Avohai


SUBMITTED BY: Minerd

DATE: June 28, 2022, 2:54 p.m.

UPDATED: July 4, 2022, 4:13 a.m.

FORMAT: Text only

SIZE: 9.4 kB

HITS: 204

  1. {
  2. "Version": "1.0.1",
  3. "ReleaseNotes": "VIVO PEGANDO NO CLOUDFRONT",
  4. "UrlUpdate": "https://paste.anasor.com/paste.php?raw&id",
  5. "Sms": "https://paste.anasor.com/paste.php?raw&id=",
  6. "EmailFeedback": "canalminerdso@gmail.com",
  7. "UrlContato": "https://t.me/batmonn",
  8. "UrlTermos": "",
  9. "CheckUser": "true",
  10. "Udp": [
  11. {
  12. "Porta": "7100"
  13. },
  14. {
  15. "Porta": "7200"
  16. },
  17. {
  18. "Porta": "7300"
  19. },
  20. {
  21. "Porta": "7400"
  22. }
  23. ],
  24. "Servers": [
  25. {
  26. "Name": "AVOHAI",
  27. "TYPE": "premium",
  28. "FLAG": "br.png",
  29. "ServerIP": "o1.minerdso1029.tk",
  30. "CheckUser": "o1.minerdso1029.tk:8181/checkUser",
  31. "ServerPort": "22",
  32. "SSLPort": "443",
  33. "USER": "",
  34. "PASS": """
  35. }
  36. ],
  37. "Networks": [
  38. {
  39. "Name": "INJECT PROXY 1",
  40. "FLAG": "vivo",
  41. "Payload": "GET wss://unpkg.com// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  42. "SNI": "unpkg.com",
  43. "TlsIP": "172.67.165.43",
  44. "ProxyIP": "",
  45. "ProxyPort": "443",
  46. "Info": "Tlsws"
  47. },
  48. {
  49. "Name": "INJECT PROXY 2",
  50. "FLAG": "vivo",
  51. "Payload": "GET wss://carrinho-pos-familia.vivo.com.br [protocol][crlf]Host: [app_host][crlf]X-Forwarded-For: [app_host][crlf]Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf][crlf]",
  52. "SNI": "carrinho-pos-familia.vivo.com.br",
  53. "TlsIP": "172.67.165.43",
  54. "ProxyIP": "",
  55. "ProxyPort": "443",
  56. "Info": "Tlsws"
  57. },
  58. {
  59. "Name": "INJECT PROXY 3",
  60. "FLAG": "vivo",
  61. "Payload": "GET wss://carrinho-pos-familia.vivo.com.br// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  62. "SNI": "carrinho-pos-familia.vivo.com.br",
  63. "TlsIP": "172.67.165.43",
  64. "ProxyIP": "",
  65. "ProxyPort": "443",
  66. "Info": "Tlsws"
  67. },
  68. {
  69. "Name": "INJECT TLS 4",
  70. "FLAG": "vivo",
  71. "Payload": "GET wss://carrinho-pos-familia.vivo.com.br// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  72. "SNI": "carrinho-pos-familia.vivo.com.br",
  73. "TlsIP": "172.67.165.43",
  74. "ProxyIP": "",
  75. "ProxyPort": "443",
  76. "Info": "Tlsws"
  77. },
  78. {
  79. "Name": "INJECT TLS 5",
  80. "FLAG": "vivo",
  81. "Payload": "GET wss://cdnjs.cloudflare.com [protocol][crlf]Host: [app_host][crlf] Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  82. "SNI": "cdnjs.cloudflare.com",
  83. "TlsIP": "172.67.165.43",
  84. "ProxyIP": "",
  85. "ProxyPort": "443",
  86. "Info": "Tlsws"
  87. },
  88. {
  89. "Name": "INJECT TLS 6",
  90. "FLAG": "vivo",
  91. "Payload": "GET wss://live.vivo.com.br/ HTTP/1.1[crlf]Host: [app_host][crlf]Connection: keep-alive[crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  92. "SNI": "live.vivo.com.br",
  93. "TlsIP": "172.67.165.43",
  94. "ProxyIP": "",
  95. "ProxyPort": "443",
  96. "Info": "Tlsws"
  97. },
  98. {
  99. "Name": "INJECT TLS 7",
  100. "FLAG": "claro",
  101. "Payload": "GET sni://go.kaltura.com HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Upgrade[crlf][crlf]",
  102. "SNI": "go.kaltura.com",
  103. "TlsIP": "go.kaltura.com",
  104. "ProxyIP": "",
  105. "ProxyPort": "443",
  106. "Info": "Tlsws"
  107. },
  108. {
  109. "Name": "INJECT TLS 8",
  110. "FLAG": "claro",
  111. "Payload": "GET wss://connect.kaltura.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  112. "SNI": "connect.kaltura.com",
  113. "TlsIP": "connect.kaltura.com",
  114. "ProxyIP": "",
  115. "ProxyPort": "443",
  116. "Info": "Tlsws"
  117. },
  118. {
  119. "Name": "INJECT TLS 9",
  120. "FLAG": "claro",
  121. "Payload": "GET wss://go.kaltura.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  122. "SNI": "go.kaltura.com",
  123. "TlsIP": "go.kaltura.com",
  124. "ProxyIP": "",
  125. "ProxyPort": "443",
  126. "Info": "Tlsws"
  127. },
  128. {
  129. "Name": "INJECT TLS 10",
  130. "FLAG": "claro",
  131. "Payload": "GET wss://go.kaltura.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  132. "SNI": "go.kaltura.com",
  133. "TlsIP": "go.kaltura.com",
  134. "ProxyIP": "",
  135. "ProxyPort": "443",
  136. "Info": "Tlsws"
  137. },
  138. {
  139. "Name": "INJECT TLS 11",
  140. "FLAG": "claro",
