PACSSH UPDATE V2


SUBMITTED BY: pacstore

DATE: June 27, 2022, 3:13 p.m.

UPDATED: July 28, 2022, 5:15 p.m.

FORMAT: Text only

SIZE: 7.4 kB

HITS: 7759

  1. {
  2. "Version": "2.1.1",
  3. "ReleaseNotes": "ATUALIZAÇÃO SERVIDOR FREE (CANADA)",
  4. "UrlUpdate": "https://bitbin.it/dBU60k5I/raw/",
  5. "Sms": "https://bitbin.it/wlfGRv11/raw/",
  6. "EmailFeedback": "",
  7. "UrlContato": "https://t.me/pacstore",
  8. "UrlTermos": "https://bitbin.it/5vIuhjGR/raw/",
  9. "CheckUser": "true",
  10. "UdpPort": "7300;7200;7400;7500;7700;7600",
  11. "Servers": [
  12. {
  13. "Name": "πŸš€ PACSSH Premium πŸš€",
  14. "TYPE": "premium",
  15. "FLAG": "br.png",
  16. "ServerIP": "brplus.pacsshdns.cf",
  17. "CheckUser": "http://20.197.234.131:5454/checkUser",
  18. "ServerPort": "22",
  19. "SSLPort": "443",
  20. "USER": "",
  21. "PASS": ""
  22. },
  23. {
  24. "Name": "🍁 PACSSH Free 🍁",
  25. "TYPE": "free",
  26. "FLAG": "ca.png",
  27. "ServerIP": "dns.pacsshfree.cf",
  28. "CheckUser": "http://158.69.133.248:5454/checkUser",
  29. "ServerPort": "22",
  30. "SSLPort": "443",
  31. "USER": "free",
  32. "PASS": "free"
  33. },
  34. ],
  35. "Networks": [
  36. {
  37. "Name": "VIVO TESTE",
  38. "FLAG": "vivo",
  39. "Payload": "GET wss://vivoemdia.vivo.com.br/ HTTP/1.1[crlf]Host: [app_host][crlf]Connection: keep-alive[crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  40. "SNI": "vivoemdia.vivo.com.br",
  41. "TlsIP": "162.159.135.63",
  42. "ProxyIP": "",
  43. "ProxyPort": "443",
  44. "Info": "Tlsws"
  45. },
  46. {
  47. "Name": "🟣 VIVO [OFF]",
  48. "FLAG": "vivo",
  49. "Payload": "GET wss://cursofl.formuladelancamento.com.br/ HTTP/1.1[lf]Host: [app_host][lf]Proxy-Connection: Keep-Alive[lf]User-Agent: [ua][lf]Connection: upgrade[lf]Upgrade: websocket[lf]Sec-Websocket-Extensions: superspeed[lf][lf]",
  50. "SNI": "cursofl.formuladelancamento.com.br",
  51. "TlsIP": "104.24.24.34",
  52. "ProxyIP": "",
  53. "ProxyPort": "443",
  54. "Info": "Tlsws"
  55. },
  56. {
  57. "Name": "πŸ”΄ CLARO [INJECT TLS 1]",
  58. "FLAG": "claro",
  59. "Payload": "GET sni://api.new.livestream.com HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Upgrade[crlf][crlf]",
  60. "SNI": "api.new.livestream.com",
  61. "TlsIP": "api.new.livestream.com",
  62. "ProxyIP": "",
  63. "ProxyPort": "443",
  64. "Info": "Tlsws"
  65. },
  66. {
  67. "Name": "πŸ”΄ CLARO [INJECT TLS 2]",
  68. "FLAG": "claro",
  69. "Payload": "GET wss://connect.kaltura.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  70. "SNI": "connect.kaltura.com",
  71. "TlsIP": "connect.kaltura.com",
  72. "ProxyIP": "",
  73. "ProxyPort": "443",
  74. "Info": "Tlsws"
  75. },
  76. {
  77. "Name": "πŸ”΄ CLARO [INJECT TLS 3]",
  78. "FLAG": "claro",
  79. "Payload": "GET wss://go.kaltura.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  80. "SNI": "go.kaltura.com",
  81. "TlsIP": "go.kaltura.com",
  82. "ProxyIP": "",
  83. "ProxyPort": "443",
  84. "Info": "Tlsws"
  85. },
  86. {
  87. "Name": "πŸ”΄ CLARO [INJECT TLS 4]",
  88. "FLAG": "claro",
  89. "Payload": "GET wss://icanhazip.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  90. "SNI": "icanhazip.com",
  91. "TlsIP": "icanhazip.com",
  92. "ProxyIP": "",
  93. "ProxyPort": "443",
  94. "Info": "Tlsws"
  95. },
  96. {
  97. "Name": "πŸ”΄ CLARO [INJECT TLS 5]",
  98. "FLAG": "claro",
  99. "Payload": "GET wss://content.akross.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  100. "SNI": "content.akross.com.br",
  101. "TlsIP": "content.akross.com.br",
  102. "ProxyIP": "",
  103. "ProxyPort": "443",
  104. "Info": "Tlsws"
  105. },
