SIDNEY 4g


SUBMITTED BY: Fabioassis

DATE: June 27, 2022, 3:37 p.m.

UPDATED: Jan. 20, 2023, 1:48 p.m.

FORMAT: Text only

SIZE: 11.4 kB

HITS: 3320

  1. {
  2. "Version": "1.0.10",
  3. "ReleaseNotes": "Nova Atualização Disponível 🦸🏻 \n\n MANTENHA O APLICATIVO \n SEMPRE ATUALIZANDO 📱\n •••••••••••••••••••••••••••••••••••••••••••••••••\n🆚 Versão: 1.0.10\n•••••••••••••••••••••••••••••••••••••••••••••••••\n🔰Funcionando 🔵 TIM 🟠 OI 🟢 VIVO 🔴 CLARO🧑‍🔧\n===============================\n🗣️ Uma dica, recomendo ter dois chip\n🤖 Caso uma rede caia vc tem a outra\n🤖 Para se conectar tranquilamente✔️\n===============================\n🧑🏻‍💻 Qualquer dificuldade para se\n📱 Conectar entre em contato\n🙋🏻‍♂️ Com Suporte\n🤔 para ele te orientar 👍🏻….",
  4. "UrlUpdate": "https://bitbin.it/Ze5chdkd/raw/",
  5. "Sms": "https://bitbin.it/lLFXAt2n/raw/",
  6. "EmailFeedback": "fabioriohockey@gmail.com",
  7. "UrlContato": "",
  8. "UrlTermos": "",
  9. "CheckUser": "true",
  10. "UdpPort": "7300;7500;7295;7296;7200;7297;7298;7299;7400",
  11. "Servers": [
  12. {
  13. "Name": "TURBO NET",
  14. "TYPE": "premium",
  15. "FLAG": "br.png",
  16. "ServerIP": "tnet.netdoscria.online",
  17. "CheckUser": "http://152.67.43.16:5454/checkUser",
  18. "ServerPort": "22",
  19. "SSLPort": "443",
  20. "USER": "",
  21. "PASS": ""
  22. },
  23. {
  24. "Name": "TURBO NET 2",
  25. "TYPE": "premium",
  26. "FLAG": "br.png",
  27. "ServerIP": "tnet2.netdoscria.online",
  28. "CheckUser": "http://152.67.43.16:5454/checkUser",
  29. "ServerPort": "22",
  30. "SSLPort": "443",
  31. "USER": "",
  32. "PASS": ""
  33. }
  34. {
  35. "Name": "TURBO NET 3",
  36. "TYPE": "premium",
  37. "FLAG": "br.png",
  38. "ServerIP": "tnet3.netdoscria.online",
  39. "CheckUser": "http://152.67.43.16:5454/checkUser",
  40. "ServerPort": "22",
  41. "SSLPort": "443",
  42. "USER": "",
  43. "PASS": ""
  44. }
  45. ],
  46. "Networks": [
  47. {
  48. "Name": "INJECT PROXY 2",
  49. "FLAG": "vivo",
  50. "Payload": "GET / HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf][crlf]",
  51. "SNI": "",
  52. "TlsIP": "",
  53. "ProxyIP": "104.21.11.51",
  54. "ProxyPort": "80",
  55. "Info": "Proxy"
  56. },
  57. {
  58. "Name": "INJECT PROXY 3",
  59. "FLAG": "vivo",
  60. "Payload": "GET wss://equipamentos01.vivo.com.br/ HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  61. "SNI": "equipamentos01.vivo.com.br",
  62. "TlsIP": "172.67.165.43",
  63. "ProxyIP": "",
  64. "ProxyPort": "443",
  65. "Info": "Tlsws"
  66. },
  67. {
  68. "Name": "INJECT TLS 4",
  69. "FLAG": "vivo",
  70. "Payload": "GET wss://www.vivorio.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  71. "SNI": "www.vivorio.com.br",
  72. "TlsIP": "172.67.165.43",
  73. "ProxyIP": "",
  74. "ProxyPort": "443",
  75. "Info": "Tlsws"
  76. },
  77. {
  78. "Name": "INJECT TLS 5",
  79. "FLAG": "vivo",
  80. "Payload": "GET wss://backoffice-equipamentos01.vivo.com.br// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  81. "SNI": "backoffice-equipamentos01.vivo.com.br",
  82. "TlsIP": "172.67.165.43",
  83. "ProxyIP": "",
  84. "ProxyPort": "443",
  85. "Info": "Tlsws"
  86. },
  87. {
  88. "Name": "INJECT TLS 6",
  89. "FLAG": "vivo",
  90. "Payload": "GET / HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf][crlf]",
  91. "SNI": "",
  92. "TlsIP": "",
  93. "ProxyIP": "104.16.122.175",
  94. "ProxyPort": "80",
  95. "Info": "Proxy"
  96. },
  97. {
  98. "Name": "INJECT TLS 7",
  99. "FLAG": "vivo",