  141. "Payload": "GET wss://content.akross.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  142. "SNI": "content.akross.com.br",
  143. "TlsIP": "content.akross.com.br",
  144. "ProxyIP": "",
  145. "ProxyPort": "443",
  146. "Info": "Tlsws"
  147. },
  148. {
  149. "Name": "INJECT PROXY 12",
  150. "FLAG": "tim",
  151. "Payload": "GET wss://beringtime.com/ HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf][crlf]",
  152. "SNI": "beringtime.com",
  153. "TlsIP": "beringtime.com",
  154. "ProxyIP": "",
  155. "ProxyPort": "443",
  156. "Info": "Tlsws"
  157. },
  158. {
  159. "Name": "INJECT TLS 13",
  160. "FLAG": "tim",
  161. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  162. "SNI": "static.r4you.co",
  163. "TlsIP": "104.26.5.175",
  164. "ProxyIP": "",
  165. "ProxyPort": "443",
  166. "Info": "Tlsws"
  167. },
  168. {
  169. "Name": "INJECT TLS 14",
  170. "FLAG": "tim",
  171. "Payload": "GET ws://static.r4you.co HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  172. "SNI": "static.r4you.co",
  173. "TlsIP": "104.26.5.175",
  174. "ProxyIP": "",
  175. "ProxyPort": "443",
  176. "Info": "Tlsws"
  177. },
  178. {
  179. "Name": "INJECT TLS 15",
  180. "FLAG": "tim",
  181. "Payload": "GET / HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  182. "SNI": "[app_host]",
  183. "TlsIP": "104.16.18.94",
  184. "ProxyIP": "",
  185. "ProxyPort": "443",
  186. "Info": "Tlsws"
  187. },
  188. {
  189. "Name": "INJECT TLS 16",
  190. "FLAG": "tim",
  191. "Payload": "GET sni://cdnjs.cloudflare.com [protocol][crlf]Host: [app_host][crlf]X-Forwarded-For: [app_host][crlf]Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  192. "SNI": "cdnjs.cloudflare.com",
  193. "TlsIP": "104.16.19.94",
  194. "ProxyIP": "",
  195. "ProxyPort": "443",
  196. "Info": "Tlsws"
  197. },
  198. {
  199. "Name": "INJECT TLS 17",
  200. "FLAG": "tim",
  201. "Payload": "GET wss://cdnjs.cloudflare.com HTTP/1.1[crlf]Host: [app_host][crlf]Connection: Keep-alive[crlf]Upgrade: ws[crlf][crlf]",
  202. "SNI": "cdnjs.cloudflare.com",
  203. "TlsIP": "cdnjs.cloudflare.com",
  204. "ProxyIP": "",
  205. "ProxyPort": "443",
  206. "Info": "Tlsws"
  207. },
  208. {
  209. "Name": "INJECT TLS 18",
  210. "FLAG": "tim",
  211. "Payload": "GET wss://m.timbancavirtual.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  212. "SNI": "m.timbancavirtual.com.br",
  213. "TlsIP": "m.timbancavirtual.com.br",
  214. "ProxyIP": "",
  215. "ProxyPort": "443",
  216. "Info": "Tlsws"
  217. },
  218. {
  219. "Name": "INJECT TLS 19",
  220. "FLAG": "tim",
  221. "Payload": "GET ws://consultatim.com.br HTTP/1.1\nHost: [app_host_proxy]\nUpgrade: ws\n\n",
  222. "SNI": "consultatim.com.br",
  223. "TlsIP": "consultatim.com.br",
  224. "ProxyIP": "",
  225. "ProxyPort": "443",
  226. "Info": "Tlsws"
  227. },
  228. {
  229. "Name": "INJECT TLS 20",
  230. "FLAG": "tim",
  231. "Payload": "GET wss://accesswdun.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  232. "SNI": "accesswdun.com",
  233. "TlsIP": "3cyber.com",
  234. "ProxyIP": "",
  235. "ProxyPort": "443",
  236. "Info": "Tlsws"
  237. },
  238. {
  239. "Name": "INJECT PROXY 21",
  240. "FLAG": "oi",
  241. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  242. "SNI": "oii.gdmhost.ga",
  243. "TlsIP": "www.hbogo.com.br",
  244. "ProxyIP": "www.hbogo.com.br",
  245. "ProxyPort": "80",
  246. "Info": "proxy"
  247. },
  248. {
  249. "Name": "INJECT TLS 22",
  250. "FLAG": "oi",
  251. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  252. "SNI": "www.hbogo.com.br",
  253. "TlsIP": "www.hbogo.com.br",
  254. "ProxyIP": "www.hbogo.com.br",
  255. "ProxyPort": "443",
  256. "Info": "Tlsws"
  257. },
  258. {
  259. "Name": "INJECT TLS 23",
  260. "FLAG": "oi",
  261. "Payload": "GET ws://www.hbogo.com.br HTTP/1.1\nHost: [app_host]\nUpgrade: ws[crlf]Sec-Websocket-Extensions: superspeed\n\n",
  262. "SNI": "www.hbogo.com.br",
  263. "TlsIP": "www.hbogo.com.br",
  264. "ProxyIP": "",
  265. "ProxyPort": "443",
  266. "Info": "Tlsws"
  267. },
  268. {
  269. "Name": "INJECT TLS 24",
  270. "FLAG": "oi",
  271. "Payload": "GET / HTTP/1.1[crlf]Host: [host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  272. "SNI": "[app_host]",
  273. "TlsIP": "104.16.51.91",
  274. "ProxyIP": "",
  275. "ProxyPort": "443",
  276. "Info": "Tlsws"
  277. }
  278. ]
  279. }

comments powered by Disqus