PAY MNK 4g


SUBMITTED BY: Fabioassis

DATE: July 7, 2022, 11:48 p.m.

UPDATED: March 9, 2023, 4:01 p.m.

FORMAT: Text only

SIZE: 18.6 kB

HITS: 6445

  1. {
  2. "Version": "1.4.4",
  3. "ReleaseNotes": "Nova Atualização Disponível",
  4. "UrlUpdate": "https://bitbin.it/s4xeaUip/raw/",
  5. "Sms": "https://bitbin.it/AQnugEkU/raw/",
  6. "EmailFeedback": "fabioriohockey@gmail.com",
  7. "UrlContato": "",
  8. "UrlTermos": "",
  9. "CheckUser": "true",
  10. "UdpPort": "7300;7500;7295;7296;7200;7297;7298;7299;7400",
  11. "Servers": [
  12. {
  13. "Name": "MONKEY CONNECT",
  14. "TYPE": "premium",
  15. "FLAG": "br.png",
  16. "ServerIP": "monkey.netdoscria.online",
  17. "CheckUser": "http://152.67.43.16:5454/checkUser",
  18. "ServerPort": "22",
  19. "SSLPort": "443",
  20. "USER": "",
  21. "PASS": ""
  22. },
  23. ],
  24. "Networks": [
  25. {
  26. "Name": "VIVO DDD 21,11,31,33,34,42,51,62,81,92",
  27. "FLAG": "vivo.png",
  28. "Payload": "GET / HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf][crlf]",
  29. "SNI": "",
  30. "TlsIP": "",
  31. "ProxyIP": "104.18.102.45",
  32. "ProxyPort": "80",
  33. "Info": "Proxy"
  34. },
  35. {
  36. "Name": "VIVO DDD 21,96,15,13,12",
  37. "FLAG": "vivo.png",
  38. "Payload": "GET / HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf][crlf]",
  39. "SNI": "",
  40. "TlsIP": "",
  41. "ProxyIP": "104.16.185.248",
  42. "ProxyPort": "80",
  43. "Info": "Proxy"
  44. },
  45. {
  46. "Name": "VIVO DDD 21,18",
  47. "FLAG": "vivo",
  48. "Payload": "GET wss://vpoweb.vivo.com.br// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  49. "SNI": "vpoweb.vivo.com.br",
  50. "TlsIP": "104.16.57.6",
  51. "ProxyIP": "",
  52. "ProxyPort": "443",
  53. "Info": "Tlsws"
  54. },
  55. {
  56. "Name": "VIVO EASY",
  57. "FLAG": "vivo",
  58. "Payload": "GET wss://vivo360.vivo.com.br/ HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf][crlf]",
  59. "SNI": "vivo360.vivo.com.br",
  60. "TlsIP": "104.18.6.80",
  61. "ProxyIP": "104.18.6.80",
  62. "ProxyPort": "443",
  63. "Info": "Tlsws"
  64. },
  65. {
  66. "Name": "VIVO DECOLA",
  67. "FLAG": "vivo",
  68. "Payload": "GET wss://unpkg.com/ HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf][crlf]",
  69. "SNI": "unpkg.com",
  70. "TlsIP": "unpkg.com",
  71. "ProxyIP": "",
  72. "ProxyPort": "443",
  73. "Info": "Tlsws"
  74. },
  75. {
  76. "Name": "INJECT PROXY 1",
  77. "FLAG": "vivo",
  78. "Payload": "GET wss://unpkg.com// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  79. "SNI": "unpkg.com",
  80. "TlsIP": "172.67.165.43",
  81. "ProxyIP": "",
  82. "ProxyPort": "443",
  83. "Info": "Tlsws"
  84. },
  85. {
  86. "Name": "INJECT PROXY 2",
  87. "FLAG": "vivo",
  88. "Payload": "GET wss://carrinho-pos-familia.vivo.com.br [protocol][crlf]Host: [app_host][crlf]X-Forwarded-For: [app_host][crlf]Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf][crlf]",
  89. "SNI": "carrinho-pos-familia.vivo.com.br",
  90. "TlsIP": "172.67.165.43",
  91. "ProxyIP": "",
  92. "ProxyPort": "443",
  93. "Info": "Tlsws"
  94. },
  95. {
  96. "Name": "INJECT PROXY 3",
  97. "FLAG": "vivo",
  98. "Payload": "GET wss://carrinho-pos-familia.vivo.com.br// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  99. "SNI": "carrinho-pos-familia.vivo.com.br",
  100. "TlsIP": "172.67.165.43",
  101. "ProxyIP": "",
  102. "ProxyPort": "443",
  103. "Info": "Tlsws"
  104. },
  105. {
  106. "Name": "INJECT TLS 4",
