TUBARÃO


SUBMITTED BY: ezequielf195

DATE: Sept. 16, 2022, 12:07 a.m.

UPDATED: June 24, 2023, 12:34 p.m.

FORMAT: Text only

SIZE: 19.8 kB

HITS: 5014

  1. {
  2. "Version": "4.7.0",
  3. "ReleaseNotes": "👻NOVA ATUALIZAÇÃO👻 \n ATUALIZEM \n PARA MANTER-SE CONECTADO \n (A) \n\n VIVO ON NO CLOUDFRONT E TODOS OS DDDS (ALGUNS DDS) \n\n CLARO ON COM PROMOÇÃO ATIVA E TODOS OS DDDS(OFF) \n\n TIM ON NO CLOUDFRONT E TODOS OS DDDS(ALGUNS DDDS) \n\n OI FUNCIONANDO (RELATOS QUE AINDA TA FUNCIONANDO) \n\n GERE SEU TESTE NO BOT
  4. DO WHATSAPP NÚMERO ABAIXO 👇 \n\n (91)985515263 \n\n COMANDO É OII \n BOT OFF TEMPORARIAMENTE",
  5. "UrlUpdate": "https://bitbin.it/h3lXD0WD/raw/",
  6. "Sms": "https://painelconecta5g.com/update/pasta_EZEQUIEL/sms",
  7. "EmailFeedback": "contapratudo57@gmail.com",
  8. "UrlContato": "https://wa.me/qr/VEST5DFIYRS2I1",
  9. "UrlTermos": "https://kiritosshxd.github.io/Conecta4g_site/termos.html",
  10. "CheckUser": "",
  11. "Udp": [
  12. {
  13. "Porta": "7300"
  14. },
  15. {
  16. "Porta": "7200"
  17. }
  18. ],
  19. "Servers": [
  20. {
  21. "Name": "SERVIDOR TESTE BR 01",
  22. "TYPE": "free",
  23. "FLAG": "br.png",
  24. "ServerIP": "ca2.sshws.me",
  25. "CheckUser": "",
  26. "ServerPort": "80",
  27. "SSLPort": "443",
  28. "USER": "sshocean-teste001",
  29. "PASS": "1234"
  30. },
  31. {
  32. "Name": "SERVIDOR TESTE CA 02",
  33. "TYPE": "free",
  34. "FLAG": "ca.png",
  35. "ServerIP": "ca1.sshws.me",
  36. "CheckUser": "",
  37. "ServerPort": "80",
  38. "SSLPort": "443",
  39. "USER": "sshocean-teste002",
  40. "PASS": "1234"
  41. },
  42. {
  43. "Name": "SERVIDOR TESTE CA 03",
  44. "TYPE": "free",
  45. "FLAG": "ca.png",
  46. "ServerIP": "ca2.sshws.me",
  47. "CheckUser": "",
  48. "ServerPort": "80",
  49. "SSLPort": "443",
  50. "USER": "sshocean-teste003",
  51. "PASS": "1234"
  52. },
  53. {
  54. "Name": "SERVIDOR TESTE CA 04",
  55. "TYPE": "free",
  56. "FLAG": "ca.png",
  57. "ServerIP": "ca1.sshws.me",
  58. "CheckUser": "",
  59. "ServerPort": "80",
  60. "SSLPort": "443",
  61. "USER": "sshocean-teste004",
  62. "PASS": "1234"
  63. },
  64. {
  65. "Name": "SERVIDOR TESTE CA 05",
  66. "TYPE": "free",
  67. "FLAG": "ca.png",
  68. "ServerIP": "fr2.sshws.me",
  69. "CheckUser": "",
  70. "ServerPort": "80",
  71. "SSLPort": "443",
  72. "USER": "sshocean-teste005",
  73. "PASS": "1234"
  74. },
  75. {
  76. "Name": "SERVIDOR TESTE US 06",
  77. "TYPE": "free",
  78. "FLAG": "us.png",
  79. "ServerIP": "fr1.sshws.me",
  80. "CheckUser": "",
  81. "ServerPort": "80",
  82. "SSLPort": "443",
  83. "USER": "sshocean-teste006",
  84. "PASS": "1234"
  85. },
  86. {
  87. "Name": "SERVIDOR TESTE US 07",
  88. "TYPE": "free",
  89. "FLAG": "us.png",
  90. "ServerIP": "us2.sshws.me",
  91. "CheckUser": "",
  92. "ServerPort": "80",
