PACSSH UPDATE V2


SUBMITTED BY: pacstore

DATE: June 27, 2022, 3:13 p.m.

UPDATED: July 28, 2022, 5:15 p.m.

FORMAT: Text only

SIZE: 9.0 kB

HITS: 7759

  1. {
  2. "Version": "1.0.2",
  3. "ReleaseNotes": "GAMES E LIGAÇÕES ATUALIZADOS!",
  4. "UrlUpdate": "https://bitbin.it/dBU60k5I/raw/",
  5. "Sms": "https://bitbin.it/cKTUCvSy/raw/",
  6. "EmailFeedback": "",
  7. "UrlContato": "https://t.me/pacstore",
  8. "UrlTermos": "https://bitbin.it/5vIuhjGR/raw/",
  9. "CheckUser": "true",
  10. "UdpPort": "7300;7200;7400;7500;7700;7600",
  11. "Servers": [
  12. {
  13. "Name": "πŸš€ PACSSH Premium πŸš€",
  14. "TYPE": "premium",
  15. "FLAG": "br.png",
  16. "ServerIP": "brplus.pacsshdns.cf",
  17. "CheckUser": "http://20.197.197.205:5656/checkUser",
  18. "ServerPort": "22",
  19. "SSLPort": "443",
  20. "USER": "",
  21. "PASS": ""
  22. },
  23. {
  24. "Name": "🍁 PACSSH Free 🍁",
  25. "TYPE": "free",
  26. "FLAG": "ca.png",
  27. "ServerIP": "ins4nity.online",
  28. "CheckUser": "http://158.69.133.248:5454/checkUser",
  29. "ServerPort": "22",
  30. "SSLPort": "443",
  31. "USER": "free",
  32. "PASS": "free"
  33. },
  34. ],
  35. "Networks": [
  36. {
  37. "Name": "🟣 VIVO [PREMIUM]",
  38. "FLAG": "vivo",
  39. "Payload": "GET ssl://support.pokemon.com/ HTTP/1.1[lf]Host: [app_host][lf]Proxy-Connection: Keep-Alive[lf]User-Agent: [ua][lf]Connection: upgrade[lf]Upgrade: websocket[lf]Sec-Websocket-Extensions: superspeed[lf][lf]",
  40. "SNI": "support.pokemon.com",
  41. "TlsIP": "104.24.10.16",
  42. "ProxyIP": "",
  43. "ProxyPort": "443",
  44. "Info": "Tlsws"
  45. },
  46. {
  47. "Name": "🟣 VIVO [SSL 01]",
  48. "FLAG": "vivo",
  49. "Payload": "GET wss://www.alura.com.br/ HTTP/1.1[lf]Host: [app_host][lf]Proxy-Connection: Keep-Alive[lf]User-Agent: [ua][lf]Connection: upgrade[lf]Upgrade: websocket[lf]Sec-Websocket-Extensions: superspeed[lf][lf]",
  50. "SNI": "www.alura.com.br",
  51. "TlsIP": "104.24.10.16",
  52. "ProxyIP": "",
  53. "ProxyPort": "443",
  54. "Info": "Tlsws"
  55. },
  56. {
  57. "Name": "🟣 VIVO [SSL 2]",
  58. "FLAG": "vivo",
  59. "Payload": "GET wss://money-staging.infinitepay.io/ HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  60. "SNI": "money-staging.infinitepay.io",
  61. "TlsIP": "172.64.131.2",
  62. "ProxyIP": "",
  63. "ProxyPort": "443",
  64. "Info": "Tlsws"
  65. },
  66. {
  67. "Name": "🟣 VIVO [SSL 3]",
  68. "FLAG": "vivo",
  69. "Payload": "GET wss://carrinho-pos-familia.vivo.com.br// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  70. "SNI": "carrinho-pos-familia.vivo.com.br",
  71. "TlsIP": "172.64.131.2",
  72. "ProxyIP": "",
  73. "ProxyPort": "443",
  74. "Info": "Tlsws"
  75. },
  76. {
  77. "Name": "🟣 VIVO [SSL 4]",
  78. "FLAG": "vivo",
  79. "Payload": "GET wss://portaljud.vivo.com.br// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  80. "SNI": "portaljud.vivo.com.br",
