Confi app madara


SUBMITTED BY: Pshnet

DATE: June 23, 2022, 6:09 a.m.

UPDATED: June 23, 2022, 1:59 p.m.

FORMAT: Text only

SIZE: 9.2 kB

HITS: 383

  1. {
  2. "Version": "1.0.2",
  3. "ReleaseNotes": "🇧🇷Novas configurações nos servidores, atualize para se manter conectado (a)!",
  4. "UrlUpdate": "https://bitbin.it/isnC9Vf7/raw/",
  5. "Sms": "https://bitbin.it/gT4Nm5RH/raw/",
  6. "EmailFeedback": "cloumker@gmail.com",
  7. "UrlContato": "https://t.me/BRISANET_br",
  8. "UrlTermos": "https://www.google.com/search?q=speedtest&oq=speedtest&aqs=chrome..69i57j0i131i395i433i512l2j5i44i395j0i395i512j0i395i433i512j0i395i512l2.11520j1j4&client=ms-android-samsung-gj-rev1&sourceid=chrome-mobile&ie=UTF-8",
  9. "CheckUser": "true",
  10. "Udp": [
  11. {
  12. "Porta": "7300,7100,7200,7400"
  13. }
  14. ],
  15. "Servers": [
  16. {
  17. "Name": "BR-SV1 | PREMIUM",
  18. "TYPE": "premium",
  19. "FLAG": "br.png",
  20. "ServerIP": "cubot.jimmyldn.xyz",
  21. "CheckUser": "http://cubot.jimmyldn.xyz:8080/checkUser",
  22. "ServerPort": "22",
  23. "SSLPort": "443",
  24. "USER": "",
  25. "PASS": ""
  26. },
  27. ],
  28. "Networks": [
  29. {
  30. "Name": "INJECT PROXY 1",
  31. "FLAG": "vivo",
  32. "Payload": "GET wss://beneficios.vivo.com.br [protocol][crlf]Host: [app_host][crlf] Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  33. "SNI": "beneficios.vivo.com.br",
  34. "TlsIP": "beneficios.vivo.com.br",
  35. "ProxyIP": "",
  36. "ProxyPort": "443",
  37. "Info": "Tlsws"
  38. },
  39. {
  40. "Name": "INJECT PROXY 2",
  41. "FLAG": "Vivo",
  42. "Payload": "GET wss://gedoc.vivo.com.br [protocol][crlf]Host: [app_host][crlf] Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  43. "SNI": "gedoc.vivo.com.br",
  44. "TlsIP": "gedoc.vivo.com.br",
  45. "ProxyIP": "",
  46. "ProxyPort": "443",
  47. "Info": "proxy"
  48. },
  49. {
  50. "Name": "INJECT TLS 3",
  51. "FLAG": "vivo",
  52. "Payload": "GET wss://bi-router.movistar.com.ar [protocol][crlf]Host: [app_host][crlf] Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  53. "SNI": "bi-router.movistar.com.ar",
  54. "TlsIP": "bi-router.movistar.com.ar",
  55. "ProxyIP": "",
  56. "ProxyPort": "443",
  57. "Info": "Tlsws"
  58. },
  59. {
  60. "Name": "INJECT TLS 4",
  61. "FLAG": "vivo",
  62. "Payload": "GET wss://bi-router.movistar.com.ar [protocol][crlf]Host: [app_host][crlf] Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  63. "SNI": "bi-router.movistar.com.ar",
  64. "TlsIP": "104.18.6.80",
  65. "ProxyIP": "",
  66. "ProxyPort": "443",
  67. "Info": "Tlsws"
  68. },
  69. {
  70. "Name": "INJECT TLS 5",
  71. "FLAG": "vivo",
  72. "Payload": "GET wss://help.cloudflareclient.com/ HTTP/1.1[crlf]Host: [app_host][crlf]Connection: keep-alive[crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  73. "SNI": "help.cloudflareclient.com",
  74. "TlsIP": "vigia.vivo.com.br",
  75. "ProxyIP": "",
  76. "ProxyPort": "443",
  77. "Info": "Tlsws"
  78. },
  79. {
  80. "Name": "INJECT TLS 6",
  81. "FLAG": "claro",
  82. "Payload": "GET sni://ct.livestream.com HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Upgrade[crlf][crlf]",
  83. "SNI": "ct.livestream.com",
  84. "TlsIP": "ct.livestream.com",
  85. "ProxyIP": "",
  86. "ProxyPort": "443",
  87. "Info": "Tlsws"
  88. },
  89. {
  90. "Name": "INJECT TLS 7",
  91. "FLAG": "claro",
  92. "Payload": "GET wss://ct.livestream.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  93. "SNI": "ct.livestream.com",
  94. "TlsIP": "ct.livestream.com",
  95. "ProxyIP": "",
  96. "ProxyPort": "443",
  97. "Info": "Tlsws"
  98. },
  99. {
  100. "Name": "INJECT TLS 8",
  101. "FLAG": "claro",
  102. "Payload": "GET wss://go.kaltura.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  103. "SNI": "go.kaltura.com",
  104. "TlsIP": "go.kaltura.com",
  105. "ProxyIP": "",
  106. "ProxyPort": "443",
  107. "Info": "Tlsws"
  108. },
  109. {
  110. "Name": "INJECT TLS 9",
  111. "FLAG": "claro",
  112. "Payload": "GET wss://ct.livestream.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  113. "SNI": "ct.livestream.com",
  114. "TlsIP": "ct.livestream.com",
  115. "ProxyIP": "",
  116. "ProxyPort": "443",
  117. "Info": "Tlsws"
  118. },
  119. {
  120. "Name": "INJECT TLS 10",
  121. "FLAG": "claro",