  93. "SSLPort": "443",
  94. "USER": "sshocean-teste007",
  95. "PASS": "1234"
  96. },
  97. {
  98. "Name": "SERVIDOR TESTE US 08",
  99. "TYPE": "free",
  100. "FLAG": "us.png",
  101. "ServerIP": "us3.sshws.me",
  102. "CheckUser": "",
  103. "ServerPort": "80",
  104. "SSLPort": "443",
  105. "USER": "sshocean-teste008",
  106. "PASS": "1234"
  107. },
  108. {
  109. "Name": "SERVIDOR TESTE SG 09",
  110. "TYPE": "free",
  111. "FLAG": "sg.png",
  112. "ServerIP": "fr01-ws.realssh.xyz",
  113. "CheckUser": "",
  114. "ServerPort": "80",
  115. "SSLPort": "443",
  116. "USER": "realssh-teste09",
  117. "PASS": "123456"
  118. },
  119. {
  120. "Name": "SERVIDOR TESTE US 10",
  121. "TYPE": "free",
  122. "FLAG": "us.png",
  123. "ServerIP": "us1.sshws.me",
  124. "CheckUser": "",
  125. "ServerPort": "80",
  126. "SSLPort": "443",
  127. "USER": "sshocean-teste009",
  128. "PASS": "1234"
  129. },
  130. {
  131. "Name": "SERVIDOR TESTE US 11",
  132. "TYPE": "free",
  133. "FLAG": "us.png",
  134. "ServerIP": "us5.sshws.me",
  135. "CheckUser": "",
  136. "ServerPort": "80",
  137. "SSLPort": "443",
  138. "USER": "sshocean-teste0011",
  139. "PASS": "1234"
  140. },
  141. {
  142. "Name": "SERVIDOR TESTE US 12",
  143. "TYPE": "free",
  144. "FLAG": "us.png",
  145. "ServerIP": "fr01-ws.realssh.xyz",
  146. "CheckUser": "",
  147. "ServerPort": "80",
  148. "SSLPort": "443",
  149. "USER": "realssh-teste09",
  150. "PASS": "123456"
  151. },
  152. {
  153. "Name": "SERVIDOR TESTE SG 13",
  154. "TYPE": "free",
  155. "FLAG": "sg.png",
  156. "ServerIP": "ca1.sshws.me",
  157. "CheckUser": "",
  158. "ServerPort": "80",
  159. "SSLPort": "443",
  160. "USER": "sshocean-teste0012",
  161. "PASS": "1234"
  162. },
  163. {
  164. "Name": "SERVIDOR TESTE US 14",
  165. "TYPE": "free",
  166. "FLAG": "us.png",
  167. "ServerIP": "ca2.sshws.me",
  168. "CheckUser": "",
  169. "ServerPort": "80",
  170. "SSLPort": "443",
  171. "USER": "sshocean-teste0010",
  172. "PASS": "1234"
  173. },
  174. {
  175. "Name": "SEV 1 EM TESTE",
  176. "TYPE": "free",
  177. "FLAG": "jp.png",
  178. "ServerIP": "snj.hnts.online",
  179. "CheckUser": "",
  180. "ServerPort": "22",
  181. "SSLPort": "443",
  182. "USER": "prueba2",
  183. "PASS": "prueba20"
  184. },
  185. {
  186. "Name": "SEV 2 EM TESTE",
  187. "TYPE": "free",
  188. "FLAG": "br.png",
  189. "ServerIP": "mixxshs77.xyz",
  190. "CheckUser": "",
  191. "ServerPort": "22",
  192. "SSLPort": "443",
  193. "USER": "Vivo",
  194. "PASS": "0800"
  195. },
  196. {
  197. "Name": "SEV 3 EM TESTE",
  198. "TYPE": "free",
  199. "FLAG": "us.png",
  200. "ServerIP": "br6.br2.online",
  201. "CheckUser": "",
  202. "ServerPort": "22",
  203. "SSLPort": "443",
  204. "USER": "grupo",
  205. "PASS": "123456"
  206. },
  207. {