  100. "Payload": "GET wss://portaljud.vivo.com.br// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  101. "SNI": "portaljud.vivo.com.br",
  102. "TlsIP": "104.21.11.51",
  103. "ProxyIP": "",
  104. "ProxyPort": "443",
  105. "Info": "Tlsws"
  106. },
  107. {
  108. "Name": "INJECT TLS 8",
  109. "FLAG": "vivo",
  110. "Payload": "GET wss://support.deezer.com// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  111. "SNI": "support.deezer.com",
  112. "TlsIP": "104.21.11.51",
  113. "ProxyIP": "",
  114. "ProxyPort": "443",
  115. "Info": "Tlsws"
  116. },
  117. {
  118. "Name": "INJECT TLS 9",
  119. "FLAG": "vivo",
  120. "Payload": "GET wss://support.deezer.com// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  121. "SNI": "support.deezer.com",
  122. "TlsIP": "172.67.165.43",
  123. "ProxyIP": "",
  124. "ProxyPort": "443",
  125. "Info": "Tlsws"
  126. },
  127. {
  128. "Name": "INJECT TLS 10",
  129. "FLAG": "vivo",
  130. "Payload": "GET wss://vpoweb.vivo.com.br// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  131. "SNI": "vpoweb.vivo.com.br",
  132. "TlsIP": "104.16.57.6",
  133. "ProxyIP": "",
  134. "ProxyPort": "443",
  135. "Info": "Tlsws"
  136. },
  137. {
  138. "Name": "INJECT TLS 11",
  139. "FLAG": "claro",
  140. "Payload": "GET sni://4.icanhazip.com HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Upgrade[crlf][crlf]",
  141. "SNI": "4.icanhazip.com",
  142. "TlsIP": "4.icanhazip.com",
  143. "ProxyIP": "",
  144. "ProxyPort": "443",
  145. "Info": "Tlsws"
  146. },
  147. {
  148. "Name": "INJECT TLS 12",
  149. "FLAG": "claro",
  150. "Payload": "GET wss://ipv4.icanhazip.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  151. "SNI": "ipv4.icanhazip.com",
  152. "TlsIP": "ipv4.icanhazip.com",
  153. "ProxyIP": "",
  154. "ProxyPort": "443",
  155. "Info": "Tlsws"
  156. },
  157. {
  158. "Name": "INJECT TLS 13",
  159. "FLAG": "claro",
  160. "Payload": "GET wss://platzi.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  161. "SNI": "platiz.com",
  162. "TlsIP": "104.17.175.85",
  163. "ProxyIP": "",
  164. "ProxyPort": "443",
  165. "Info": "Tlsws"
  166. },
  167. {
  168. "Name": "INJECT TLS 14",
  169. "FLAG": "claro",
  170. "Payload": "GET wss://2403821-1.mediaspace.kaltura.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  171. "SNI": "2403821-1.mediaspace.kaltura.com",
  172. "TlsIP": "2403821-1.mediaspace.kaltura.com",
  173. "ProxyIP": "",
  174. "ProxyPort": "443",
  175. "Info": "Tlsws"
  176. },
  177. {
  178. "Name": "INJECT TLS 15",
  179. "FLAG": "claro",
  180. "Payload": "GET wss://content.akross.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  181. "SNI": "content.akross.com.br",
  182. "TlsIP": "content.akross.com.br",
  183. "ProxyIP": "",
  184. "ProxyPort": "443",
  185. "Info": "Tlsws"
  186. },
  187. {
  188. "Name": "INJECT PROXY 16",
  189. "FLAG": "tim",
  190. "Payload": "GET wss://texugo.alura.com.br/ HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf][crlf]",
  191. "SNI": "texugo.alura.com.br",
  192. "TlsIP": "104.21.84.78",
  193. "ProxyIP": "",
  194. "ProxyPort": "443",
  195. "Info": "Tlsws"
  196. },
  197. {
  198. "Name": "INJECT TLS 17",
  199. "FLAG": "tim",
  200. "Payload": "GET ws://blog.alura.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  201. "SNI": "blog.alura.com.br",
  202. "TlsIP": "104.26.5.175",
  203. "ProxyIP": "",
  204. "ProxyPort": "443",
  205. "Info": "Tlsws"
  206. },
  207. {
  208. "Name": "INJECT TLS 18",
  209. "FLAG": "tim",
