SIDNEY 4g


SUBMITTED BY: Fabioassis

DATE: June 27, 2022, 3:37 p.m.

UPDATED: Jan. 20, 2023, 1:48 p.m.

FORMAT: Text only

SIZE: 12.3 kB

HITS: 3293

  1. {
  2. "Version": "1.2.1",
  3. "ReleaseNotes": "Nova Atualização Disponível 🦸🏻 \n\n MANTENHA O APLICATIVO \n SEMPRE ATUALIZANDO 📱\n •••••••••••••••••••••••••••••••••••••••••••••••••\n🆚 Versão: 1.0.10\n•••••••••••••••••••••••••••••••••••••••••••••••••\n🔰Funcionando 🔵 TIM 🟠 OI 🟢 VIVO 🔴 CLARO🧑‍🔧\n===============================\n🗣️ Uma dica, recomendo ter dois chip\n🤖 Caso uma rede caia vc tem a outra\n🤖 Para se conectar tranquilamente✔️\n===============================\n🧑🏻‍💻 Qualquer dificuldade para se\n📱 Conectar entre em contato\n🙋🏻‍♂️ Com Suporte\n🤔 para ele te orientar 👍🏻….",
  4. "UrlUpdate": "https://bitbin.it/Ze5chdkd/raw/",
  5. "Sms": "https://bitbin.it/lLFXAt2n/raw/",
  6. "EmailFeedback": "fabioriohockey@gmail.com",
  7. "UrlContato": "",
  8. "UrlTermos": "",
  9. "CheckUser": "true",
  10. "UdpPort": "7300;7500;7295;7296;7200;7297;7298;7299;7400",
  11. "Servers": [
  12. {
  13. "Name": "TURBO NET",
  14. "TYPE": "premium",
  15. "FLAG": "br.png",
  16. "ServerIP": "tnet.netdoscria.online",
  17. "CheckUser": "http://152.67.43.16:5454/checkUser",
  18. "ServerPort": "22",
  19. "SSLPort": "443",
  20. "USER": "",
  21. "PASS": ""
  22. },
  23. {
  24. "Name": "TURBO NET 2",
  25. "TYPE": "premium",
  26. "FLAG": "br.png",
  27. "ServerIP": "tnet2.netdoscria.online",
  28. "CheckUser": "http://152.67.43.16:5454/checkUser",
  29. "ServerPort": "22",
  30. "SSLPort": "443",
  31. "USER": "",
  32. "PASS": ""
  33. },
  34. {
  35. "Name": "TURBO NET 3",
  36. "TYPE": "premium",
  37. "FLAG": "br.png",
  38. "ServerIP": "tnet3.netdoscria.online",
  39. "CheckUser": "http://152.67.43.16:5454/checkUser",
  40. "ServerPort": "22",
  41. "SSLPort": "443",
  42. "USER": "",
  43. "PASS": ""
  44. },
  45. {
  46. "Name": "TURBO NET VIVO",
  47. "TYPE": "premium",
  48. "FLAG": "br.png",
  49. "ServerIP": "ga.topturbo.online",
  50. "CheckUser": "http://152.67.43.16:5454/checkUser",
  51. "ServerPort": "22",
  52. "SSLPort": "443",
  53. "USER": "",
  54. "PASS": ""
  55. }
  56. ],
  57. "Networks": [
  58. {
  59. "Name": "🟣VIVO ON TODOS OS DDS",
  60. "FLAG": "vivo.png",
  61. "Payload": "GET / HTTP/1.1[crlf]Host: ga.topturbo.online[crlf]Connection: Upgrade[crlf]Upgrade: Websocket[crlf][crlf]",
  62. "SNI": "",
  63. "TlsIP": "",
  64. "ProxyIP": "52.85.213.82",
  65. "ProxyPort": "80",
  66. "Info": "Proxy"
  67. },
  68. {
  69. "Name": "🟣VIVO ON TODOS OS DDS 2",
  70. "FLAG": "vivo",
  71. "Payload": "GET / HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf][crlf]",
  72. "SNI": "",
  73. "TlsIP": "",
  74. "ProxyIP": "52.85.213.82",
  75. "ProxyPort": "80",
  76. "Info": "Proxy"
  77. },
  78. {
  79. "Name": "INJECT PROXY 2",
  80. "FLAG": "vivo",
  81. "Payload": "GET / HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf][crlf]",
  82. "SNI": "",
  83. "TlsIP": "",
  84. "ProxyIP": "104.21.11.51",
  85. "ProxyPort": "80",
  86. "Info": "Proxy"
  87. },
  88. {
  89. "Name": "INJECT PROXY 3",
  90. "FLAG": "vivo",
  91. "Payload": "GET wss://equipamentos01.vivo.com.br/ HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  92. "SNI": "equipamentos01.vivo.com.br",
  93. "TlsIP": "172.67.165.43",
  94. "ProxyIP": "",
  95. "ProxyPort": "443",
  96. "Info": "Tlsws"
  97. },
  98. {
  99. "Name": "INJECT TLS 4",
  100. "FLAG": "vivo",
  101. "Payload": "GET wss://www.vivorio.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  102. "SNI": "www.vivorio.com.br",
  103. "TlsIP": "172.67.165.43",
  104. "ProxyIP": "",
  105. "ProxyPort": "443",
  106. "Info": "Tlsws"
  107. },
  108. {
  109. "Name": "INJECT TLS 5",
  110. "FLAG": "vivo",
