Untitled


SUBMITTED BY: Fabioassis

DATE: June 7, 2022, 4:26 p.m.

UPDATED: July 8, 2022, 9:54 p.m.

FORMAT: Text only

SIZE: 13.2 kB

HITS: 2670

  1. {
  2. "Version": "7.4.1",
  3. "ReleaseNotes": "Nova Atualização Disponível",
  4. "UrlUpdate": "https://bitbin.it/WAxLcsvD/raw/",
  5. "Sms": "https://bitbin.it/AQnugEkU/raw/",
  6. "EmailFeedback": "fabioriohockey@gmail.com",
  7. "UrlContato": "",
  8. "UrlTermos": "",
  9. "CheckUser": "true",
  10. "UdpPort": "7300;7500;7295;7296;7200;7297;7298;7299;7400",
  11. "Servers": [
  12. {
  13. "Name": "MONKEY CONNECT PREMIUM 1",
  14. "TYPE": "premium",
  15. "FLAG": "br.png",
  16. "ServerIP": "csconncet.online",
  17. "CheckUser": "http://152.67.43.16:5454/checkUser",
  18. "ServerPort": "22",
  19. "SSLPort": "443",
  20. "USER": "",
  21. "PASS": ""
  22. },
  23. {
  24. "Name": "MONKEY CONNECT NOVO",
  25. "TYPE": "premium",
  26. "FLAG": "br.png",
  27. "ServerIP":"monkey.netdoscria.online",
  28. "CheckUser": "http://152.67.48.168:5454/checkUser",
  29. "ServerPort": "22",
  30. "SSLPort": "443",
  31. "USER": "",
  32. "PASS": ""
  33. }
  34. ],
  35. "Networks": [
  36. {
  37. "Version": "5.3.1",
  38. "ReleaseNotes": "Nova Atualização Disponível",
  39. "UrlUpdate": "https://bitbin.it/WAxLcsvD/raw/",
  40. "Sms": "https://bitbin.it/AQnugEkU/raw/",
  41. "EmailFeedback": "fabioriohockey@gmail.com",
  42. "UrlContato": "",
  43. "UrlTermos": "",
  44. "CheckUser": "true",
  45. "UdpPort": "7300;7500;7295;7296;7200;7297;7298;7299;7400",
  46. "Servers": [
  47. {
  48. "Name": "MONKEY CONNECT PREMIUM 1",
  49. "TYPE": "premium",
  50. "FLAG": "br.png",
  51. "ServerIP": "csconncet.online",
  52. "CheckUser": "http://152.67.43.16:5454/checkUser",
  53. "ServerPort": "22",
  54. "SSLPort": "443",
  55. "USER": "",
  56. "PASS": ""
  57. },
  58. {
  59. "Name": "MONKEY CONNECT NOVO",
  60. "TYPE": "premium",
  61. "FLAG": "br.png",
  62. "ServerIP":"monkey.netdoscria.online",
  63. "CheckUser": "http://152.67.48.168:5454/checkUser",
  64. "ServerPort": "22",
  65. "SSLPort": "443",
  66. "USER": "",
  67. "PASS": ""
  68. }
  69. ],
  70. "Networks": [
  71. {
  72. "Name": "VIVO BR",
  73. "TYPE": "premium",
  74. "FLAG": "vivo",
  75. "ServerIP": "monkey.netdoscria.online",
  76. "CheckUser": "http://br1.secondvpn.tk:5454/checkUser",
  77. "ServerPort": "22",
  78. "SSLPort": "443",
  79. "USER": "",
  80. "PASS": ""
  81. },
  82. {
  83. "Name": "VIVO BR",
  84. "TYPE": "premium",
  85. "FLAG": "vivo",
  86. "ServerIP": "monkey.netdoscria.online",
  87. "CheckUser": "http://20.201.116.160:8888/server/online",
  88. "ServerPort": "22",
  89. "SSLPort": "443",
  90. "USER": "",
  91. "PASS": ""
  92. },
  93. {
  94. "Name": "VIVO BR",
  95. "TYPE": "premium",
  96. "FLAG": "vivo",
  97. "ServerIP": "monkey.netdoscria.online",
  98. "CheckUser": "http://40.69.163.63:5454/checkUser",
  99. "ServerPort": "22",
  100. "SSLPort": "443",
  101. "USER": "",
  102. "PASS": ""
  103. },
  104. {
  105. "Name": "🔵TIM [01]",
  106. "FLAG": "tim",
  107. "Payload": "GET wss://static.r4you.co HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf][crlf]",
  108. "SNI": "static.r4you.co",