  210. "Payload": "GET ws://blog.alura.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  211. "SNI": "static.r4you.co",
  212. "TlsIP": "104.21.84.78",
  213. "ProxyIP": "",
  214. "ProxyPort": "443",
  215. "Info": "Tlsws"
  216. },
  217. {
  218. "Name": "INJECT TLS 19",
  219. "FLAG": "tim",
  220. "Payload": "GET ws://empresas.alura.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  221. "SNI": empresas.alura.com.br",
  222. "TlsIP": "104.18.40.41",
  223. "ProxyIP": "",
  224. "ProxyPort": "443",
  225. "Info": "Tlsws"
  226. },
  227. {
  228. "Name": "INJECT TLS 20",
  229. "FLAG": "tim",
  230. "Payload": "GET sni://cdnjs.cloudflare.com [protocol][crlf]Host: [app_host][crlf]X-Forwarded-For: [app_host][crlf]Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  231. "SNI": "cdnjs.cloudflare.com",
  232. "TlsIP": "104.16.19.94",
  233. "ProxyIP": "",
  234. "ProxyPort": "443",
  235. "Info": "Tlsws"
  236. },
  237. {
  238. "Name": "INJECT TLS 21",
  239. "FLAG": "tim",
  240. "Payload": "GET wss://cdnjs.cloudflare.com HTTP/1.1[crlf]Host: [app_host][crlf]Connection: Keep-alive[crlf]Upgrade: ws[crlf][crlf]",
  241. "SNI": "cdnjs.cloudflare.com",
  242. "TlsIP": "cdnjs.cloudflare.com",
  243. "ProxyIP": "",
  244. "ProxyPort": "443",
  245. "Info": "Tlsws"
  246. },
  247. {
  248. "Name": "INJECT TLS 22",
  249. "FLAG": "tim",
  250. "Payload": "GET wss://m.timbancavirtual.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  251. "SNI": "m.timbancavirtual.com.br",
  252. "TlsIP": "m.timbancavirtual.com.br",
  253. "ProxyIP": "",
  254. "ProxyPort": "443",
  255. "Info": "Tlsws"
  256. },
  257. {
  258. "Name": "INJECT TLS 23",
  259. "FLAG": "tim",
  260. "Payload": "GET ws://consultatim.com.br HTTP/1.1\nHost: [app_host_proxy]\nUpgrade: ws\n\n",
  261. "SNI": "consultatim.com.br",
  262. "TlsIP": "consultatim.com.br",
  263. "ProxyIP": "",
  264. "ProxyPort": "443",
  265. "Info": "Tlsws"
  266. },
  267. {
  268. "Name": "INJECT TLS 24",
  269. "FLAG": "tim",
  270. "Payload": "GET wss://accesswdun.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  271. "SNI": "accesswdun.com",
  272. "TlsIP": "3cyber.com",
  273. "ProxyIP": "",
  274. "ProxyPort": "443",
  275. "Info": "Tlsws"
  276. },
  277. {
  278. "Name": "INJECT PROXY 25",
  279. "FLAG": "oi",
  280. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  281. "SNI": "oii.gdmhost.ga",
  282. "TlsIP": "www.hbogo.com.br",
  283. "ProxyIP": "www.hbogo.com.br",
  284. "ProxyPort": "80",
  285. "Info": "proxy"
  286. },
  287. {
  288. "Name": "INJECT TLS 26",
  289. "FLAG": "oi",
  290. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  291. "SNI": "www.hbogo.com.br",
  292. "TlsIP": "www.hbogo.com.br",
  293. "ProxyIP": "www.hbogo.com.br",
  294. "ProxyPort": "443",
  295. "Info": "Tlsws"
  296. },
  297. {
  298. "Name": "INJECT TLS 27",
  299. "FLAG": "oi",
  300. "Payload": "GET ws://www.hbogo.com.br HTTP/1.1\nHost: [app_host]\nUpgrade: ws[crlf]Sec-Websocket-Extensions: superspeed\n\n",
  301. "SNI": "www.hbogo.com.br",
  302. "TlsIP": "www.hbogo.com.br",
  303. "ProxyIP": "",
  304. "ProxyPort": "443",
  305. "Info": "Tlsws"
  306. },
  307. {
  308. "Name": "INJECT TLS 28",
  309. "FLAG": "oi",
  310. "Payload": "GET / HTTP/1.1[crlf]Host: [host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  311. "SNI": "[app_host]",
  312. "TlsIP": "104.16.51.91",
  313. "ProxyIP": "",
  314. "ProxyPort": "443",
  315. "Info": "Tlsws"
  316. }
  317. ]
  318. }

comments powered by Disqus