  107. "FLAG": "vivo",
  108. "Payload": "GET wss://carrinho-pos-familia.vivo.com.br// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  109. "SNI": "carrinho-pos-familia.vivo.com.br",
  110. "TlsIP": "172.67.165.43",
  111. "ProxyIP": "",
  112. "ProxyPort": "443",
  113. "Info": "Tlsws"
  114. },
  115. {
  116. "Name": "INJECT TLS 5",
  117. "FLAG": "vivo",
  118. "Payload": "GET wss://cdnjs.cloudflare.com [protocol][crlf]Host: [app_host][crlf] Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  119. "SNI": "cdnjs.cloudflare.com",
  120. "TlsIP": "172.67.165.43",
  121. "ProxyIP": "",
  122. "ProxyPort": "443",
  123. "Info": "Tlsws"
  124. },
  125. {
  126. "Name": "TIM PRE 1",
  127. "FLAG": "tim",
  128. "Payload": "GET ws://static.r4you.co HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: ws[crlf][crlf]",
  129. "SNI": "static.r4you.co",
  130. "TlsIP": "104.26.4.175",
  131. "ProxyIP": "104.26.4.175",
  132. "ProxyPort": "443",
  133. "Info": "Tlsws"
  134. },
  135. {
  136. "Name": "TIM - NEXT 2",
  137. "FLAG": "tim",
  138. "Payload": "GET ws://static.r4you.co HTTP/1.1\nHost: [app_host]\nUpgrade: ws\n\n",
  139. "SNI": "static.r4you.co",
  140. "TlsIP": "104.26.5.175",
  141. "ProxyIP": "",
  142. "ProxyPort": "",
  143. "Info": "Tlsws"
  144. },
  145. {
  146. "Name": "TIM - NEXT 1",
  147. "FLAG": "tim",
  148. "Payload": "GET wss://static.r4you.co/ HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf][crlf]",
  149. "SNI": "static.r4you.co",
  150. "TlsIP": "static.r4you.co",
  151. "ProxyIP": "",
  152. "ProxyPort": "",
  153. "Info": "Tlsws"
  154. },
  155. {
  156. "Name": "🔴CLARO 21",
  157. "FLAG": "claro",
  158. "Payload": "GET wss://www.icanhazip.com/ HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: VEM_BRABO[crlf][crlf]",
  159. "SNI": "www.icanhazip.com",
  160. "TlsIP": "www.icanhazip.com",
  161. "ProxyIP": "www.icanhazip.com",
  162. "ProxyPort": "443",
  163. "Info": "Tlsws"
  164. },
  165. {
  166. "Name": "CLARO🔴 9",
  167. "FLAG": "claro🔴",
  168. "Payload": "GET wss://4.icanhazip.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  169. "SNI": "4.icanhazip.com",
  170. "TlsIP": "4.icanhazip.com",
  171. "ProxyIP": "",
  172. "ProxyPort": "443",
  173. "Info": "Tlsws"
  174. },
  175. {
  176. "Name": "🔴CLARO [VIDEOS]",
  177. "FLAG": "claro",
  178. "Payload": "GET wss://www.icanhazip.com/ HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: VEM_BRABO[crlf][crlf]",
  179. "SNI": "www.icanhazip.com",
  180. "TlsIP": "www.icanhazip.com",
  181. "ProxyIP": "www.icanhazip.com",
  182. "ProxyPort": "443",
  183. "Info": "Tlsws"
  184. },
  185. {
  186. "Name": "CLARO SSL ",
  187. "FLAG": "claro",
  188. "Payload": "GET wss://atendimento.descomplica.com.br HTTP/1.1[crlf]Host: [app_host][crlf]upgrade: websocket[crlf][crlf]",
  189. "SNI": "atendimento.descomplica.com.br",
  190. "TlsIP": "199.60.103.28",
  191. "ProxyIP": "199.60.103.28",
  192. "ProxyPort": "443",
  193. "Info": "Tlsws"
  194. },
  195. {
  196. "Name": "CLARO SSL 2",
  197. "FLAG": "tim",
  198. "Payload": "GET wss://atendimento.descomplica.com.br HTTP/1.1[lf]Host: [app_host][lf]Proxy-Connection: keep-alive[lf]User-Agent: [ua][lf]X-Forward-Host: [host][lf]Connection: HTTP2-Settings > Upgrade: h2[lf]Upgrade: HTTP/2, websocket[lf]Sec-WebSocket-Extensions: superspeed[lf][lf]",
  199. "SNI": "atendimento.descomplica.com.br",
  200. "TlsIP": "199.60.103.28",