  109. "TlsIP": "static.r4you.co",
  110. "ProxyIP": "",
  111. "ProxyPort": "443",
  112. "Info": "Tlsws"
  113. },
  114. {
  115. "Name": "🔵TIM [02]",
  116. "FLAG": "tim",
  117. "Payload": "GET wss://static.r4you.co HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf][crlf]",
  118. "SNI": "static.r4you.co",
  119. "TlsIP": "104.26.5.175",
  120. "ProxyIP": "",
  121. "ProxyPort": "443",
  122. "Info": "Tlsws"
  123. },
  124. {
  125. "Name": "🔵TIM [03]",
  126. "FLAG": "tim",
  127. "Payload": "GET wss://static.r4you.co HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf][crlf]",
  128. "SNI": "static.r4you.co",
  129. "TlsIP": "104.26.4.175",
  130. "ProxyIP": "",
  131. "ProxyPort": "443",
  132. "Info": "Tlsws"
  133. },
  134. {
  135. "Name": "🔵TIM [04]",
  136. "FLAG": "tim",
  137. "Payload": "GET wss://static.r4you.co HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf][crlf]",
  138. "SNI": "static.r4you.co",
  139. "TlsIP": "172.67.70.43",
  140. "ProxyIP": "",
  141. "ProxyPort": "443",
  142. "Info": "Tlsws"
  143. },
  144. {
  145. "Name": "TIM",
  146. "TYPE": "free",
  147. "FLAG": "tim",
  148. "ServerIP": "monkey.netdoscria.online",
  149. "CheckUser": "http://cas-2.opensvr.net:5454/checkUser",
  150. "ServerPort": "22",
  151. "SSLPort": "443",
  152. "USER": "",
  153. "PASS": ""
  154. },
  155. {
  156. "Name": "TIM",
  157. "TYPE": "free",
  158. "FLAG": "tim",
  159. "ServerIP": "monkey.netdoscria.online",
  160. "CheckUser": "http://uss-3.opensvr.net:5454/checkUser",
  161. "ServerPort": "22",
  162. "SSLPort": "443",
  163. "USER": "",
  164. "PASS": ""
  165. },
  166. {
  167. "Name": "INJECT PROXY 1",
  168. "FLAG": "vivo",
  169. "Payload": "GET wss://unpkg.com// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  170. "SNI": "unpkg.com",
  171. "TlsIP": "unpkg.com",
  172. "ProxyIP": "",
  173. "ProxyPort": "443",
  174. "Info": "Tlsws"
  175. },
  176. {
  177. "Name": "INJECT PROXY 2",
  178. "FLAG": "vivo",
  179. "Payload": "GET wss://carrinho-pos-familia.vivo.com.br [protocol][crlf]Host: [app_host][crlf]X-Forwarded-For: [app_host][crlf]Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf][crlf]",
  180. "SNI": "carrinho-pos-familia.vivo.com.br",
  181. "TlsIP": "172.67.165.43",
  182. "ProxyIP": "",
  183. "ProxyPort": "443",
  184. "Info": "Tlsws"
  185. },
  186. {
  187. "Name": "INJECT PROXY 3",
  188. "FLAG": "vivo",
  189. "Payload": "GET wss://carrinho-pos-familia.vivo.com.br// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  190. "SNI": "carrinho-pos-familia.vivo.com.br",
  191. "TlsIP": "172.67.165.43",
  192. "ProxyIP": "",
  193. "ProxyPort": "443",
  194. "Info": "Tlsws"
  195. },
  196. {
  197. "Name": "INJECT TLS 4",
  198. "FLAG": "vivo",
  199. "Payload": "GET wss://carrinho-pos-familia.vivo.com.br// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  200. "SNI": "carrinho-pos-familia.vivo.com.br",
  201. "TlsIP": "172.67.165.43",
  202. "ProxyIP": "",
  203. "ProxyPort": "443",
  204. "Info": "Tlsws"
  205. },
  206. {
  207. "Name": "INJECT TLS 5",
  208. "FLAG": "vivo",
