Atualização do app da play story


SUBMITTED BY: eduardohe749

DATE: July 12, 2022, 2:38 p.m.

UPDATED: Sept. 27, 2022, 1:37 a.m.

FORMAT: Text only

SIZE: 8.7 kB

HITS: 2991

  1. {
  2. "Version": "1.0",
  3. "ReleaseNotes": "♠️♣️ ATUALIZAÇÃO ♣️♠️\n\n♦️ATT: 12/07/2022 AS 00:00 am♦️\n🟣 INJECT PROXY 1 🟣\n🔴 INJECT TLS 1 🔴\n🔵 INJECT TLS 1 🔵\n🟡 INJECT PROXY 1 🟡 \n\n\n att: Eduardo 160 \n att: Felipe By LP tutoriais \n att: Equipe: Telles Grau 4G",
  4. "UrlUpdate": "https://bitbin.it/fgEmFb79/raw/",
  5. "Sms": "https://bitbin.it/sxmZ0qEY/raw/",
  6. "EmailFeedback": "vpntellesgrau@gmail.com",
  7. "UrlContato": "https://youtube.com/c/Eduardo160",
  8. "UrlTermos": "https://www.minhaconexao.com.br/",
  9. "CheckUser": "true",
  10. "Udp": [
  11. {
  12. "Porta": "7300"
  13. },
  14. {
  15. "Porta": "7300"
  16. },
  17. {
  18. "Porta": "7300"
  19. },
  20. {
  21. "Porta": "7300"
  22. },
  23. {
  24. "Porta": "7300"
  25. }
  26. ],
  27. "Servers": [
  28. {
  29. "Name": "SRV-TELLES GRAU 🇧🇷",
  30. "TYPE": "premium",
  31. "FLAG": "br.png",
  32. "ServerIP": "tellesgrau.ml",
  33. "CheckUser": "http://177.153.59.245:5454/checkUser",
  34. "ServerPort": "443",
  35. "SSLPort": "443",
  36. "USER": "",
  37. "PASS": ""
  38. }
  39. ],
  40. "Networks": [
  41. {
  42. "Name": "🟣 INJECT PROXY 1 (REGIÕEOS) 🟣",
  43. "FLAG": "vivo",
  44. "Payload": "GET / HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf][crlf]",
  45. "SNI": "",
  46. "TlsIP": "",
  47. "ProxyIP": "104.21.11.51",
  48. "ProxyPort": "80",
  49. "Info": "Proxy"
  50. },
  51. {
  52. "Name": "🟣 INJECT PROXY 2 (REGIÕEOS) 🟣",
  53. "FLAG": "vivo",
  54. "Payload": "GET / HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf][crlf]",
  55. "SNI": "",
  56. "TlsIP": "[app_host]",
  57. "ProxyIP": "172.67.165.43",
  58. "ProxyPort": "80",
  59. "Info": "Proxy"
  60. },
  61. {
  62. "Name": "🟣 INJECT TLS 1 🟣",
  63. "FLAG": "vivo",
  64. "Payload": "GET wss://gedoc.vivo.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf][crlf]",
  65. "SNI": "gedoc.vivo.com.br",
  66. "TlsIP": "104.18.6.80",
  67. "ProxyIP": "",
  68. "ProxyPort": "443",
  69. "Info": "Tlsws"
  70. },
  71. {
  72. "Name": "🔴 INJECT TLS 1 🔴 ",
  73. "FLAG": "Claro",
  74. "Payload": "GET wss://connect.kaltura.com/ HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf][crlf]",
  75. "SNI": "connect.kaltura.com",
  76. "TlsIP": "connect.kaltura.com",
  77. "ProxyIP": "",
  78. "ProxyPort": "",
  79. "Info": "Tlsws"
  80. },
  81. {
  82. "Name": "🔴 INJECT TLS 2 🔴",
  83. "FLAG": "Claro",
  84. "Payload": "GET wss://communitystaging.kaltura.com/ HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf][crlf]",
  85. "SNI": "communitystaging.kaltura.com",
  86. "TlsIP": "communitystaging.kaltura.com",
  87. "ProxyIP": "",
  88. "ProxyPort": "",
  89. "Info": "Tlsws"
  90. },
  91. {
  92. "Name": "🔴 INJECT TLS 3 🔴",