  201. "ProxyIP": "199.60.103.28",
  202. "ProxyPort": "443",
  203. "Info": "Tlsws"
  204. },
  205. {
  206. "Name": "CLARO SSL 3 ",
  207. "FLAG": "claro",
  208. "Payload": "GET ws://content.akross.com.br HTTP/1.1\nHost: [app_host]\nUpgrade: ws\n\n",
  209. "SNI": "content.akross.com.br",
  210. "TlsIP": "content.akross.com.br",
  211. "ProxyIP": "",
  212. "ProxyPort": "",
  213. "Info": "Tlsws"
  214. },
  215. {
  216. "Name": " CLARO [4]",
  217. "FLAG": "claro",
  218. "Payload": "GET wss://communitystaging.kaltura.com/ HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf][crlf]",
  219. "SNI": "communitystaging.kaltura.com",
  220. "TlsIP": "communitystaging.kaltura.com",
  221. "ProxyIP": "",
  222. "ProxyPort": "",
  223. "Info": "Tlsws"
  224. },
  225. {
  226. "Name": "Oi ALGUMAS REGIÕES ",
  227. "FLAG": "oi",
  228. "Payload": "GET ws://www.hbogo.com.br HTTP/1.1\nHost: [app_host]\nUpgrade: ws\n\n",
  229. "SNI": "www.hbogo.com.br",
  230. "TlsIP": "104.16.55.91",
  231. "ProxyIP": "",
  232. "ProxyPort": "",
  233. "Info": "Tlsws"
  234. },
  235. {
  236. "Name": "INJECT PROXY 1",
  237. "FLAG": "vivo",
  238. "Payload": "GET wss://legado.vivo.com.br// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  239. "SNI": "legado.vivo.com.br",
  240. "TlsIP": "104.21.11.51",
  241. "ProxyIP": "",
  242. "ProxyPort": "443",
  243. "Info": "Tlsws"
  244. },
  245. {
  246. "Name": "INJECT PROXY 2",
  247. "FLAG": "vivo",
  248. "Payload": "GET / HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf][crlf]",
  249. "SNI": "",
  250. "TlsIP": "",
  251. "ProxyIP": "104.21.11.51",
  252. "ProxyPort": "80",
  253. "Info": "Proxy"
  254. },
  255. {
  256. "Name": "INJECT PROXY 3",
  257. "FLAG": "vivo",
  258. "Payload": "GET wss://equipamentos01.vivo.com.br/ HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  259. "SNI": "equipamentos01.vivo.com.br",
  260. "TlsIP": "172.67.165.43",
  261. "ProxyIP": "",
  262. "ProxyPort": "443",
  263. "Info": "Tlsws"
  264. },
  265. {
  266. "Name": "INJECT TLS 4",
  267. "FLAG": "vivo",
  268. "Payload": "GET wss://www.vivorio.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  269. "SNI": "www.vivorio.com.br",
  270. "TlsIP": "172.67.165.43",
  271. "ProxyIP": "",
  272. "ProxyPort": "443",
  273. "Info": "Tlsws"
  274. },
  275. {
  276. "Name": "INJECT TLS 5",
  277. "FLAG": "vivo",
  278. "Payload": "GET wss://backoffice-equipamentos01.vivo.com.br// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  279. "SNI": "backoffice-equipamentos01.vivo.com.br",
  280. "TlsIP": "172.67.165.43",
  281. "ProxyIP": "",
  282. "ProxyPort": "443",
  283. "Info": "Tlsws"
  284. },
  285. {
  286. "Name": "INJECT TLS 6",
  287. "FLAG": "vivo",
  288. "Payload": "GET / HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf][crlf]",
  289. "SNI": "",
  290. "TlsIP": "",
  291. "ProxyIP": "104.16.122.175",
  292. "ProxyPort": "80",
  293. "Info": "Proxy"
  294. },
  295. {
  296. "Name": "INJECT TLS 7",
  297. "FLAG": "vivo",
  298. "Payload": "GET wss://portaljud.vivo.com.br// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  299. "SNI": "portaljud.vivo.com.br",
  300. "TlsIP": "104.21.11.51",
  301. "ProxyIP": "",
  302. "ProxyPort": "443",
  303. "Info": "Tlsws"
  304. },
  305. {
  306. "Name": "INJECT TLS 8",
  307. "FLAG": "vivo",
  308. "Payload": "GET wss://support.deezer.com// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  309. "SNI": "support.deezer.com",
