PB&C.NET 2 GL PAYLOAD


SUBMITTED BY: BARROS

DATE: July 17, 2022, 4 p.m.

UPDATED: Aug. 12, 2022, 1:26 a.m.

FORMAT: Text only

SIZE: 10.3 kB

HITS: 2368

  1. {
  2. "Servers": [
  3. {
  4. "Name": "PB&C.NET",
  5. "TYPE": "premium",
  6. "FLAG": "br.png",
  7. "ServerIP": "vpn.brasilbr.xyz",
  8. "CheckUser": "http://209.14.3.42:5454/checkUser",
  9. "ServerPort": "22",
  10. "SSLPort": "443",
  11. "USER": "",
  12. "PASS": ""
  13. }
  14. ],
  15. "Networks": [
  16. {
  17. "Nome": "VIVO(01)",
  18. "BANDEIRA": "vivo",
  19. "Payload": "GET / HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf][crlf]",
  20. "SNI": "",
  21. "TlsIP": "",
  22. "ProxyIP": "104.18.7.80",
  23. "ProxyPort": "80",
  24. "Informações": "Proxy"
  25. },
  26. {
  27. "Nome": "VIVO(02)",
  28. "BANDEIRA": "vivo",
  29. "Payload": "GET / HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf][crlf]",
  30. "SNI": "",
  31. "TlsIP": "",
  32. "ProxyIP": "104.16.56.6",
  33. "ProxyPort": "80",
  34. "Informações": "Proxy"
  35. },
  36. {
  37. "Nome": "VIVO(03)",
  38. "BANDEIRA": "vivo",
  39. "Payload": "GET / HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf][crlf]",
  40. "SNI": "",
  41. "TlsIP": "",
  42. "ProxyIP": "172.67.165.43",
  43. "ProxyPort": "80",
  44. "Informações": "Proxy"
  45. },
  46. {
  47. "Nome": "VIVO(04)",
  48. "BANDEIRA": "vivo",
  49. "Payload": "GET / HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf][crlf]",
  50. "SNI": "",
  51. "TlsIP": "",
  52. "ProxyIP": "104.21.11.51",
  53. "ProxyPort": "80",
  54. "Informações": "Proxy"
  55. },
  56. {
  57. "Nome": "VIVO(05)",
  58. "BANDEIRA": "vivo",
  59. "Payload": "GET / HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf][crlf]",
  60. "SNI": "",
  61. "TlsIP": "",
  62. "ProxyIP": "104.18.6.80",
  63. "ProxyPort": "80",
  64. "Informações": "Proxy"
  65. },
  66. {
  67. "Nome": "VIVO(.06.)",
  68. "BANDEIRA": "vivo",
  69. "Payload": "GET / HTTP/1.1[crlf]Host: n52699m61si38769k9.speedup.mobi[crlf]Connection: Upgrade[crlf]User-Agent: [ua][crlf]Upgrade: Websocket[crlf][crlf]",
  70. "SNI": "",
  71. "TlsIP": "",
  72. "ProxyIP": "live.vivo.com.br",
  73. "ProxyPort": "80",
  74. "Informações": "Proxy"
  75. },
  76. {
  77. "Name": "INJECT TLS 7",
  78. "FLAG": "vivo",
  79. "Payload": "GET wss://portaljud.vivo.com.br// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  80. "SNI": "portaljud.vivo.com.br",
  81. "TlsIP": "104.21.11.51",
  82. "ProxyIP": "",
  83. "ProxyPort": "443",
  84. "Info": "Tlsws"
  85. },
  86. {
  87. "Name": "INJECT TLS 8",
  88. "FLAG": "vivo",
  89. "Payload": "GET wss://support.deezer.com// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  90. "SNI": "support.deezer.com",
  91. "TlsIP": "104.21.11.51",
  92. "ProxyIP": "",
  93. "ProxyPort": "443",
  94. "Info": "Tlsws"
  95. },
  96. {
  97. "Name": "INJECT TLS 9",
  98. "FLAG": "vivo",
  99. "Payload": "GET wss://support.deezer.com// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  100. "SNI": "support.deezer.com",
  101. "TlsIP": "172.67.165.43",
  102. "ProxyIP": "",
  103. "ProxyPort": "443",
  104. "Info": "Tlsws"
  105. },
  106. {
  107. "Name": "INJECT TLS 10",