  111. "Payload": "GET wss://backoffice-equipamentos01.vivo.com.br// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  112. "SNI": "backoffice-equipamentos01.vivo.com.br",
  113. "TlsIP": "172.67.165.43",
  114. "ProxyIP": "",
  115. "ProxyPort": "443",
  116. "Info": "Tlsws"
  117. },
  118. {
  119. "Name": "INJECT TLS 6",
  120. "FLAG": "vivo",
  121. "Payload": "GET / HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf][crlf]",
  122. "SNI": "",
  123. "TlsIP": "",
  124. "ProxyIP": "104.16.122.175",
  125. "ProxyPort": "80",
  126. "Info": "Proxy"
  127. },
  128. {
  129. "Name": "INJECT TLS 7",
  130. "FLAG": "vivo",
  131. "Payload": "GET wss://portaljud.vivo.com.br// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  132. "SNI": "portaljud.vivo.com.br",
  133. "TlsIP": "104.21.11.51",
  134. "ProxyIP": "",
  135. "ProxyPort": "443",
  136. "Info": "Tlsws"
  137. },
  138. {
  139. "Name": "INJECT TLS 8",
  140. "FLAG": "vivo",
  141. "Payload": "GET wss://support.deezer.com// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  142. "SNI": "support.deezer.com",
  143. "TlsIP": "104.21.11.51",
  144. "ProxyIP": "",
  145. "ProxyPort": "443",
  146. "Info": "Tlsws"
  147. },
  148. {
  149. "Name": "INJECT TLS 9",
  150. "FLAG": "vivo",
  151. "Payload": "GET wss://support.deezer.com// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  152. "SNI": "support.deezer.com",
  153. "TlsIP": "172.67.165.43",
  154. "ProxyIP": "",
  155. "ProxyPort": "443",
  156. "Info": "Tlsws"
  157. },
  158. {
  159. "Name": "INJECT TLS 10",
  160. "FLAG": "vivo",
  161. "Payload": "GET wss://vpoweb.vivo.com.br// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  162. "SNI": "vpoweb.vivo.com.br",
  163. "TlsIP": "104.16.57.6",
  164. "ProxyIP": "",
  165. "ProxyPort": "443",
  166. "Info": "Tlsws"
  167. },
  168. {
  169. "Name": "INJECT TLS 11",
  170. "FLAG": "claro",
  171. "Payload": "GET sni://4.icanhazip.com HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Upgrade[crlf][crlf]",
  172. "SNI": "4.icanhazip.com",
  173. "TlsIP": "4.icanhazip.com",
  174. "ProxyIP": "",
  175. "ProxyPort": "443",
  176. "Info": "Tlsws"
  177. },
  178. {
  179. "Name": "INJECT TLS 12",
  180. "FLAG": "claro",
  181. "Payload": "GET wss://ipv4.icanhazip.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  182. "SNI": "ipv4.icanhazip.com",
  183. "TlsIP": "ipv4.icanhazip.com",
  184. "ProxyIP": "",
  185. "ProxyPort": "443",
  186. "Info": "Tlsws"
  187. },
  188. {
  189. "Name": "INJECT TLS 13",
  190. "FLAG": "claro",
  191. "Payload": "GET wss://platzi.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  192. "SNI": "platiz.com",
  193. "TlsIP": "104.17.175.85",
  194. "ProxyIP": "",
  195. "ProxyPort": "443",
  196. "Info": "Tlsws"
  197. },
  198. {
  199. "Name": "INJECT TLS 14",
  200. "FLAG": "claro",
  201. "Payload": "GET wss://2403821-1.mediaspace.kaltura.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  202. "SNI": "2403821-1.mediaspace.kaltura.com",
  203. "TlsIP": "2403821-1.mediaspace.kaltura.com",
  204. "ProxyIP": "",
  205. "ProxyPort": "443",
  206. "Info": "Tlsws"
  207. },
  208. {
  209. "Name": "INJECT TLS 15",
  210. "FLAG": "claro",
  211. "Payload": "GET wss://content.akross.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  212. "SNI": "content.akross.com.br",
  213. "TlsIP": "content.akross.com.br",
  214. "ProxyIP": "",
  215. "ProxyPort": "443",
  216. "Info": "Tlsws"
  217. },
  218. {
  219. "Name": "INJECT PROXY 16",
  220. "FLAG": "tim",
  221. "Payload": "GET wss://texugo.alura.com.br/ HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf][crlf]",
  222. "SNI": "texugo.alura.com.br",
  223. "TlsIP": "104.21.84.78",
  224. "ProxyIP": "",
  225. "ProxyPort": "443",
  226. "Info": "Tlsws"
  227. },
  228. {
  229. "Name": "INJECT TLS 17",
  230. "FLAG": "tim",