  209. "Payload": "GET wss://cdnjs.cloudflare.com [protocol][crlf]Host: [app_host][crlf] Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  210. "SNI": "cdnjs.cloudflare.com",
  211. "TlsIP": "172.67.165.43",
  212. "ProxyIP": "",
  213. "ProxyPort": "443",
  214. "Info": "Tlsws"
  215. },
  216. {
  217. "Name": "INJECT TLS 6",
  218. "FLAG": "vivo",
  219. "Payload": "GET wss://live.vivo.com.br/ HTTP/1.1[crlf]Host: [app_host][crlf]Connection: keep-alive[crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  220. "SNI": "live.vivo.com.br",
  221. "TlsIP": "172.67.165.43",
  222. "ProxyIP": "",
  223. "ProxyPort": "443",
  224. "Info": "Tlsws"
  225. },
  226. {
  227. "Name": "INJECT TLS 7",
  228. "FLAG": "claro",
  229. "Payload": "GET sni://go.kaltura.com HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Upgrade[crlf][crlf]",
  230. "SNI": "go.kaltura.com",
  231. "TlsIP": "go.kaltura.com",
  232. "ProxyIP": "",
  233. "ProxyPort": "443",
  234. "Info": "Tlsws"
  235. },
  236. {
  237. "Name": "INJECT TLS 8",
  238. "FLAG": "claro",
  239. "Payload": "GET wss://connect.kaltura.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  240. "SNI": "connect.kaltura.com",
  241. "TlsIP": "connect.kaltura.com",
  242. "ProxyIP": "",
  243. "ProxyPort": "443",
  244. "Info": "Tlsws"
  245. },
  246. {
  247. "Name": "INJECT TLS 9",
  248. "FLAG": "claro",
  249. "Payload": "GET wss://go.kaltura.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  250. "SNI": "go.kaltura.com",
  251. "TlsIP": "go.kaltura.com",
  252. "ProxyIP": "",
  253. "ProxyPort": "443",
  254. "Info": "Tlsws"
  255. },
  256. {
  257. "Name": "INJECT TLS 10",
  258. "FLAG": "claro",
  259. "Payload": "GET wss://go.kaltura.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  260. "SNI": "go.kaltura.com",
  261. "TlsIP": "go.kaltura.com",
  262. "ProxyIP": "",
  263. "ProxyPort": "443",
  264. "Info": "Tlsws"
  265. },
  266. {
  267. "Name": "INJECT TLS 11",
  268. "FLAG": "claro",
  269. "Payload": "GET wss://content.akross.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  270. "SNI": "content.akross.com.br",
  271. "TlsIP": "content.akross.com.br",
  272. "ProxyIP": "",
  273. "ProxyPort": "443",
  274. "Info": "Tlsws"
  275. },
  276. {
  277. "Name": "INJECT PROXY 12",
  278. "FLAG": "tim",
  279. "Payload": "GET wss://beringtime.com/ HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf][crlf]",
  280. "SNI": "beringtime.com",
  281. "TlsIP": "beringtime.com",
  282. "ProxyIP": "",
  283. "ProxyPort": "443",
  284. "Info": "Tlsws"
  285. },
  286. {
  287. "Name": "INJECT TLS 13",
  288. "FLAG": "tim",
  289. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  290. "SNI": "static.r4you.co",
  291. "TlsIP": "104.26.5.175",
  292. "ProxyIP": "",
  293. "ProxyPort": "443",
  294. "Info": "Tlsws"
  295. },
  296. {
  297. "Name": "INJECT TLS 14",
  298. "FLAG": "tim",
  299. "Payload": "GET ws://static.r4you.co HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  300. "SNI": "static.r4you.co",
  301. "TlsIP": "104.26.5.175",
  302. "ProxyIP": "",
  303. "ProxyPort": "443",
  304. "Info": "Tlsws"
  305. },
  306. {
  307. "Name": "INJECT TLS 15",
  308. "FLAG": "tim",