  310. "TlsIP": "104.21.11.51",
  311. "ProxyIP": "",
  312. "ProxyPort": "443",
  313. "Info": "Tlsws"
  314. },
  315. {
  316. "Name": "INJECT TLS 9",
  317. "FLAG": "vivo",
  318. "Payload": "GET wss://support.deezer.com// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  319. "SNI": "support.deezer.com",
  320. "TlsIP": "172.67.165.43",
  321. "ProxyIP": "",
  322. "ProxyPort": "443",
  323. "Info": "Tlsws"
  324. },
  325. {
  326. "Name": "INJECT TLS 10",
  327. "FLAG": "vivo",
  328. "Payload": "GET wss://vpoweb.vivo.com.br// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  329. "SNI": "vpoweb.vivo.com.br",
  330. "TlsIP": "104.16.57.6",
  331. "ProxyIP": "",
  332. "ProxyPort": "443",
  333. "Info": "Tlsws"
  334. },
  335. {
  336. "Name": "INJECT TLS 11",
  337. "FLAG": "claro",
  338. "Payload": "GET sni://4.icanhazip.com HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Upgrade[crlf][crlf]",
  339. "SNI": "4.icanhazip.com",
  340. "TlsIP": "4.icanhazip.com",
  341. "ProxyIP": "",
  342. "ProxyPort": "443",
  343. "Info": "Tlsws"
  344. },
  345. {
  346. "Name": "INJECT TLS 12",
  347. "FLAG": "claro",
  348. "Payload": "GET wss://ipv4.icanhazip.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  349. "SNI": "ipv4.icanhazip.com",
  350. "TlsIP": "ipv4.icanhazip.com",
  351. "ProxyIP": "",
  352. "ProxyPort": "443",
  353. "Info": "Tlsws"
  354. },
  355. {
  356. "Name": "INJECT TLS 13",
  357. "FLAG": "claro",
  358. "Payload": "GET wss://platzi.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  359. "SNI": "platiz.com",
  360. "TlsIP": "104.17.175.85",
  361. "ProxyIP": "",
  362. "ProxyPort": "443",
  363. "Info": "Tlsws"
  364. },
  365. {
  366. "Name": "INJECT TLS 14",
  367. "FLAG": "claro",
  368. "Payload": "GET wss://go.kaltura.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  369. "SNI": "go.kaltura.com",
  370. "TlsIP": "go.kaltura.com",
  371. "ProxyIP": "",
  372. "ProxyPort": "443",
  373. "Info": "Tlsws"
  374. },
  375. {
  376. "Name": "INJECT TLS 15",
  377. "FLAG": "claro",
  378. "Payload": "GET wss://content.akross.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  379. "SNI": "content.akross.com.br",
  380. "TlsIP": "content.akross.com.br",
  381. "ProxyIP": "",
  382. "ProxyPort": "443",
  383. "Info": "Tlsws"
  384. },
  385. {
  386. "Name": "INJECT PROXY 16",
  387. "FLAG": "tim",
  388. "Payload": "GET wss://texugo.alura.com.br/ HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf][crlf]",
  389. "SNI": "texugo.alura.com.br",
  390. "TlsIP": "104.21.84.78",
  391. "ProxyIP": "",
  392. "ProxyPort": "443",
  393. "Info": "Tlsws"
  394. },
  395. {
  396. "Name": "INJECT TLS 17",
  397. "FLAG": "tim",
  398. "Payload": "GET ws://blog.alura.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  399. "SNI": "blog.alura.com.br",
  400. "TlsIP": "104.26.5.175",
  401. "ProxyIP": "",
  402. "ProxyPort": "443",
  403. "Info": "Tlsws"
  404. },
  405. {
  406. "Name": "INJECT TLS 18",
  407. "FLAG": "tim",
  408. "Payload": "GET ws://blog.alura.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  409. "SNI": "static.r4you.co",
  410. "TlsIP": "104.21.84.78",
  411. "ProxyIP": "",
  412. "ProxyPort": "443",
  413. "Info": "Tlsws"
  414. },
  415. {
  416. "Name": "INJECT TLS 19",
  417. "FLAG": "tim",
  418. "Payload": "GET ws://empresas.alura.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  419. "SNI": empresas.alura.com.br",
