config


SUBMITTED BY: jms10

DATE: May 9, 2022, 2:20 a.m.

UPDATED: Oct. 27, 2023, 3:20 p.m.

FORMAT: Text only

SIZE: 13.1 kB

HITS: 4004

  1. {
  2. "Version": "1.2.11",
  3. "ReleaseNotes": "SERVIDOR VIVO ADICIONADO",
  4. "UrlUpdate": "https://bitbin.it/tcq9wDi2/raw/",
  5. "Sms": "https://bitbin.it/EdYiF70H/raw/",
  6. "EmailFeedback": "#",
  7. "UrlContato": "#",
  8. "UrlTermos": "#",
  9. "CheckUser": "true",
  10. "Udp": [
  11. {
  12. "Porta": "7300"
  13. }
  14. ],
  15. {
  16. "Version": "6.2.11",
  17. "ReleaseNotes": "SERVIDOR VIVO ADICIONADO",
  18. "UrlUpdate": "https://bitbin.it/tcq9wDi2/raw/",
  19. "Sms": "https://bitbin.it/EdYiF70H/raw/",
  20. "EmailFeedback": "#",
  21. "UrlContato": "#",
  22. "UrlTermos": "#",
  23. "CheckUser": "true",
  24. "Udp": [
  25. {
  26. "Porta": "7300"
  27. }
  28. ],
  29. "Servers": [
  30. {
  31. "Name": "SERVIDOR 1",
  32. "TYPE": "premium",
  33. "FLAG": "br.png",
  34. "ServerIP": "br.jmsconnect.xyz",
  35. "CheckUser": "",
  36. "ServerPort": "22",
  37. "SSLPort": "443",
  38. "USER": "",
  39. "PASS": ""
  40. },
  41. {
  42. "Name": "SERVIDOR 2",
  43. "TYPE": "premium",
  44. "FLAG": "br.png",
  45. "ServerIP": "br2.jmsconnect.xyz",
  46. "CheckUser": "http://jmsconnect.xyz:5454/checkUser",
  47. "ServerPort": "22",
  48. "SSLPort": "443",
  49. "USER": "",
  50. "PASS": ""
  51. },
  52. {
  53. "Name": "SERVIDOR 3",
  54. "TYPE": "premium",
  55. "FLAG": "br.png",
  56. "ServerIP": "br3.jmsconnect.xyz",
  57. "CheckUser": "http://jmsconnect.xyz.xyz:5454/checkUser",
  58. "ServerPort": "22",
  59. "SSLPort": "443",
  60. "USER": "",
  61. "PASS": ""
  62. },
  63. {
  64. "Name": "SERVIDOR 4",
  65. "TYPE": "premium",
  66. "FLAG": "br.png",
  67. "ServerIP": "br4.jmsconnect.xyz",
  68. "CheckUser": "http://jmsconnect.xyz:5454/checkUser",
  69. "ServerPort": "22",
  70. "SSLPort": "443",
  71. "USER": "",
  72. "PASS": ""
  73. },
  74. {
  75. "Name": "SERVIDOR 5",
  76. "TYPE": "premium",
  77. "FLAG": "br.png",
  78. "ServerIP": "br5.jmsconnect.xyz",
  79. "CheckUser": "http://http://br5.jmsconnect.xyz:5454/checkUse:5454/checkUser",
  80. "ServerPort": "22",
  81. "SSLPort": "443",
  82. "USER": "",
  83. "PASS": ""
  84. },
  85. {
  86. "Name": "SERVIDOR 6",
  87. "TYPE": "premium",
  88. "FLAG": "br.png",
  89. "ServerIP": "br6.jmsconnect.xyz",
  90. "CheckUser": "http://jmsconnect.xyz:5454/checkUser",
  91. "ServerPort": "22",
  92. "SSLPort": "443",
  93. "USER": "",
  94. "PASS": ""
  95. },
  96. ],
  97. "Networks": [
  98. {
  99. "Version": "1.3.5",
  100. "ReleaseNotes": "Configurações vivo atualizadas (em testes)",
  101. "UrlUpdate": "https://bitbin.it/0sROAzUz/raw/",
  102. "Sms": "https://bitbin.it/oKgMpLx1/raw/",
  103. "EmailFeedback": "cloudzinmaker@gmail.com",
  104. "UrlContato": "https://t.me/satancloud",
  105. "UrlTermos": "https://linkmenu.cc/cloudrocket",
  106. "CheckUser": "true",
  107. "Udp": [
  108. {
  109. "Porta": "7300"
  110. }
  111. ],
  112. "Servers": [
  113. {
  114. "Name": "AUTOMATICO",
  115. "TYPE": "premium",
  116. "FLAG": "id.png",
  117. "ServerIP": "barbie.hinatanetclientes.online",
  118. "CheckUser": "http://191.233.242.166:8181/checkUser",
  119. "ServerPort": "22",
  120. "SSLPort": "443",
  121. "USER": "",
  122. "PASS": ""
  123. },
  124. {
  125. "Name": "BR-SV1 | FREE",
  126. "TYPE": "premium",
  127. "FLAG": "br.png",
  128. "ServerIP": "br1.secondvpn.tk",
  129. "CheckUser": "http://br1.secondvpn.tk:5454/checkUser",
  130. "ServerPort": "22",
  131. "SSLPort": "443",
  132. "USER": "",
  133. "PASS": ""
  134. },
  135. {