  208. "Name": "SEV 4 EM TESTE",
  209. "TYPE": "free",
  210. "FLAG": "br.png",
  211. "ServerIP": "ntsnn.hnts.online",
  212. "CheckUser": "",
  213. "ServerPort": "22",
  214. "SSLPort": "443",
  215. "USER": "Oraclecloud",
  216. "PASS": "cloudvpn"
  217. },
  218. {
  219. "Name": "SEV 5 EM TESTE",
  220. "TYPE": "free",
  221. "FLAG": "br.png",
  222. "ServerIP": "dsn.hnts.online",
  223. "CheckUser": "",
  224. "ServerPort": "22",
  225. "SSLPort": "443",
  226. "USER": "Oraclegrupo",
  227. "PASS": "grupovps"
  228. },
  229. {
  230. "Name": "SERVIDOR BRASIL 01",
  231. "TYPE": "premium",
  232. "FLAG": "br.png",
  233. "ServerIP": "bra7.hackkcah.net",
  234. "CheckUser": "",
  235. "ServerPort": "22",
  236. "SSLPort": "443",
  237. "USER": "",
  238. "PASS": ""
  239. },
  240. {
  241. "Name": "SERVIDOR CANADÁ 02",
  242. "TYPE": "premium",
  243. "FLAG": "ca.png",
  244. "ServerIP": "cnd.hackkcah.net",
  245. "CheckUser": "",
  246. "ServerPort": "22",
  247. "SSLPort": "443",
  248. "USER": "",
  249. "PASS": ""
  250. },
  251. {
  252. "Name": "SERVIDOR ESTADOS UNIDOS 03",
  253. "TYPE": "Premium",
  254. "FLAG": "us.png",
  255. "ServerIP": "usa.hackkcah.net",
  256. "CheckUser": "",
  257. "ServerPort": "22",
  258. "SSLPort": "443",
  259. "USER": "",
  260. "PASS": ""
  261. },
  262. {
  263. "Name": "SERVIDOR ESTADOS UNIDOS 04",
  264. "TYPE": "Premium",
  265. "FLAG": "us.png",
  266. "ServerIP": "a.us.goserver.pw",
  267. "CheckUser": "",
  268. "ServerPort": "22",
  269. "SSLPort": "443",
  270. "USER": "",
  271. "PASS": ""
  272. }
  273. ],
  274. "Networks": [
  275. {
  276. "Name": "🟣 VIVO 1 MODO AVIÃO",
  277. "FLAG": "vivo",
  278. "Payload": "GET / HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf][crlf]",
  279. "SNI": "",
  280. "TlsIP": "",
  281. "ProxyIP": "104.16.53.111",
  282. "ProxyPort": "80",
  283. "Info": "Proxy"
  284. },
  285. {
  286. "Name": "VIVO TOPSPEED",
  287. "FLAG": "vivo",
  288. "Payload": "GET-TOPSPEED wss://[app_host]/ HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]TOPSPEED[crlf][crlf]",
  289. "SNI": "[app_host]",
  290. "TlsIP": "104.16.53.111",
  291. "ProxyIP": "",
  292. "ProxyPort": "443",
  293. "Info": "Tlsws"
  294. },
  295. {
  296. "Name": "VIVO NOVA [002]🟣",
  297. "FLAG": "vivo",
  298. "Payload": "GET / HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Referer: google.com[crlf][crlf]",
  299. "SNI": "104.16.51.111",
  300. "TlsIP": "104.16.51.111",
  301. "ProxyIP": "104.16.51.111",
  302. "ProxyPort": "80",
  303. "Info": "Proxy"
  304. },
  305. {
  306. "Name": "VIVO NOVA [001]🟣",
  307. "FLAG": "vivo",
  308. "Payload": "BASELINE-CONTROL / HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep- Vivo[crlf][crlf]",
  309. "SNI": "server1.www1.v1.laopromo.com",
  310. "TlsIP": "",
