PAY MNK 4g


SUBMITTED BY: Fabioassis

DATE: July 7, 2022, 11:48 p.m.

UPDATED: March 9, 2023, 4:01 p.m.

FORMAT: Text only

SIZE: 9.3 kB

HITS: 6439

  1. {
  2. "Version": "1.2.4",
  3. "ReleaseNotes": "Nova Atualização Disponível",
  4. "UrlUpdate": "https://bitbin.it/s4xeaUip/raw/",
  5. "Sms": "https://bitbin.it/AQnugEkU/raw/",
  6. "EmailFeedback": "fabioriohockey@gmail.com",
  7. "UrlContato": "",
  8. "UrlTermos": "",
  9. "CheckUser": "true",
  10. "UdpPort": "7300;7500;7295;7296;7200;7297;7298;7299;7400",
  11. "Servers": [
  12. {
  13. "Name": "MONKEY CONNECT",
  14. "TYPE": "premium",
  15. "FLAG": "br.png",
  16. "ServerIP": "monkey.netdoscria.online",
  17. "CheckUser": "http://152.67.43.16:5454/checkUser",
  18. "ServerPort": "22",
  19. "SSLPort": "443",
  20. "USER": "",
  21. "PASS": ""
  22. }
  23. ],
  24. "Networks": [
  25. {
  26. "Name": "INJECT PROXY 1",
  27. "FLAG": "vivo",
  28. "Payload": "GET wss://support.deezer.com// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  29. "SNI": "support.deezer.com",
  30. "TlsIP": "172.67.165.43",
  31. "ProxyIP": "",
  32. "ProxyPort": "443",
  33. "Info": "Tlsws"
  34. },
  35. {
  36. "Name": "INJECT PROXY 2",
  37. "FLAG": "vivo",
  38. "Payload": "GET wss://carrinho-pos-familia.vivo.com.br [protocol][crlf]Host: [app_host][crlf]X-Forwarded-For: [app_host][crlf]Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf][crlf]",
  39. "SNI": "carrinho-pos-familia.vivo.com.br",
  40. "TlsIP": "172.67.165.43",
  41. "ProxyIP": "",
  42. "ProxyPort": "443",
  43. "Info": "Tlsws"
  44. },
  45. {
  46. "Name": "INJECT PROXY 3",
  47. "FLAG": "vivo",
  48. "Payload": "GET wss://carrinho-pos-familia.vivo.com.br// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  49. "SNI": "carrinho-pos-familia.vivo.com.br",
  50. "TlsIP": "172.67.165.43",
  51. "ProxyIP": "",
  52. "ProxyPort": "443",
  53. "Info": "Tlsws"
  54. },
  55. {
  56. "Name": "INJECT TLS 4",
  57. "FLAG": "vivo",
  58. "Payload": "GET wss://carrinho-pos-familia.vivo.com.br// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  59. "SNI": "carrinho-pos-familia.vivo.com.br",
  60. "TlsIP": "172.67.165.43",
  61. "ProxyIP": "",
  62. "ProxyPort": "443",
  63. "Info": "Tlsws"
  64. },
  65. {
  66. "Name": "INJECT TLS 5",
  67. "FLAG": "vivo",
  68. "Payload": "GET wss://cdnjs.cloudflare.com [protocol][crlf]Host: [app_host][crlf] Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  69. "SNI": "cdnjs.cloudflare.com",
  70. "TlsIP": "172.67.165.43",
  71. "ProxyIP": "",
  72. "ProxyPort": "443",
  73. "Info": "Tlsws"
  74. },
  75. {
  76. "Name": "INJECT TLS 6",
  77. "FLAG": "vivo",
  78. "Payload": "GET wss://beneficios.vivo.com.br/ HTTP/1.1[crlf]Host: [app_host][crlf]Connection: keep-alive[crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  79. "SNI": "beneficios.vivo.com.br",
  80. "TlsIP": "172.67.165.43",
  81. "ProxyIP": "",
  82. "ProxyPort": "443",
  83. "Info": "Tlsws"
  84. },
  85. {
  86. "Name": "INJECT TLS 7",
  87. "FLAG": "claro",
  88. "Payload": "GET sni://go.kaltura.com HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Upgrade[crlf][crlf]",
  89. "SNI": "go.kaltura.com",
  90. "TlsIP": "go.kaltura.com",
  91. "ProxyIP": "",
  92. "ProxyPort": "443",
  93. "Info": "Tlsws"
  94. },
  95. {
  96. "Name": "INJECT TLS 8",
  97. "FLAG": "claro",
  98. "Payload": "GET wss://connect.kaltura.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  99. "SNI": "connect.kaltura.com",
  100. "TlsIP": "connect.kaltura.com",
  101. "ProxyIP": "",
  102. "ProxyPort": "443",
  103. "Info": "Tlsws"
  104. },
  105. {
  106. "Name": "INJECT TLS 9",
  107. "FLAG": "claro",
  108. "Payload": "GET wss://go.kaltura.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  109. "SNI": "go.kaltura.com",
  110. "TlsIP": "go.kaltura.com",
  111. "ProxyIP": "",
  112. "ProxyPort": "443",
  113. "Info": "Tlsws"
  114. },
  115. {
  116. "Name": "INJECT TLS 10",
  117. "FLAG": "claro",
  118. "Payload": "GET wss://go.kaltura.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  119. "SNI": "go.kaltura.com",
  120. "TlsIP": "go.kaltura.com",
  121. "ProxyIP": "",
  122. "ProxyPort": "443",
  123. "Info": "Tlsws"
  124. },
  125. {
  126. "Name": "INJECT TLS 11",
  127. "FLAG": "claro",