  136. "Name": "BR-SV2 | FREE",
  137. "TYPE": "premium",
  138. "FLAG": "br.png",
  139. "ServerIP": "cloudzinssh.tk",
  140. "CheckUser": "http://20.201.116.160:8888/server/online",
  141. "ServerPort": "22",
  142. "SSLPort": "443",
  143. "USER": "",
  144. "PASS": ""
  145. },
  146. {
  147. "Name": "BR-SV3 | FREE",
  148. "TYPE": "premium",
  149. "FLAG": "br.png",
  150. "ServerIP": "cloudspacehost.tk",
  151. "CheckUser": "http://40.69.163.63:5454/checkUser",
  152. "ServerPort": "22",
  153. "SSLPort": "443",
  154. "USER": "",
  155. "PASS": ""
  156. },
  157. {
  158. "Name": "CA-SV4 | FREE",
  159. "TYPE": "free",
  160. "FLAG": "ca.png",
  161. "ServerIP": "cas-2.opensvr.net",
  162. "CheckUser": "http://cas-2.opensvr.net:5454/checkUser",
  163. "ServerPort": "22",
  164. "SSLPort": "443",
  165. "USER": "",
  166. "PASS": ""
  167. },
  168. {
  169. "Name": "US-SV5 | FREE",
  170. "TYPE": "free",
  171. "FLAG": "us.png",
  172. "ServerIP": "uss-3.opensvr.net",
  173. "CheckUser": "http://uss-3.opensvr.net:5454/checkUser",
  174. "ServerPort": "22",
  175. "SSLPort": "443",
  176. "USER": "",
  177. "PASS": ""
  178. },
  179. ],
  180. "Networks": [
  181. {
  182. "Name": "INJECT PROXY 1",
  183. "FLAG": "vivo",
  184. "Payload": "GET wss://unpkg.com// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  185. "SNI": "unpkg.com",
  186. "TlsIP": "unpkg.com",
  187. "ProxyIP": "",
  188. "ProxyPort": "443",
  189. "Info": "Tlsws"
  190. },
  191. {
  192. "Name": "INJECT PROXY 2",
  193. "FLAG": "vivo",
  194. "Payload": "GET wss://carrinho-pos-familia.vivo.com.br [protocol][crlf]Host: [app_host][crlf]X-Forwarded-For: [app_host][crlf]Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf][crlf]",
  195. "SNI": "carrinho-pos-familia.vivo.com.br",
  196. "TlsIP": "172.67.165.43",
  197. "ProxyIP": "",
  198. "ProxyPort": "443",
  199. "Info": "Tlsws"
  200. },
  201. {
  202. "Name": "INJECT PROXY 3",
  203. "FLAG": "vivo",
  204. "Payload": "GET wss://carrinho-pos-familia.vivo.com.br// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  205. "SNI": "carrinho-pos-familia.vivo.com.br",
  206. "TlsIP": "172.67.165.43",
  207. "ProxyIP": "",
  208. "ProxyPort": "443",
  209. "Info": "Tlsws"
  210. },
  211. {
  212. "Name": "INJECT TLS 4",
  213. "FLAG": "vivo",
  214. "Payload": "GET wss://carrinho-pos-familia.vivo.com.br// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  215. "SNI": "carrinho-pos-familia.vivo.com.br",
  216. "TlsIP": "172.67.165.43",
  217. "ProxyIP": "",
  218. "ProxyPort": "443",
  219. "Info": "Tlsws"
  220. },
  221. {
  222. "Name": "INJECT TLS 5",
  223. "FLAG": "vivo",
  224. "Payload": "GET wss://cdnjs.cloudflare.com [protocol][crlf]Host: [app_host][crlf] Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  225. "SNI": "cdnjs.cloudflare.com",
  226. "TlsIP": "172.67.165.43",
  227. "ProxyIP": "",
  228. "ProxyPort": "443",
  229. "Info": "Tlsws"
  230. },
  231. {
  232. "Name": "INJECT TLS 6",
  233. "FLAG": "vivo",
  234. "Payload": "GET wss://live.vivo.com.br/ HTTP/1.1[crlf]Host: [app_host][crlf]Connection: keep-alive[crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  235. "SNI": "live.vivo.com.br",
  236. "TlsIP": "172.67.165.43",
  237. "ProxyIP": "",
  238. "ProxyPort": "443",
  239. "Info": "Tlsws"
  240. },
  241. {
  242. "Name": "INJECT TLS 7",
  243. "FLAG": "claro",
  244. "Payload": "GET sni://go.kaltura.com HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Upgrade[crlf][crlf]",
  245. "SNI": "go.kaltura.com",
  246. "TlsIP": "go.kaltura.com",
  247. "ProxyIP": "",
  248. "ProxyPort": "443",