  311. "ProxyIP": "104.16.51.111",
  312. "ProxyPort": "80",
  313. "Info": "Proxy"
  314. },
  315. {
  316. "Name": "VIVO NOVA [000]🟣",
  317. "FLAG": "vivo",
  318. "Payload": "GET-MODDER wss://[app_host]/ HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]MODDER[crlf][crlf]",
  319. "SNI": "[app_host]",
  320. "TlsIP": "104.16.53.111",
  321. "ProxyIP": "104.16.53.111",
  322. "ProxyPort": "443",
  323. "Info": "Tlsws"
  324. },
  325. {
  326. "Name": "VIVO 01",
  327. "FLAG": "vivo",
  328. "Payload": "YUNO HTTP://[app_host] HTTP/1.3[crlf]Host: [rotate=atendimento.lojadointer.com.br;atendimento.magazineluiza.com.br;mycannabisconversation.com.br;compre.vivo.com.br;snow.vivo.com.br;backoffice-equipamentos01.vivo.com.br][crlf]Upgrade: Websocket[crlf][crlf]",
  329. "SNI": "",
  330. "TlsIP": "",
  331. "ProxyIP": "104.16.53.111",
  332. "ProxyPort": "80",
  333. "Info": "Proxy"
  334. },
  335. {
  336. "Name": "VIVO 02",
  337. "FLAG": "vivo",
  338. "Payload": "GET-CONTROL wss://[app_host] [protocol][crlf]Host: proxy.hmtutors.ga[crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf][crlf]",
  339. "SNI": "[app_host]",
  340. "TlsIP": "[app_host]",
  341. "ProxyIP": "104.16.51.111",
  342. "ProxyPort": "443",
  343. "Info": "Tlsws"
  344. },
  345. {
  346. "Name": "CLARO ON EM ALGUNS DDS",
  347. "FLAG": "claro",
  348. "Payload": "GET / HTTP/1.1[crlf]Host: [app_host][crlf]Connection: Upgrade[crlf]Upgrade: Websocket[crlf][crlf]",
  349. "SNI": "",
  350. "TlsIP": "",
  351. "ProxyIP": "52.85.34.50",
  352. "ProxyPort": "80",
  353. "Info": "Direct"
  354. },
  355. {
  356. "Name": "ℂ𝕃𝔸ℝ𝕆 (PLANOS)",
  357. "FLAG": "claro",
  358. "Payload": "",
  359. "SNI": ".web.whatsapp.com",
  360. "TlsIP": "",
  361. "ProxyIP": "",
  362. "ProxyPort": "",
  363. "Info": "Ssl"
  364. },
  365. {
  366. "Name": "ℂ𝕃𝔸ℝ𝕆 (PLANOS)",
  367. "FLAG": "claro",
  368. "Payload": "",
  369. "SNI": ".cdn.web.whatsapp.com",
  370. "TlsIP": "",
  371. "ProxyIP": "",
  372. "ProxyPort": "",
  373. "Info": "Ssl"
  374. },
  375. {
  376. "Name": "CLARO (PLANOS)",
  377. "FLAG": "claro",
  378. "Payload": "",
  379. "SNI": ".dns.web.whatsapp.com",
  380. "TlsIP": "",
  381. "ProxyIP": "",
  382. "ProxyPort": "",
  383. "Info": "Ssl"
  384. },
  385. {
  386. "Name": "CLARO ALGUNS DDDS 01",
  387. "FLAG": "claro",
  388. "Payload": "GET https://brunaclaro.com.br HTTP/1.0[crlf]Host: https://brunaclaro.com.br[crlf]Connection: keep-alive[crlf]User-Agent: Upgrade [crlf][crlf]",
  389. "SNI": "",
  390. "TlsIP": "[app_host]",
  391. "ProxyIP": "",
  392. "ProxyPort": "80",
  393. "Info": "Direct"
  394. },
  395. {
  396. "Name": "CLARO ALGUNS DDDS 02",
  397. "FLAG": "claro",
  398. "Payload": "GET https://minhaclaroresidencial.claro.com.br HTTP/1.0[crlf]Host: https://minhaclaroresidencial.claro.com.br[crlf]Connection: keep-alive[crlf]User-Agent: Upgrade [crlf][crlf]",