  231. "Payload": "GET ws://blog.alura.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  232. "SNI": "blog.alura.com.br",
  233. "TlsIP": "104.26.5.175",
  234. "ProxyIP": "",
  235. "ProxyPort": "443",
  236. "Info": "Tlsws"
  237. },
  238. {
  239. "Name": "INJECT TLS 18",
  240. "FLAG": "tim",
  241. "Payload": "GET ws://blog.alura.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  242. "SNI": "static.r4you.co",
  243. "TlsIP": "104.21.84.78",
  244. "ProxyIP": "",
  245. "ProxyPort": "443",
  246. "Info": "Tlsws"
  247. },
  248. {
  249. "Name": "INJECT TLS 19",
  250. "FLAG": "tim",
  251. "Payload": "GET ws://empresas.alura.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  252. "SNI": empresas.alura.com.br",
  253. "TlsIP": "104.18.40.41",
  254. "ProxyIP": "",
  255. "ProxyPort": "443",
  256. "Info": "Tlsws"
  257. },
  258. {
  259. "Name": "INJECT TLS 20",
  260. "FLAG": "tim",
  261. "Payload": "GET sni://cdnjs.cloudflare.com [protocol][crlf]Host: [app_host][crlf]X-Forwarded-For: [app_host][crlf]Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  262. "SNI": "cdnjs.cloudflare.com",
  263. "TlsIP": "104.16.19.94",
  264. "ProxyIP": "",
  265. "ProxyPort": "443",
  266. "Info": "Tlsws"
  267. },
  268. {
  269. "Name": "INJECT TLS 21",
  270. "FLAG": "tim",
  271. "Payload": "GET wss://cdnjs.cloudflare.com HTTP/1.1[crlf]Host: [app_host][crlf]Connection: Keep-alive[crlf]Upgrade: ws[crlf][crlf]",
  272. "SNI": "cdnjs.cloudflare.com",
  273. "TlsIP": "cdnjs.cloudflare.com",
  274. "ProxyIP": "",
  275. "ProxyPort": "443",
  276. "Info": "Tlsws"
  277. },
  278. {
  279. "Name": "INJECT TLS 22",
  280. "FLAG": "tim",
  281. "Payload": "GET wss://m.timbancavirtual.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  282. "SNI": "m.timbancavirtual.com.br",
  283. "TlsIP": "m.timbancavirtual.com.br",
  284. "ProxyIP": "",
  285. "ProxyPort": "443",
  286. "Info": "Tlsws"
  287. },
  288. {
  289. "Name": "INJECT TLS 23",
  290. "FLAG": "tim",
  291. "Payload": "GET ws://consultatim.com.br HTTP/1.1\nHost: [app_host_proxy]\nUpgrade: ws\n\n",
  292. "SNI": "consultatim.com.br",
  293. "TlsIP": "consultatim.com.br",
  294. "ProxyIP": "",
  295. "ProxyPort": "443",
  296. "Info": "Tlsws"
  297. },
  298. {
  299. "Name": "INJECT TLS 24",
  300. "FLAG": "tim",
  301. "Payload": "GET wss://accesswdun.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  302. "SNI": "accesswdun.com",
  303. "TlsIP": "3cyber.com",
  304. "ProxyIP": "",
  305. "ProxyPort": "443",
  306. "Info": "Tlsws"
  307. },
  308. {
  309. "Name": "INJECT PROXY 25",
  310. "FLAG": "oi",
  311. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  312. "SNI": "oii.gdmhost.ga",
  313. "TlsIP": "www.hbogo.com.br",
  314. "ProxyIP": "www.hbogo.com.br",
  315. "ProxyPort": "80",
  316. "Info": "proxy"
  317. },
  318. {
  319. "Name": "INJECT TLS 26",
  320. "FLAG": "oi",
  321. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  322. "SNI": "www.hbogo.com.br",
  323. "TlsIP": "www.hbogo.com.br",
  324. "ProxyIP": "www.hbogo.com.br",
  325. "ProxyPort": "443",
  326. "Info": "Tlsws"
  327. },
  328. {
  329. "Name": "INJECT TLS 27",
  330. "FLAG": "oi",
  331. "Payload": "GET ws://www.hbogo.com.br HTTP/1.1\nHost: [app_host]\nUpgrade: ws[crlf]Sec-Websocket-Extensions: superspeed\n\n",
  332. "SNI": "www.hbogo.com.br",
  333. "TlsIP": "www.hbogo.com.br",
  334. "ProxyIP": "",
  335. "ProxyPort": "443",
  336. "Info": "Tlsws"
  337. },
  338. {
  339. "Name": "INJECT TLS 28",
  340. "FLAG": "oi",
  341. "Payload": "GET / HTTP/1.1[crlf]Host: [host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  342. "SNI": "[app_host]",
  343. "TlsIP": "104.16.51.91",
  344. "ProxyIP": "",
  345. "ProxyPort": "443",
  346. "Info": "Tlsws"
  347. }
  348. ]
  349. }

comments powered by Disqus