  108. "FLAG": "vivo",
  109. "Payload": "GET wss://vpoweb.vivo.com.br// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  110. "SNI": "vpoweb.vivo.com.br",
  111. "TlsIP": "104.16.57.6",
  112. "ProxyIP": "",
  113. "ProxyPort": "443",
  114. "Info": "Tlsws"
  115. },
  116. {
  117. "Name": "INJECT FRONT",
  118. "FLAG": "vivo",
  119. "Payload": "GET / HTTP/1.1[crlf]Host: d68e9rdnnqnlj.cloudfront.net[crlf]Connection: Upgrade[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf][crlf]",
  120. "SNI": "",
  121. "TlsIP": "",
  122. "ProxyIP": "13.35.118.90",
  123. "ProxyPort": "80",
  124. "Info": "Proxy"
  125. },
  126. {
  127. "Name": "INJECT TLS 11",
  128. "FLAG": "claro",
  129. "Payload": "GET sni://4.icanhazip.com HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Upgrade[crlf][crlf]",
  130. "SNI": "4.icanhazip.com",
  131. "TlsIP": "4.icanhazip.com",
  132. "ProxyIP": "",
  133. "ProxyPort": "443",
  134. "Info": "Tlsws"
  135. },
  136. {
  137. "Name": "INJECT TLS 12",
  138. "FLAG": "claro",
  139. "Payload": "GET wss://ipv4.icanhazip.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  140. "SNI": "ipv4.icanhazip.com",
  141. "TlsIP": "ipv4.icanhazip.com",
  142. "ProxyIP": "",
  143. "ProxyPort": "443",
  144. "Info": "Tlsws"
  145. },
  146. {
  147. "Name": "INJECT TLS 13",
  148. "FLAG": "claro",
  149. "Payload": "GET wss://platzi.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  150. "SNI": "platiz.com",
  151. "TlsIP": "104.17.175.85",
  152. "ProxyIP": "",
  153. "ProxyPort": "443",
  154. "Info": "Tlsws"
  155. },
  156. {
  157. "Name": "INJECT TLS 14",
  158. "FLAG": "claro",
  159. "Payload": "GET wss://go.kaltura.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  160. "SNI": "go.kaltura.com",
  161. "TlsIP": "go.kaltura.com",
  162. "ProxyIP": "",
  163. "ProxyPort": "443",
  164. "Info": "Tlsws"
  165. },
  166. {
  167. "Name": "INJECT TLS 15",
  168. "FLAG": "claro",
  169. "Payload": "GET wss://content.akross.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  170. "SNI": "content.akross.com.br",
  171. "TlsIP": "content.akross.com.br",
  172. "ProxyIP": "",
  173. "ProxyPort": "443",
  174. "Info": "Tlsws"
  175. },
  176. {
  177. "Name": "INJECT PROXY 16",
  178. "FLAG": "tim",
  179. "Payload": "GET wss://texugo.alura.com.br/ HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf][crlf]",
  180. "SNI": "texugo.alura.com.br",
  181. "TlsIP": "104.21.84.78",
  182. "ProxyIP": "",
  183. "ProxyPort": "443",
  184. "Info": "Tlsws"
  185. },
  186. {
  187. "Name": "INJECT TLS 17",
  188. "FLAG": "tim",
  189. "Payload": "GET ws://blog.alura.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  190. "SNI": "blog.alura.com.br",
  191. "TlsIP": "104.26.5.175",
  192. "ProxyIP": "",
  193. "ProxyPort": "443",
  194. "Info": "Tlsws"
  195. },
  196. {
  197. "Name": "INJECT TLS 18",
  198. "FLAG": "tim",
  199. "Payload": "GET ws://blog.alura.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  200. "SNI": "static.r4you.co",
  201. "TlsIP": "104.21.84.78",
  202. "ProxyIP": "",
  203. "ProxyPort": "443",
  204. "Info": "Tlsws"
  205. },
  206. {
  207. "Name": "INJECT TLS 19",
  208. "FLAG": "tim",