  399. "SNI": "",
  400. "TlsIP": "[app_host]",
  401. "ProxyIP": "",
  402. "ProxyPort": "80",
  403. "Info": "Direct"
  404. },
  405. {
  406. "Name": "CLARO ALGUNS DDDS 03",
  407. "FLAG": "claro",
  408. "Payload": "GET https://m.claro.com.br HTTP/1.0[crlf]Host: https://m.claro.com.br[crlf]Connection: keep-alive[crlf]User-Agent: Upgrade [crlf][crlf]",
  409. "SNI": ".",
  410. "TlsIP": "",
  411. "ProxyIP": "[app_host]",
  412. "ProxyPort": "80",
  413. "Info": "Direct"
  414. },
  415. {
  416. "Name": "CLARO ALGUNS DDDS 04",
  417. "FLAG": "claro",
  418. "Payload": "GET https://ecob.claro.com.br HTTP/1.0[crlf]Host: https://ecob.claro.com.br[crlf]Connection: keep-alive[crlf]User-Agent: Upgrade [crlf][crlf]",
  419. "SNI": ".",
  420. "TlsIP": "",
  421. "ProxyIP": "[app_host]",
  422. "ProxyPort": "80",
  423. "Info": "Direct"
  424. },
  425. {
  426. "Name": "CLARO ALGUNS DDDS 05",
  427. "FLAG": "claro",
  428. "Payload": "GET https://bonuz.claro.com.br HTTP/1.0[crlf]Host: https://bonuz.claro.com.br[crlf]Connection: keep-alive[crlf]User-Agent: Upgrade [crlf][crlf]",
  429. "SNI": "",
  430. "TlsIP": "[app_host]",
  431. "ProxyIP": "",
  432. "ProxyPort": "80",
  433. "Info": "Direct"
  434. },
  435. {
  436. "Name": "CLARO ALGUNS DDDS 06",
  437. "FLAG": "claro",
  438. "Payload": "GET https://www.claro.com.br HTTP/1.0[crlf]Host: https://www.claro.com.br[crlf]Connection: keep-alive[crlf]User-Agent: Upgrade [crlf][crlf]",
  439. "SNI": "",
  440. "TlsIP": "[app_host]",
  441. "ProxyIP": "",
  442. "ProxyPort": "80",
  443. "Info": "Direct"
  444. },
  445. {
  446. "Name": "CLARO ALGUNS DDDS 07",
  447. "FLAG": "claro",
  448. "Payload": "GET https://claro.com.br HTTP/1.0[crlf]Host: https://claro.com.br[crlf]Connection: keep-alive[crlf]User-Agent: Upgrade [crlf][crlf]",
  449. "SNI": "",
  450. "TlsIP": "[app_host]",
  451. "ProxyIP": "",
  452. "ProxyPort": "80",
  453. "Info": "Direct"
  454. },
  455. {
  456. "Name": "CLARO ALGUNS DDDS 08",
  457. "FLAG": "claro",
  458. "Payload": "GET ws://blog.kaltura.com HTTP/1.1\nHost: [app_host]\nUpgrade: ws\n\n",
  459. "SNI": "",
  460. "TlsIP": "blog.kaltura.com",
  461. "ProxyIP": "blog.kaltura.com",
  462. "ProxyPort": "",
  463. "Info": "Tlsws"
  464. },
  465. {
  466. "Name": "CLARO MODO LENTO",
  467. "FLAG": "claro",
  468. "Payload": "GET ws://content.akross.com.br HTTP/1.1\nHost: [app_host]\nUpgrade: ws\n\n",
  469. "SNI": ".",
  470. "TlsIP": "content.akross.com.br",
  471. "ProxyIP": "content.akross.com.br",
  472. "ProxyPort": "",
  473. "Info": "Tlsws"
  474. },
  475. {
  476. "Name": "🔵 TIM FAST",
  477. "FLAG": "tim",
  478. "Payload": "GET / HTTP/1.1\nHost: api.sandbox.c6bank.com.br\nExpect: 100-continue\n\n[split]\n\nACL /?/ HTTP/1.1\nHost: brasil-1.sshconect-ip.xyz\nExpect: 100-continue\nUpgrade: websocket\nUser-Agent: Googlebot/2.1 (+http://www.google.com/bot.html)\n\n",