  93. "FLAG": "Claro",
  94. "Payload": "GET wss://learning.kaltura.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Connection: Keep-Alive[crlf][crlf]",
  95. "SNI": "learning.kaltura.com",
  96. "TlsIP": "learning.kaltura.com",
  97. "ProxyIP": "",
  98. "ProxyPort": "",
  99. "Info": "Tlsws"
  100. },
  101. {
  102. "Name": "🔴 INJECT TLS 4 🔴",
  103. "FLAG": "Claro",
  104. "Payload": "GET wss://blog.kaltura.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Connection: Keep-Alive[crlf][crlf]",
  105. "SNI": "blog.kaltura.com",
  106. "TlsIP": "blog.kaltura.com",
  107. "ProxyIP": "",
  108. "ProxyPort": "",
  109. "Info": "Tlsws"
  110. },
  111. {
  112. "Name": "🔴 INJECT TLS 5 🔴",
  113. "FLAG": "Claro",
  114. "Payload": "GET wss://br.corp.kaltura.com/ HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf][crlf]",
  115. "SNI": "br.corp.kaltura.com",
  116. "TlsIP": "br.corp.kaltura.com",
  117. "ProxyIP": "",
  118. "ProxyPort": "",
  119. "Info": "Tlsws"
  120. },
  121. {
  122. "Name": "️🔴 INJECT TLS 6 🔴",
  123. "FLAG": "claro",
  124. "Payload": "GET wss://site.kaltura.com/ HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf][crlf]",
  125. "SNI": "site.kaltura.com",
  126. "TlsIP": "site.kaltura.com",
  127. "ProxyIP": "",
  128. "ProxyPort": "",
  129. "Info": "Tlsws"
  130. },
  131. {
  132. "Name": "️🔴 INJECT TLS 7 🔴",
  133. "FLAG": "claro",
  134. "Payload": "GET wss://blog.kaltura.com/ HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf][crlf]",
  135. "SNI": "blog.kaltura.com",
  136. "TlsIP": "blog.kaltura.com",
  137. "ProxyIP": "",
  138. "ProxyPort": "",
  139. "Info": "Tlsws"
  140. },
  141. {
  142. "Name": "️🔴 INJECT TLS 8 🔴",
  143. "FLAG": "Claro",
  144. "Payload": "GET wss://dd24.totolivestream.com/ HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf][crlf]",
  145. "SNI": "dd24.totolivestream.com",
  146. "TlsIP": "dd24.totolivestream.com",
  147. "ProxyIP": "",
  148. "ProxyPort": "",
  149. "Info": "Tlsws"
  150. },
  151. {
  152. "Name": "🔵 INJECT TLS 1 🔵",
  153. "FLAG": "tim",
  154. "Payload": "GET wss://cloud.mail.c6bank.com.br HTTP/1.1\nHost: [app_host]\nUpgrade: ws\n\n",
  155. "SNI": "cloud.mail.c6bank.com.br",
  156. "TlsIP": "cloud.mail.c6bank.com.br",
  157. "ProxyIP": "",
  158. "ProxyPort": "",
  159. "Info": "Tlsws"
  160. },
  161. {
  162. "Name": "🔵 INJECT TLS 2 🔵",
  163. "FLAG": "tim",
  164. "Payload": "GET wss://static.r4you.co HTTP/1.1\nHost: [app_host]\nUpgrade: ws\n\n",
  165. "SNI": "static.r4you.co",
  166. "TlsIP": "104.26.5.175",
  167. "ProxyIP": "",
  168. "ProxyPort": "",
  169. "Info": "Tlsws"
  170. },
  171. {
  172. "Name": "🔵 INJECT TLS 3 🔵",
  173. "FLAG": "tim",
  174. "Payload": "GET wss://auth.of.c6bank.com.br HTTP/1.1\nHost: [app_host]\nUpgrade: ws\n\n",
  175. "SNI": "auth.of.c6bank.com.br",
  176. "TlsIP": "auth.of.c6bank.com.br",
  177. "ProxyIP": "",
  178. "ProxyPort": "",