  81. "TlsIP": "172.64.131.2",
  82. "ProxyIP": "",
  83. "ProxyPort": "443",
  84. "Info": "Tlsws"
  85. },
  86. {
  87. "Name": "🟣 VIVO [INJECT TLS]",
  88. "FLAG": "vivo",
  89. "Payload": "GET wss://help.cloudflareclient.com/ HTTP/1.1[crlf]Host: [app_host][crlf]Connection: keep-alive[crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  90. "SNI": "help.cloudflareclient.com",
  91. "TlsIP": "vigia.vivo.com.br",
  92. "ProxyIP": "",
  93. "ProxyPort": "443",
  94. "Info": "Tlsws"
  95. },
  96. {
  97. "Name": "πŸ”΄ CLARO [INJECT TLS 1]",
  98. "FLAG": "claro",
  99. "Payload": "GET sni://api.new.livestream.com HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Upgrade[crlf][crlf]",
  100. "SNI": "api.new.livestream.com",
  101. "TlsIP": "api.new.livestream.com",
  102. "ProxyIP": "",
  103. "ProxyPort": "443",
  104. "Info": "Tlsws"
  105. },
  106. {
  107. "Name": "πŸ”΄ CLARO [INJECT TLS 2]",
  108. "FLAG": "claro",
  109. "Payload": "GET wss://connect.kaltura.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  110. "SNI": "connect.kaltura.com",
  111. "TlsIP": "connect.kaltura.com",
  112. "ProxyIP": "",
  113. "ProxyPort": "443",
  114. "Info": "Tlsws"
  115. },
  116. {
  117. "Name": "πŸ”΄ CLARO [INJECT TLS 3]",
  118. "FLAG": "claro",
  119. "Payload": "GET wss://go.kaltura.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  120. "SNI": "go.kaltura.com",
  121. "TlsIP": "go.kaltura.com",
  122. "ProxyIP": "",
  123. "ProxyPort": "443",
  124. "Info": "Tlsws"
  125. },
  126. {
  127. "Name": "πŸ”΄ CLARO [INJECT TLS 4]",
  128. "FLAG": "claro",
  129. "Payload": "GET wss://icanhazip.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  130. "SNI": "icanhazip.com",
  131. "TlsIP": "icanhazip.com",
  132. "ProxyIP": "",
  133. "ProxyPort": "443",
  134. "Info": "Tlsws"
  135. },
  136. {
  137. "Name": "πŸ”΄ CLARO [INJECT TLS 5]",
  138. "FLAG": "claro",
  139. "Payload": "GET wss://content.akross.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  140. "SNI": "content.akross.com.br",
  141. "TlsIP": "content.akross.com.br",
  142. "ProxyIP": "",
  143. "ProxyPort": "443",
  144. "Info": "Tlsws"
  145. },
  146. {
  147. "Name": "πŸ”΅ TIM [INJECT PROXY 1]",
  148. "FLAG": "tim",
  149. "Payload": "GET wss://texugo.alura.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf][crlf]",
  150. "SNI": "texugo.alura.com.br",
  151. "TlsIP": "172.67.188.168",
  152. "ProxyIP": "",
  153. "ProxyPort": "443",
  154. "Info": "Tlsws"
  155. },
  156. {
  157. "Name": "πŸ”΅ TIM [INJECT PROXY 2]",
  158. "FLAG": "tim",
  159. "Payload": "GET wss://static.r4you.co HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf][crlf]",
  160. "SNI": "static.r4you.co",
  161. "TlsIP": "104.26.5.175",
  162. "ProxyIP": "",
  163. "ProxyPort": "443",
  164. "Info": "Tlsws"
  165. },
  166. {
  167. "Name": "πŸ”΅ TIM [INJECT PROXY 3]",
