212. "Name": "INJECT TLS 9",
  213. "FLAG": "claro",
  214. "Payload": "GET wss://go.kaltura.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  215. "SNI": "go.kaltura.com",
  216. "TlsIP": "go.kaltura.com",
  217. "ProxyIP": "",
  218. "ProxyPort": "443",
  219. "Info": "Tlsws"
  220. },
  221. {
  222. "Name": "INJECT TLS 10",
  223. "FLAG": "claro",
  224. "Payload": "GET wss://go.kaltura.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  225. "SNI": "go.kaltura.com",
  226. "TlsIP": "go.kaltura.com",
  227. "ProxyIP": "",
  228. "ProxyPort": "443",
  229. "Info": "Tlsws"
  230. },
  231. {
  232. "Name": "INJECT TLS 11",
  233. "FLAG": "claro",
  234. "Payload": "GET wss://content.akross.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  235. "SNI": "content.akross.com.br",
  236. "TlsIP": "content.akross.com.br",
  237. "ProxyIP": "",
  238. "ProxyPort": "443",
  239. "Info": "Tlsws"
  240. },
  241. {
  242. "Name": "INJECT PROXY 12",
  243. "FLAG": "tim",
  244. "Payload": "GET wss://beringtime.com/ HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf][crlf]",
  245. "SNI": "beringtime.com",
  246. "TlsIP": "beringtime.com",
  247. "ProxyIP": "",
  248. "ProxyPort": "443",
  249. "Info": "Tlsws"
  250. },
  251. {
  252. "Name": "INJECT TLS 13",
  253. "FLAG": "tim",
  254. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  255. "SNI": "static.r4you.co",
  256. "TlsIP": "104.26.5.175",
  257. "ProxyIP": "",
  258. "ProxyPort": "443",
  259. "Info": "Tlsws"
  260. },
  261. {
  262. "Name": "INJECT TLS 14",
  263. "FLAG": "tim",
  264. "Payload": "GET ws://static.r4you.co HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  265. "SNI": "static.r4you.co",
  266. "TlsIP": "104.26.5.175",
  267. "ProxyIP": "",
  268. "ProxyPort": "443",
  269. "Info": "Tlsws"
  270. },
  271. {
  272. "Name": "INJECT TLS 15",
  273. "FLAG": "tim",
  274. "Payload": "GET / HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  275. "SNI": "[app_host]",
  276. "TlsIP": "104.16.18.94",
  277. "ProxyIP": "",
  278. "ProxyPort": "443",
  279. "Info": "Tlsws"
  280. },
  281. {
  282. "Name": "INJECT TLS 16",
  283. "FLAG": "tim",
  284. "Payload": "GET sni://cdnjs.cloudflare.com [protocol][crlf]Host: [app_host][crlf]X-Forwarded-For: [app_host][crlf]Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  285. "SNI": "cdnjs.cloudflare.com",
  286. "TlsIP": "104.16.19.94",
  287. "ProxyIP": "",
  288. "ProxyPort": "443",
  289. "Info": "Tlsws"
  290. },
  291. {
  292. "Name": "INJECT TLS 17",
  293. "FLAG": "tim",
  294. "Payload": "GET wss://cdnjs.cloudflare.com HTTP/1.1[crlf]Host: [app_host][crlf]Connection: Keep-alive[crlf]Upgrade: ws[crlf][crlf]",
  295. "SNI": "cdnjs.cloudflare.com",
  296. "TlsIP": "cdnjs.cloudflare.com",
  297. "ProxyIP": "",
  298. "ProxyPort": "443",
  299. "Info": "Tlsws"
  300. },
  301. {
  302. "Name": "INJECT TLS 18",
  303. "FLAG": "tim",
  304. "Payload": "GET wss://m.timbancavirtual.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  305. "SNI": "m.timbancavirtual.com.br",
  306. "TlsIP": "m.timbancavirtual.com.br",
  307. "ProxyIP": "",
  308. "ProxyPort": "443",
  309. "Info": "Tlsws"
  310. },
  311. {
  312. "Name": "INJECT TLS 19",
  313. "FLAG": "tim",
  314. "Payload": "GET ws://consultatim.com.br HTTP/1.1\nHost: [app_host_proxy]\nUpgrade: ws\n\n",
  315. "SNI": "consultatim.com.br",
  316. "TlsIP": "consultatim.com.br",
  317. "ProxyIP": "",
  318. "ProxyPort": "443",
  319. "Info": "Tlsws"
  320. },
  321. {
  322. "Name": "INJECT TLS 20",
  323. "FLAG": "tim",
  324. "Payload": "GET wss://accesswdun.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  325. "SNI": "accesswdun.com",
  326. "TlsIP": "3cyber.com",
  327. "ProxyIP": "",
  328. "ProxyPort": "443",
  329. "Info": "Tlsws"
  330. },
  331. {
  332. "Name": "INJECT PROXY 21",
  333. "FLAG": "oi",
  334. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  335. "SNI": "oii.gdmhost.ga",
  336. "TlsIP": "www.hbogo.com.br",
  337. "ProxyIP": "www.hbogo.com.br",
  338. "ProxyPort": "80",
  339. "Info": "proxy"
  340. },
  341. {
  342. "Name": "INJECT TLS 22",
  343. "FLAG": "oi",
  344. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  345. "SNI": "www.hbogo.com.br",
  346. "TlsIP": "www.hbogo.com.br",
  347. "ProxyIP": "www.hbogo.com.br",
  348. "ProxyPort": "443",
  349. "Info": "Tlsws"
  350. },
  351. {
  352. "Name": "INJECT TLS 23",
  353. "FLAG": "oi",
  354. "Payload": "GET ws://www.hbogo.com.br HTTP/1.1\nHost: [app_host]\nUpgrade: ws[crlf]Sec-Websocket-Extensions: superspeed\n\n",
  355. "SNI": "www.hbogo.com.br",
  356. "TlsIP": "www.hbogo.com.br",
  357. "ProxyIP": "",
  358. "ProxyPort": "443",
  359. "Info": "Tlsws"
  360. },
  361. {
  362. "Name": "INJECT TLS 24",
  363. "FLAG": "oi",
  364. "Payload": "GET / HTTP/1.1[crlf]Host: [host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  365. "SNI": "[app_host]",
  366. "TlsIP": "104.16.51.91",
  367. "ProxyIP": "",
  368. "ProxyPort": "443",
  369. "Info": "Tlsws"
  370. }
  371. ]
  372. }

comments powered by Disqus