  309. "Payload": "GET / HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  310. "SNI": "[app_host]",
  311. "TlsIP": "104.16.18.94",
  312. "ProxyIP": "",
  313. "ProxyPort": "443",
  314. "Info": "Tlsws"
  315. },
  316. {
  317. "Name": "INJECT TLS 16",
  318. "FLAG": "tim",
  319. "Payload": "GET sni://cdnjs.cloudflare.com [protocol][crlf]Host: [app_host][crlf]X-Forwarded-For: [app_host][crlf]Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  320. "SNI": "cdnjs.cloudflare.com",
  321. "TlsIP": "104.16.19.94",
  322. "ProxyIP": "",
  323. "ProxyPort": "443",
  324. "Info": "Tlsws"
  325. },
  326. {
  327. "Name": "INJECT TLS 17",
  328. "FLAG": "tim",
  329. "Payload": "GET wss://cdnjs.cloudflare.com HTTP/1.1[crlf]Host: [app_host][crlf]Connection: Keep-alive[crlf]Upgrade: ws[crlf][crlf]",
  330. "SNI": "cdnjs.cloudflare.com",
  331. "TlsIP": "cdnjs.cloudflare.com",
  332. "ProxyIP": "",
  333. "ProxyPort": "443",
  334. "Info": "Tlsws"
  335. },
  336. {
  337. "Name": "INJECT TLS 18",
  338. "FLAG": "tim",
  339. "Payload": "GET wss://m.timbancavirtual.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  340. "SNI": "m.timbancavirtual.com.br",
  341. "TlsIP": "m.timbancavirtual.com.br",
  342. "ProxyIP": "",
  343. "ProxyPort": "443",
  344. "Info": "Tlsws"
  345. },
  346. {
  347. "Name": "INJECT TLS 19",
  348. "FLAG": "tim",
  349. "Payload": "GET ws://consultatim.com.br HTTP/1.1\nHost: [app_host_proxy]\nUpgrade: ws\n\n",
  350. "SNI": "consultatim.com.br",
  351. "TlsIP": "consultatim.com.br",
  352. "ProxyIP": "",
  353. "ProxyPort": "443",
  354. "Info": "Tlsws"
  355. },
  356. {
  357. "Name": "INJECT TLS 20",
  358. "FLAG": "tim",
  359. "Payload": "GET wss://accesswdun.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  360. "SNI": "accesswdun.com",
  361. "TlsIP": "3cyber.com",
  362. "ProxyIP": "",
  363. "ProxyPort": "443",
  364. "Info": "Tlsws"
  365. },
  366. {
  367. "Name": "INJECT PROXY 21",
  368. "FLAG": "oi",
  369. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  370. "SNI": "oii.gdmhost.ga",
  371. "TlsIP": "www.hbogo.com.br",
  372. "ProxyIP": "www.hbogo.com.br",
  373. "ProxyPort": "80",
  374. "Info": "proxy"
  375. },
  376. {
  377. "Name": "INJECT TLS 22",
  378. "FLAG": "oi",
  379. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  380. "SNI": "www.hbogo.com.br",
  381. "TlsIP": "www.hbogo.com.br",
  382. "ProxyIP": "www.hbogo.com.br",
  383. "ProxyPort": "443",
  384. "Info": "Tlsws"
  385. },
  386. {
  387. "Name": "INJECT TLS 23",
  388. "FLAG": "oi",
  389. "Payload": "GET ws://www.hbogo.com.br HTTP/1.1\nHost: [app_host]\nUpgrade: ws[crlf]Sec-Websocket-Extensions: superspeed\n\n",
  390. "SNI": "www.hbogo.com.br",
  391. "TlsIP": "www.hbogo.com.br",
  392. "ProxyIP": "",
  393. "ProxyPort": "443",
  394. "Info": "Tlsws"
  395. },
  396. {
  397. "Name": "INJECT TLS 24",
  398. "FLAG": "oi",
  399. "Payload": "GET / HTTP/1.1[crlf]Host: [host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  400. "SNI": "[app_host]",
  401. "TlsIP": "104.16.51.91",
  402. "ProxyIP": "",
  403. "ProxyPort": "443",
  404. "Info": "Tlsws"
  405. }
  406. ]
  407. }

comments powered by Disqus