  128. "Payload": "GET wss://content.akross.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  129. "SNI": "content.akross.com.br",
  130. "TlsIP": "content.akross.com.br",
  131. "ProxyIP": "",
  132. "ProxyPort": "443",
  133. "Info": "Tlsws"
  134. },
  135. {
  136. "Name": "INJECT PROXY 12",
  137. "FLAG": "tim",
  138. "Payload": "GET wss://beringtime.com/ HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf][crlf]",
  139. "SNI": "beringtime.com",
  140. "TlsIP": "beringtime.com",
  141. "ProxyIP": "",
  142. "ProxyPort": "443",
  143. "Info": "Tlsws"
  144. },
  145. {
  146. "Name": "INJECT TLS 13",
  147. "FLAG": "tim",
  148. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  149. "SNI": "static.r4you.co",
  150. "TlsIP": "104.26.5.175",
  151. "ProxyIP": "",
  152. "ProxyPort": "443",
  153. "Info": "Tlsws"
  154. },
  155. {
  156. "Name": "INJECT TLS 14",
  157. "FLAG": "tim",
  158. "Payload": "GET ws://static.r4you.co HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  159. "SNI": "static.r4you.co",
  160. "TlsIP": "104.26.5.175",
  161. "ProxyIP": "",
  162. "ProxyPort": "443",
  163. "Info": "Tlsws"
  164. },
  165. {
  166. "Name": "INJECT TLS 15",
  167. "FLAG": "tim",
  168. "Payload": "GET / HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  169. "SNI": "[app_host]",
  170. "TlsIP": "104.16.18.94",
  171. "ProxyIP": "",
  172. "ProxyPort": "443",
  173. "Info": "Tlsws"
  174. },
  175. {
  176. "Name": "INJECT TLS 16",
  177. "FLAG": "tim",
  178. "Payload": "GET sni://cdnjs.cloudflare.com [protocol][crlf]Host: [app_host][crlf]X-Forwarded-For: [app_host][crlf]Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  179. "SNI": "cdnjs.cloudflare.com",
  180. "TlsIP": "104.16.19.94",
  181. "ProxyIP": "",
  182. "ProxyPort": "443",
  183. "Info": "Tlsws"
  184. },
  185. {
  186. "Name": "INJECT TLS 17",
  187. "FLAG": "tim",
  188. "Payload": "GET wss://cdnjs.cloudflare.com HTTP/1.1[crlf]Host: [app_host][crlf]Connection: Keep-alive[crlf]Upgrade: ws[crlf][crlf]",
  189. "SNI": "cdnjs.cloudflare.com",
  190. "TlsIP": "cdnjs.cloudflare.com",
  191. "ProxyIP": "",
  192. "ProxyPort": "443",
  193. "Info": "Tlsws"
  194. },
  195. {
  196. "Name": "INJECT TLS 18",
  197. "FLAG": "tim",
  198. "Payload": "GET wss://m.timbancavirtual.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  199. "SNI": "m.timbancavirtual.com.br",
  200. "TlsIP": "m.timbancavirtual.com.br",
  201. "ProxyIP": "",
  202. "ProxyPort": "443",
  203. "Info": "Tlsws"
  204. },
  205. {
  206. "Name": "INJECT TLS 19",
  207. "FLAG": "tim",
  208. "Payload": "GET ws://consultatim.com.br HTTP/1.1\nHost: [app_host_proxy]\nUpgrade: ws\n\n",
  209. "SNI": "consultatim.com.br",
  210. "TlsIP": "consultatim.com.br",
  211. "ProxyIP": "",
  212. "ProxyPort": "443",
  213. "Info": "Tlsws"
  214. },
  215. {
  216. "Name": "INJECT TLS 20",
  217. "FLAG": "tim",
  218. "Payload": "GET wss://accesswdun.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  219. "SNI": "accesswdun.com",
  220. "TlsIP": "3cyber.com",
  221. "ProxyIP": "",
  222. "ProxyPort": "443",
  223. "Info": "Tlsws"
  224. },
  225. {
  226. "Name": "INJECT PROXY 21",
  227. "FLAG": "oi",
  228. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  229. "SNI": "oii.gdmhost.ga",
  230. "TlsIP": "www.hbogo.com.br",
  231. "ProxyIP": "www.hbogo.com.br",
  232. "ProxyPort": "80",
  233. "Info": "proxy"
  234. },
  235. {
  236. "Name": "INJECT TLS 22",
  237. "FLAG": "oi",
  238. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  239. "SNI": "www.hbogo.com.br",
  240. "TlsIP": "www.hbogo.com.br",
  241. "ProxyIP": "www.hbogo.com.br",
  242. "ProxyPort": "443",
  243. "Info": "Tlsws"
  244. },
  245. {
  246. "Name": "INJECT TLS 23",
  247. "FLAG": "oi",
  248. "Payload": "GET ws://www.hbogo.com.br HTTP/1.1\nHost: [app_host]\nUpgrade: ws[crlf]Sec-Websocket-Extensions: superspeed\n\n",
  249. "SNI": "www.hbogo.com.br",
  250. "TlsIP": "www.hbogo.com.br",
  251. "ProxyIP": "",
  252. "ProxyPort": "443",
  253. "Info": "Tlsws"
  254. },
  255. {
  256. "Name": "INJECT TLS 24",
  257. "FLAG": "oi",
  258. "Payload": "GET / HTTP/1.1[crlf]Host: [host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  259. "SNI": "[app_host]",
  260. "TlsIP": "104.16.51.91",
  261. "ProxyIP": "",
  262. "ProxyPort": "443",
  263. "Info": "Tlsws"
  264. }
  265. ]
  266. }

comments powered by Disqus