  420. "TlsIP": "104.18.40.41",
  421. "ProxyIP": "",
  422. "ProxyPort": "443",
  423. "Info": "Tlsws"
  424. },
  425. {
  426. "Name": "INJECT TLS 20",
  427. "FLAG": "tim",
  428. "Payload": "GET sni://cdnjs.cloudflare.com [protocol][crlf]Host: [app_host][crlf]X-Forwarded-For: [app_host][crlf]Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  429. "SNI": "cdnjs.cloudflare.com",
  430. "TlsIP": "104.16.19.94",
  431. "ProxyIP": "",
  432. "ProxyPort": "443",
  433. "Info": "Tlsws"
  434. },
  435. {
  436. "Name": "INJECT TLS 21",
  437. "FLAG": "tim",
  438. "Payload": "GET wss://cdnjs.cloudflare.com HTTP/1.1[crlf]Host: [app_host][crlf]Connection: Keep-alive[crlf]Upgrade: ws[crlf][crlf]",
  439. "SNI": "cdnjs.cloudflare.com",
  440. "TlsIP": "cdnjs.cloudflare.com",
  441. "ProxyIP": "",
  442. "ProxyPort": "443",
  443. "Info": "Tlsws"
  444. },
  445. {
  446. "Name": "INJECT TLS 22",
  447. "FLAG": "tim",
  448. "Payload": "GET wss://m.timbancavirtual.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  449. "SNI": "m.timbancavirtual.com.br",
  450. "TlsIP": "m.timbancavirtual.com.br",
  451. "ProxyIP": "",
  452. "ProxyPort": "443",
  453. "Info": "Tlsws"
  454. },
  455. {
  456. "Name": "INJECT TLS 23",
  457. "FLAG": "tim",
  458. "Payload": "GET ws://consultatim.com.br HTTP/1.1\nHost: [app_host_proxy]\nUpgrade: ws\n\n",
  459. "SNI": "consultatim.com.br",
  460. "TlsIP": "consultatim.com.br",
  461. "ProxyIP": "",
  462. "ProxyPort": "443",
  463. "Info": "Tlsws"
  464. },
  465. {
  466. "Name": "INJECT TLS 24",
  467. "FLAG": "tim",
  468. "Payload": "GET wss://accesswdun.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  469. "SNI": "accesswdun.com",
  470. "TlsIP": "3cyber.com",
  471. "ProxyIP": "",
  472. "ProxyPort": "443",
  473. "Info": "Tlsws"
  474. },
  475. {
  476. "Name": "INJECT PROXY 25",
  477. "FLAG": "oi",
  478. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  479. "SNI": "oii.gdmhost.ga",
  480. "TlsIP": "www.hbogo.com.br",
  481. "ProxyIP": "www.hbogo.com.br",
  482. "ProxyPort": "80",
  483. "Info": "proxy"
  484. },
  485. {
  486. "Name": "INJECT TLS 26",
  487. "FLAG": "oi",
  488. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  489. "SNI": "www.hbogo.com.br",
  490. "TlsIP": "www.hbogo.com.br",
  491. "ProxyIP": "www.hbogo.com.br",
  492. "ProxyPort": "443",
  493. "Info": "Tlsws"
  494. },
  495. {
  496. "Name": "INJECT TLS 27",
  497. "FLAG": "oi",
  498. "Payload": "GET ws://www.hbogo.com.br HTTP/1.1\nHost: [app_host]\nUpgrade: ws[crlf]Sec-Websocket-Extensions: superspeed\n\n",
  499. "SNI": "www.hbogo.com.br",
  500. "TlsIP": "www.hbogo.com.br",
  501. "ProxyIP": "",
  502. "ProxyPort": "443",
  503. "Info": "Tlsws"
  504. },
  505. {
  506. "Name": "INJECT TLS 28",
  507. "FLAG": "oi",
  508. "Payload": "GET / HTTP/1.1[crlf]Host: [host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  509. "SNI": "[app_host]",
  510. "TlsIP": "104.16.51.91",
  511. "ProxyIP": "",
  512. "ProxyPort": "443",
  513. "Info": "Tlsws"
  514. },
  515. {
  516. "Name": "OI Algumas Regiões 2 ",
  517. "FLAG": "oi",
  518. "Payload": "GET ws://mobilidade.cloud.caixa.gov.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: ws[crlf][crlf]",
  519. "SNI": "mobilidade.cloud.caixa.gov.br",
  520. "TlsIP": "104.16.56.6",
  521. "ProxyIP": "104.16.56.6",
  522. "ProxyPort": "443",
  523. "Info": "Tlsws"
  524. }
  525. ]
  526. }}

comments powered by Disqus