  479. "SNI": "",
  480. "TlsIP": "",
  481. "ProxyIP": "104.19.239.25",
  482. "ProxyPort": "80",
  483. "Info": "Proxy"
  484. },
  485. {
  486. "Name": "TIM (TESTE) 01",
  487. "FLAG": "tim",
  488. "Payload": "GET / HTTP/1.1[crlf]Host: c6bank.com.br[crlf]Expect: 100-continue[crlf][crlf][split][crlf][crlf]ACL- // HTTP/1.1[crlf]Host: bra7.hackkcah.net[crlf]Expect: 100-continue[crlf]Upgrade: websocket[crlf]User-Agent: Googlebot/2.1 (+http://www.google.com/bot.html)[crlf][crlf]",
  489. "SNI": "",
  490. "TlsIP": "",
  491. "ProxyIP": "104.19.239.25",
  492. "ProxyPort": "80",
  493. "Info": "Direct"
  494. },
  495. {
  496. "Name": "TIM (TESTE) 02",
  497. "FLAG": "tim",
  498. "Payload": "GET / HTTP/1.1\nHost: api.sandbox.c6bank.com.br\nExpect: 100-continue\n\n[split]\n\nACL /?/ HTTP/1.1\nHost: tá bra7.hackkcah.net\nExpect: 100-continue\nUpgrade: websocket\nUser-Agent: Googlebot/2.1 (+http://www.google.com/bot.html)\n\n",
  499. "SNI": "",
  500. "TlsIP": "",
  501. "ProxyIP": "104.19.239.25",
  502. "ProxyPort": "80",
  503. "Info": "Direct"
  504. },
  505. {
  506. "Name": "TIM (TESTE) 03",
  507. "FLAG": "tim",
  508. "Payload": "GET / HTTP/1.1[lf]Host: api.sandbox.c6bank.com.br[lf]:[lf][split][lf]GET- / HTTP/1.1[lf]Host: bra7.hackkcah.net[lf]Upgrade: ws[lf]User-Agent: yes[lf][lf]",
  509. "SNI": "",
  510. "TlsIP": "",
  511. "ProxyIP": "104.19.239.25",
  512. "ProxyPort": "80",
  513. "Info": "Direct"
  514. },
  515. {
  516. "Name": "╰┈[☞>𝗧𝗜𝗠🔵𝟱𝗚(TESTE) 04",
  517. "FLAG": "tim",
  518. "Payload": "GET / HTTP/1.1[crlf]Host: cdn.c6bank.com.br[crlf]Expect: 100-continue[crlf][crlf][split][crlf][crlf]ACL / HTTP/1.1[crlf]Host: bra7.hackkcah.net[crlf]Upgrade: Websocket[crlf][crlf]",
  519. "SNI": "",
  520. "TlsIP": "",
  521. "ProxyIP": "104.19.239.25",
  522. "ProxyPort": "80",
  523. "Info": "Direct"
  524. },
  525. {
  526. "Name": "TODAS AS PAYLOADS ABAIXO SO COM MODO AVIÃO",
  527. "FLAG": "viv",
  528. "Payload": "GET / HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Upgrade[crlf][crlf]",
  529. "SNI": "104.16.51.111",
  530. "TlsIP": "104.16.51.111",
  531. "ProxyIP": "104.16.51.111",
  532. "ProxyPort": "443",
  533. "Info": "Auto"
  534. },
  535. {
  536. "Name": "🚀INJECT 01🚀",
  537. "FLAG": "vivo",
  538. "Payload": "GET-TOPSPEED wss://[app_host]/ HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]TOPSPEED[crlf][crlf]",
  539. "SNI": "[app_host]",
  540. "TlsIP": "104.16.53.111",
  541. "ProxyIP": "104.16.51.111",
  542. "ProxyPort": "443",
  543. "Info": "Tlsws"
  544. },
  545. {
  546. "Name": "🚀INJECT 02🚀",
  547. "FLAG": "vivo",
  548. "Payload": "GET-TOPSPEED wss://[app_host]/ HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]TOPSPEED[crlf][crlf]",