  122. "Payload": "GET wss://content.akross.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  123. "SNI": "content.akross.com.br",
  124. "TlsIP": "content.akross.com.br",
  125. "ProxyIP": "",
  126. "ProxyPort": "443",
  127. "Info": "Tlsws"
  128. },
  129. {
  130. "Name": "INJECT PROXY 11",
  131. "FLAG": "tim",
  132. "Payload": "GET wss://static.r4you.co/ HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf][crlf]",
  133. "SNI": "static.r4you.co",
  134. "TlsIP": "static.r4you.co",
  135. "ProxyIP": "",
  136. "ProxyPort": "443",
  137. "Info": "Tlsws"
  138. },
  139. {
  140. "Name": "INJECT TLS 12",
  141. "FLAG": "tim",
  142. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  143. "SNI": "static.r4you.co",
  144. "TlsIP": "104.26.5.175",
  145. "ProxyIP": "",
  146. "ProxyPort": "443",
  147. "Info": "Tlsws"
  148. },
  149. {
  150. "Name": "INJECT TLS 13",
  151. "FLAG": "tim",
  152. "Payload": "GET ws://static.r4you.co HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  153. "SNI": "static.r4you.co",
  154. "TlsIP": "104.26.5.175",
  155. "ProxyIP": "",
  156. "ProxyPort": "443",
  157. "Info": "Tlsws"
  158. },
  159. {
  160. "Name": "INJECT TLS 14",
  161. "FLAG": "tim",
  162. "Payload": "GET / HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  163. "SNI": "[app_host]",
  164. "TlsIP": "104.16.18.94",
  165. "ProxyIP": "",
  166. "ProxyPort": "443",
  167. "Info": "Tlsws"
  168. },
  169. {
  170. "Name": "INJECT TLS 15",
  171. "FLAG": "tim",
  172. "Payload": "GET sni://cdnjs.cloudflare.com [protocol][crlf]Host: [app_host][crlf]X-Forwarded-For: [app_host][crlf]Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  173. "SNI": "cdnjs.cloudflare.com",
  174. "TlsIP": "104.16.19.94",
  175. "ProxyIP": "",
  176. "ProxyPort": "443",
  177. "Info": "Tlsws"
  178. },
  179. {
  180. "Name": "INJECT TLS 16",
  181. "FLAG": "tim",
  182. "Payload": "GET wss://cdnjs.cloudflare.com HTTP/1.1[crlf]Host: [app_host][crlf]Connection: Keep-alive[crlf]Upgrade: ws[crlf][crlf]",
  183. "SNI": "cdnjs.cloudflare.com",
  184. "TlsIP": "cdnjs.cloudflare.com",
  185. "ProxyIP": "",
  186. "ProxyPort": "443",
  187. "Info": "Tlsws"
  188. },
  189. {
  190. "Name": "INJECT TLS 17",
  191. "FLAG": "tim",
  192. "Payload": "GET wss://m.timbancavirtual.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  193. "SNI": "m.timbancavirtual.com.br",
  194. "TlsIP": "m.timbancavirtual.com.br",
  195. "ProxyIP": "",
  196. "ProxyPort": "443",
  197. "Info": "Tlsws"
  198. },
  199. {
  200. "Name": "INJECT TLS 18",
  201. "FLAG": "tim",
  202. "Payload": "GET ws://static.r4you.co HTTP/1.1\nHost: [app_host_proxy]\nUpgrade: ws\n\n",
  203. "SNI": "static.r4you.co",
  204. "TlsIP": "104.26.5.175",
  205. "ProxyIP": "",
  206. "ProxyPort": "443",
  207. "Info": "Tlsws"
  208. },
  209. {
  210. "Name": "INJECT TLS 19",
  211. "FLAG": "tim",
  212. "Payload": "GET wss://accesswdun.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  213. "SNI": "accesswdun.com",
  214. "TlsIP": "3cyber.com",
  215. "ProxyIP": "",
  216. "ProxyPort": "443",
  217. "Info": "Tlsws"
  218. },
  219. {
  220. "Name": "INJECT PROXY 20",
  221. "FLAG": "oi",
  222. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  223. "SNI": "oii.gdmhost.ga",
  224. "TlsIP": "www.hbogo.com.br",
  225. "ProxyIP": "www.hbogo.com.br",
  226. "ProxyPort": "80",
  227. "Info": "proxy"
  228. },
  229. {
  230. "Name": "INJECT TLS 21",
  231. "FLAG": "oi",
  232. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  233. "SNI": "www.hbogo.com.br",
  234. "TlsIP": "www.hbogo.com.br",
  235. "ProxyIP": "www.hbogo.com.br",
  236. "ProxyPort": "443",
  237. "Info": "Tlsws"
  238. },
  239. {
  240. "Name": "INJECT TLS 22",
  241. "FLAG": "oi",
  242. "Payload": "GET ws://www.hbogo.com.br HTTP/1.1\nHost: [app_host]\nUpgrade: ws[crlf]Sec-Websocket-Extensions: superspeed\n\n",
  243. "SNI": "www.hbogo.com.br",
  244. "TlsIP": "www.hbogo.com.br",
  245. "ProxyIP": "",
  246. "ProxyPort": "443",
  247. "Info": "Tlsws"
  248. },
  249. {
  250. "Name": "INJECT TLS 23",
  251. "FLAG": "oi",
  252. "Payload": "GET / HTTP/1.1[crlf]Host: [host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  253. "SNI": "[app_host]",
  254. "TlsIP": "104.16.51.91",
  255. "ProxyIP": "",
  256. "ProxyPort": "443",
  257. "Info": "Tlsws"
  258. }
  259. ]
  260. }

comments powered by Disqus