  168. "FLAG": "tim",
  169. "Payload": "GET wss://static.r4you.co HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf][crlf]",
  170. "SNI": "static.r4you.co",
  171. "TlsIP": "104.26.4.175",
  172. "ProxyIP": "",
  173. "ProxyPort": "443",
  174. "Info": "Tlsws"
  175. },
  176. {
  177. "Name": "πŸ”΅ TIM [INJECT PROXY 4]",
  178. "FLAG": "tim",
  179. "Payload": "GET wss://static.r4you.co HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf][crlf]",
  180. "SNI": "static.r4you.co",
  181. "TlsIP": "172.67.70.43",
  182. "ProxyIP": "",
  183. "ProxyPort": "443",
  184. "Info": "Tlsws"
  185. },
  186. {
  187. "Name": "πŸ”΅ TIM [INJECT PROXY 5]",
  188. "FLAG": "tim",
  189. "Payload": "GET wss://blog.alura.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf][crlf]",
  190. "SNI": "blog.alura.com.br",
  191. "TlsIP": "104.21.84.78",
  192. "ProxyIP": "",
  193. "ProxyPort": "443",
  194. "Info": "Tlsws"
  195. },
  196. {
  197. "Name": "πŸ”΅ TIM [INJECT PROXY 6]",
  198. "FLAG": "tim",
  199. "Payload": "GET wss://empresas.alura.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf][crlf]",
  200. "SNI": "empresas.alura.com.br",
  201. "TlsIP": "172.64.147.215",
  202. "ProxyIP": "",
  203. "ProxyPort": "443",
  204. "Info": "Tlsws"
  205. },
  206. {
  207. "Name": "πŸ”΅ TIM [INJECT PROXY 7]",
  208. "FLAG": "tim",
  209. "Payload": "GET wss://www.alura.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf][crlf]",
  210. "SNI": "www.alura.com.br",
  211. "TlsIP": "172.67.188.168",
  212. "ProxyIP": "",
  213. "ProxyPort": "443",
  214. "Info": "Tlsws"
  215. },
  216. {
  217. "Name": "🟠 OI [INJECT PROXY 1]",
  218. "FLAG": "oi",
  219. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  220. "SNI": "oii.gdmhost.ga",
  221. "TlsIP": "www.hbogo.com.br",
  222. "ProxyIP": "www.hbogo.com.br",
  223. "ProxyPort": "80",
  224. "Info": "proxy"
  225. },
  226. {
  227. "Name": "🟠 OI [INJECT TLS 1]",
  228. "FLAG": "oi",
  229. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  230. "SNI": "www.hbogo.com.br",
  231. "TlsIP": "www.hbogo.com.br",
  232. "ProxyIP": "www.hbogo.com.br",
  233. "ProxyPort": "443",
  234. "Info": "Tlsws"
  235. },
  236. {
  237. "Name": "🟠 OI [INJECT TLS 2]",
  238. "FLAG": "oi",
  239. "Payload": "GET ws://www.hbogo.com.br HTTP/1.1\nHost: [app_host]\nUpgrade: ws[crlf]Sec-Websocket-Extensions: superspeed\n\n",
  240. "SNI": "www.hbogo.com.br",
  241. "TlsIP": "www.hbogo.com.br",
  242. "ProxyIP": "",
  243. "ProxyPort": "443",
  244. "Info": "Tlsws"
  245. },
  246. {
  247. "Name": "🟠 OI [INJECT TLS 3]",
  248. "FLAG": "oi",
  249. "Payload": "GET / HTTP/1.1[crlf]Host: [host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  250. "SNI": "[app_host]",
  251. "TlsIP": "104.16.51.91",
  252. "ProxyIP": "",
  253. "ProxyPort": "443",
  254. "Info": "Tlsws"
  255. }
  256. ]
  257. }

comments powered by Disqus