  106. {
  107. "Name": "πŸ”΅ TIM [INJECT PROXY 1]",
  108. "FLAG": "tim",
  109. "Payload": "GET wss://texugo.alura.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf][crlf]",
  110. "SNI": "texugo.alura.com.br",
  111. "TlsIP": "172.67.188.168",
  112. "ProxyIP": "",
  113. "ProxyPort": "443",
  114. "Info": "Tlsws"
  115. },
  116. {
  117. "Name": "πŸ”΅ TIM [INJECT PROXY 2]",
  118. "FLAG": "tim",
  119. "Payload": "GET wss://static.r4you.co HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf][crlf]",
  120. "SNI": "static.r4you.co",
  121. "TlsIP": "104.26.5.175",
  122. "ProxyIP": "",
  123. "ProxyPort": "443",
  124. "Info": "Tlsws"
  125. },
  126. {
  127. "Name": "πŸ”΅ TIM [INJECT PROXY 3]",
  128. "FLAG": "tim",
  129. "Payload": "GET wss://static.r4you.co HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf][crlf]",
  130. "SNI": "static.r4you.co",
  131. "TlsIP": "104.26.4.175",
  132. "ProxyIP": "",
  133. "ProxyPort": "443",
  134. "Info": "Tlsws"
  135. },
  136. {
  137. "Name": "πŸ”΅ TIM [INJECT PROXY 4]",
  138. "FLAG": "tim",
  139. "Payload": "GET wss://static.r4you.co HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf][crlf]",
  140. "SNI": "static.r4you.co",
  141. "TlsIP": "172.67.70.43",
  142. "ProxyIP": "",
  143. "ProxyPort": "443",
  144. "Info": "Tlsws"
  145. },
  146. {
  147. "Name": "πŸ”΅ TIM [INJECT PROXY 5]",
  148. "FLAG": "tim",
  149. "Payload": "GET wss://blog.alura.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf][crlf]",
  150. "SNI": "blog.alura.com.br",
  151. "TlsIP": "104.21.84.78",
  152. "ProxyIP": "",
  153. "ProxyPort": "443",
  154. "Info": "Tlsws"
  155. },
  156. {
  157. "Name": "πŸ”΅ TIM [INJECT PROXY 6]",
  158. "FLAG": "tim",
  159. "Payload": "GET wss://empresas.alura.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf][crlf]",
  160. "SNI": "empresas.alura.com.br",
  161. "TlsIP": "172.64.147.215",
  162. "ProxyIP": "",
  163. "ProxyPort": "443",
  164. "Info": "Tlsws"
  165. },
  166. {
  167. "Name": "πŸ”΅ TIM [INJECT PROXY 7]",
  168. "FLAG": "tim",
  169. "Payload": "GET wss://www.alura.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf][crlf]",
  170. "SNI": "www.alura.com.br",
  171. "TlsIP": "172.67.188.168",
  172. "ProxyIP": "",
  173. "ProxyPort": "443",
  174. "Info": "Tlsws"
  175. },
  176. {
  177. "Name": "🟠 OI [INJECT PROXY 1]",
  178. "FLAG": "oi",
  179. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  180. "SNI": "oii.gdmhost.ga",
  181. "TlsIP": "www.hbogo.com.br",
  182. "ProxyIP": "www.hbogo.com.br",
  183. "ProxyPort": "80",
  184. "Info": "proxy"
  185. },
  186. {
  187. "Name": "🟠 OI [INJECT TLS 1]",
  188. "FLAG": "oi",
  189. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  190. "SNI": "www.hbogo.com.br",
  191. "TlsIP": "www.hbogo.com.br",
  192. "ProxyIP": "www.hbogo.com.br",
  193. "ProxyPort": "443",
  194. "Info": "Tlsws"
  195. },
  196. {
  197. "Name": "🟠 OI [INJECT TLS 2]",
  198. "FLAG": "oi",
  199. "Payload": "GET ws://www.hbogo.com.br HTTP/1.1\nHost: [app_host]\nUpgrade: ws[crlf]Sec-Websocket-Extensions: superspeed\n\n",
  200. "SNI": "www.hbogo.com.br",
  201. "TlsIP": "www.hbogo.com.br",
  202. "ProxyIP": "",
  203. "ProxyPort": "443",
  204. "Info": "Tlsws"
  205. },
  206. {
  207. "Name": "🟠 OI [INJECT TLS 3]",
  208. "FLAG": "oi",
  209. "Payload": "GET / HTTP/1.1[crlf]Host: [host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  210. "SNI": "[app_host]",
  211. "TlsIP": "104.16.51.91",
  212. "ProxyIP": "",
  213. "ProxyPort": "443",
  214. "Info": "Tlsws"
  215. }
  216. ]
  217. }

comments powered by Disqus