  549. "SNI": "[app_host]",
  550. "TlsIP": "104.16.53.111",
  551. "ProxyIP": "104.16.53.111",
  552. "ProxyPort": "443",
  553. "Info": "tlsws"
  554. },
  555. {
  556. "Name": "🚀INJECT 03🚀",
  557. "FLAG": "vivo",
  558. "Payload": "GET-TOPSPEED wss://[app_host]/ HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]TOPSPEED[crlf][crlf]",
  559. "SNI": "[app_host]",
  560. "TlsIP": "104.16.53.111",
  561. "ProxyIP": "104.16.53.111",
  562. "ProxyPort": "443",
  563. "Info": "Tlsws"
  564. },
  565. {
  566. "Name": "🚀INJECT 04🚀",
  567. "FLAG": "vivo",
  568. "Payload": "GET-TOPSPEED wss://[app_host]/ HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]TOPSPEED[crlf][crlf]",
  569. "SNI": "[app_host]",
  570. "TlsIP": "104.16.53.111",
  571. "ProxyIP": "104.16.53.111",
  572. "ProxyPort": "443",
  573. "Info": "Tlsws"
  574. },
  575. {
  576. "Name": "🚀INJECT 05🚀 EM ALGUNS DDDS",
  577. "FLAG": "vivo",
  578. "Payload": "GET / HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: WebSocket[crlf][crlf]",
  579. "SNI": "support.deezer.com",
  580. "TlsIP": "support.deezer.com",
  581. "ProxyIP": "support.deezer.com",
  582. "ProxyPort": "80",
  583. "Info": "Proxy"
  584. },
  585. {
  586. "Name": "PAYLOADS (FRONT) 01",
  587. "FLAG": "vivo",
  588. "Payload": "GET / HTTP/1.1[crlf]Host: [app_host][crlf]Connection: Upgrade[crlf]Upgrade: Websocket[crlf][crlf]",
  589. "SNI": "",
  590. "TlsIP": "",
  591. "ProxyIP": "104.16.53.111",
  592. "ProxyPort": "80",
  593. "Info": "Proxy"
  594. },
  595. {
  596. "Name": "VIVO (EASY)",
  597. "FLAG": "vivo",
  598. "Payload": "GET / HTTP/1.1[crlf]Host: [app_host][crlf]Connection: Upgrade[crlf]Upgrade: Websocket[crlf][crlf]",
  599. "SNI": "",
  600. "TlsIP": "",
  601. "ProxyIP": "104.18.43.147",
  602. "ProxyPort": "80",
  603. "Info": "Proxy"
  604. },
  605. {
  606. "Name": "VIVO (EASY)",
  607. "FLAG": "vivo",
  608. "Payload": "GET / HTTP/1.1[crlf]Host: [app_host][crlf]Connection: Upgrade[crlf]Upgrade: Websocket[crlf][crlf]",
  609. "SNI": "",
  610. "TlsIP": "",
  611. "ProxyIP": "104.18.7.80",
  612. "ProxyPort": "80",
  613. "Info": "Proxy"
  614. },
  615. {
  616. "Name": "OI (01)",
  617. "FLAG": "oi",
  618. "Payload": "GET wss://www.hbogo.com.br/ HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf][crlf]",
  619. "SNI": "www.hbogo.com.br",
  620. "TlsIP": "www.hbogo.com.br",
  621. "ProxyIP": "",
  622. "ProxyPort": "",
  623. "Info": "Tlsws"
  624. },
  625. {
  626. "Name": "OI (02)",
  627. "FLAG": "oi",
  628. "Payload": "GET / HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf][crlf]",
  629. "SNI": "[app_host]",
  630. "TlsIP": "www.hbogo.com.br",
  631. "ProxyIP": "",
  632. "ProxyPort": "",
  633. "Info": "Tlsws"
  634. }
  635. ]
  636. }

comments powered by Disqus