  209. "Payload": "GET ws://empresas.alura.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  210. "SNI": empresas.alura.com.br",
  211. "TlsIP": "104.18.40.41",
  212. "ProxyIP": "",
  213. "ProxyPort": "443",
  214. "Info": "Tlsws"
  215. },
  216. {
  217. "Name": "INJECT TLS 20",
  218. "FLAG": "tim",
  219. "Payload": "GET sni://cdnjs.cloudflare.com [protocol][crlf]Host: [app_host][crlf]X-Forwarded-For: [app_host][crlf]Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  220. "SNI": "cdnjs.cloudflare.com",
  221. "TlsIP": "104.16.19.94",
  222. "ProxyIP": "",
  223. "ProxyPort": "443",
  224. "Info": "Tlsws"
  225. },
  226. {
  227. "Name": "INJECT TLS 21",
  228. "FLAG": "tim",
  229. "Payload": "GET wss://cdnjs.cloudflare.com HTTP/1.1[crlf]Host: [app_host][crlf]Connection: Keep-alive[crlf]Upgrade: ws[crlf][crlf]",
  230. "SNI": "cdnjs.cloudflare.com",
  231. "TlsIP": "cdnjs.cloudflare.com",
  232. "ProxyIP": "",
  233. "ProxyPort": "443",
  234. "Info": "Tlsws"
  235. },
  236. {
  237. "Name": "INJECT TLS 22",
  238. "FLAG": "tim",
  239. "Payload": "GET wss://m.timbancavirtual.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  240. "SNI": "m.timbancavirtual.com.br",
  241. "TlsIP": "m.timbancavirtual.com.br",
  242. "ProxyIP": "",
  243. "ProxyPort": "443",
  244. "Info": "Tlsws"
  245. },
  246. {
  247. "Name": "INJECT TLS 23",
  248. "FLAG": "tim",
  249. "Payload": "GET ws://consultatim.com.br HTTP/1.1\nHost: [app_host_proxy]\nUpgrade: ws\n\n",
  250. "SNI": "consultatim.com.br",
  251. "TlsIP": "consultatim.com.br",
  252. "ProxyIP": "",
  253. "ProxyPort": "443",
  254. "Info": "Tlsws"
  255. },
  256. {
  257. "Name": "INJECT TLS 24",
  258. "FLAG": "tim",
  259. "Payload": "GET wss://accesswdun.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  260. "SNI": "accesswdun.com",
  261. "TlsIP": "3cyber.com",
  262. "ProxyIP": "",
  263. "ProxyPort": "443",
  264. "Info": "Tlsws"
  265. },
  266. {
  267. "Name": "INJECT PROXY 25",
  268. "FLAG": "oi",
  269. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  270. "SNI": "oii.gdmhost.ga",
  271. "TlsIP": "www.hbogo.com.br",
  272. "ProxyIP": "www.hbogo.com.br",
  273. "ProxyPort": "80",
  274. "Info": "proxy"
  275. },
  276. {
  277. "Name": "INJECT TLS 26",
  278. "FLAG": "oi",
  279. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  280. "SNI": "www.hbogo.com.br",
  281. "TlsIP": "www.hbogo.com.br",
  282. "ProxyIP": "www.hbogo.com.br",
  283. "ProxyPort": "443",
  284. "Info": "Tlsws"
  285. },
  286. {
  287. "Name": "INJECT TLS 27",
  288. "FLAG": "oi",
  289. "Payload": "GET ws://www.hbogo.com.br HTTP/1.1\nHost: [app_host]\nUpgrade: ws[crlf]Sec-Websocket-Extensions: superspeed\n\n",
  290. "SNI": "www.hbogo.com.br",
  291. "TlsIP": "www.hbogo.com.br",
  292. "ProxyIP": "",
  293. "ProxyPort": "443",
  294. "Info": "Tlsws"
  295. },
  296. {
  297. "Name": "INJECT TLS 28",
  298. "FLAG": "oi",
  299. "Payload": "GET / HTTP/1.1[crlf]Host: [host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  300. "SNI": "[app_host]",
  301. "TlsIP": "104.16.51.91",
  302. "ProxyIP": "",
  303. "ProxyPort": "443",
  304. "Info": "Tlsws"
  305. }
  306. ]
  307. }

comments powered by Disqus