  179. "Info": "Tlsws"
  180. },
  181. {
  182. "Name": "🔵 INJECT TLS 4 🔵",
  183. "FLAG": "tim",
  184. "Payload": "GET wss://ajuda.c6bank.com.br HTTP/1.1\nHost: [app_host]\nUpgrade: ws\n\n",
  185. "SNI": "ajuda.c6bank.com.br",
  186. "TlsIP": "ajuda.c6bank.com.br",
  187. "ProxyIP": "",
  188. "ProxyPort": "",
  189. "Info": "Tlsws"
  190. },
  191. {
  192. "Name": "🔵 INJECT TLS 5 🔵",
  193. "FLAG": "tim",
  194. "Payload": "GET wss://bobcontents.bennuapp.com.br HTTP/1.1\nHost: [app_host]\nUpgrade: ws\n\n",
  195. "SNI": "bobcontents.bennuapp.com.br",
  196. "TlsIP": "bobcontents.bennuapp.com.br",
  197. "ProxyIP": "",
  198. "ProxyPort": "",
  199. "Info": "Tlsws"
  200. },
  201. {
  202. "Name": "🔵 INJECT TLS 6 🔵",
  203. "FLAG": "tim",
  204. "Payload": "GET wss://m.timbancavirtual.com.br HTTP/1.1\nHost: [app_host]\nUpgrade: ws\n\n",
  205. "SNI": "m.timbancavirtual.com.br",
  206. "TlsIP": "m.timbancavirtual.com.br",
  207. "ProxyIP": "",
  208. "ProxyPort": "",
  209. "Info": "Tlsws"
  210. },
  211. {
  212. "Name": "🔵 INJECT TLS 7 🔵",
  213. "FLAG": "tim",
  214. "Payload": "GET wss://static.r4you.co HTTP/1.1\nHost: [app_host]\nUpgrade: ws\n\n",
  215. "SNI": "static.r4you.co",
  216. "TlsIP": "104.26.5.175",
  217. "ProxyIP": "",
  218. "ProxyPort": "",
  219. "Info": "Tlsws"
  220. },
  221. {
  222. "Name": "🔵 INJECT TLS 8 🔵",
  223. "FLAG": "tim",
  224. "Payload": "GET ws://cdn.c6bank.com.br HTTP/1.1\nHost: [app_host]\nUpgrade: ws\n\n",
  225. "SNI": "cdn.c6bank.com.br",
  226. "TlsIP": "cdn.c6bank.com.br",
  227. "ProxyIP": "",
  228. "ProxyPort": "",
  229. "Info": "Tlsws"
  230. },
  231. {
  232. "Name": "🟡 INJECT PROXY 1 (REGIÕEOS) 🟡",
  233. "FLAG": "oi",
  234. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [host][crlf]Upgrade: websocket[crlf][crlf]",
  235. "SNI": "oii.gdmhost.ga",
  236. "TlsIP": "oii.gdmhost.ga",
  237. "ProxyIP": "oii.gdmhost.ga",
  238. "ProxyPort": "80",
  239. "Info": "proxy"
  240. },
  241. {
  242. "Name": "🟡 INJECT TLS 2 🟡",
  243. "FLAG": "oi",
  244. "Payload": "GET ws://www.hbogo.com.br HTTP/1.1\nHost: [app_host]\nUpgrade: ws\n\n",
  245. "SNI": "www.hbogo.com.br",
  246. "TlsIP": "104.16.53.91",
  247. "ProxyIP": "",
  248. "ProxyPort": "",
  249. "Info": "Tlsws"
  250. },
  251. {
  252. "Name": "🟡 INJECT TLS 3 🟡",
  253. "FLAG": "oi",
  254. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf][crlf]",
  255. "SNI": "oii.gdmhost.ga",
  256. "TlsIP": "oii.gdmhost.ga",
  257. "ProxyIP": "oii.gdmhost.ga",
  258. "ProxyPort": "443",
  259. "Info": "Tlsws"
  260. },
  261. {
  262. "Name": "🟡 INJECT TLS 4 🟡",
  263. "FLAG": "oi",
  264. "Payload": "GET / HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf][crlf]",
  265. "SNI": "[app_host]",
  266. "TlsIP": "104.16.51.91",
  267. "ProxyIP": "",
  268. "ProxyPort": "443",
  269. "Info": "Tlsws"
  270. }
  271. ]
  272. }

comments powered by Disqus