  249. "Info": "Tlsws"
  250. },
  251. {
  252. "Name": "INJECT TLS 8",
  253. "FLAG": "claro",
  254. "Payload": "GET wss://connect.kaltura.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  255. "SNI": "connect.kaltura.com",
  256. "TlsIP": "connect.kaltura.com",
  257. "ProxyIP": "",
  258. "ProxyPort": "443",
  259. "Info": "Tlsws"
  260. },
  261. {
  262. "Name": "INJECT TLS 9",
  263. "FLAG": "claro",
  264. "Payload": "GET wss://go.kaltura.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  265. "SNI": "go.kaltura.com",
  266. "TlsIP": "go.kaltura.com",
  267. "ProxyIP": "",
  268. "ProxyPort": "443",
  269. "Info": "Tlsws"
  270. },
  271. {
  272. "Name": "INJECT TLS 10",
  273. "FLAG": "claro",
  274. "Payload": "GET wss://go.kaltura.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  275. "SNI": "go.kaltura.com",
  276. "TlsIP": "go.kaltura.com",
  277. "ProxyIP": "",
  278. "ProxyPort": "443",
  279. "Info": "Tlsws"
  280. },
  281. {
  282. "Name": "INJECT TLS 11",
  283. "FLAG": "claro",
  284. "Payload": "GET wss://content.akross.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  285. "SNI": "content.akross.com.br",
  286. "TlsIP": "content.akross.com.br",
  287. "ProxyIP": "",
  288. "ProxyPort": "443",
  289. "Info": "Tlsws"
  290. },
  291. {
  292. "Name": "INJECT PROXY 12",
  293. "FLAG": "tim",
  294. "Payload": "GET wss://beringtime.com/ HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf][crlf]",
  295. "SNI": "beringtime.com",
  296. "TlsIP": "beringtime.com",
  297. "ProxyIP": "",
  298. "ProxyPort": "443",
  299. "Info": "Tlsws"
  300. },
  301. {
  302. "Name": "INJECT TLS 13",
  303. "FLAG": "tim",
  304. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  305. "SNI": "static.r4you.co",
  306. "TlsIP": "104.26.5.175",
  307. "ProxyIP": "",
  308. "ProxyPort": "443",
  309. "Info": "Tlsws"
  310. },
  311. {
  312. "Name": "INJECT TLS 14",
  313. "FLAG": "tim",
  314. "Payload": "GET ws://static.r4you.co HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  315. "SNI": "static.r4you.co",
  316. "TlsIP": "104.26.5.175",
  317. "ProxyIP": "",
  318. "ProxyPort": "443",
  319. "Info": "Tlsws"
  320. },
  321. {
  322. "Name": "INJECT TLS 15",
  323. "FLAG": "tim",
  324. "Payload": "GET / HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  325. "SNI": "[app_host]",
  326. "TlsIP": "104.16.18.94",
  327. "ProxyIP": "",
  328. "ProxyPort": "443",
  329. "Info": "Tlsws"
  330. },
  331. {
  332. "Name": "INJECT TLS 16",
  333. "FLAG": "tim",
  334. "Payload": "GET sni://cdnjs.cloudflare.com [protocol][crlf]Host: [app_host][crlf]X-Forwarded-For: [app_host][crlf]Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  335. "SNI": "cdnjs.cloudflare.com",
  336. "TlsIP": "104.16.19.94",
  337. "ProxyIP": "",
  338. "ProxyPort": "443",
  339. "Info": "Tlsws"
  340. },
  341. {
  342. "Name": "INJECT TLS 17",
  343. "FLAG": "tim",
  344. "Payload": "GET wss://cdnjs.cloudflare.com HTTP/1.1[crlf]Host: [app_host][crlf]Connection: Keep-alive[crlf]Upgrade: ws[crlf][crlf]",
  345. "SNI": "cdnjs.cloudflare.com",
  346. "TlsIP": "cdnjs.cloudflare.com",
  347. "ProxyIP": "",
  348. "ProxyPort": "443",
  349. "Info": "Tlsws"
  350. },
  351. {
  352. "Name": "INJECT TLS 18",
  353. "FLAG": "tim",
  354. "Payload": "GET wss://m.timbancavirtual.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  355. "SNI": "m.timbancavirtual.com.br",
  356. "TlsIP": "m.timbancavirtual.com.br",
  357. "ProxyIP": "",
  358. "ProxyPort": "443",
  359. "Info": "Tlsws"
  360. },
  361. {
  362. "Name": "INJECT TLS 19",
  363. "FLAG": "tim",
  364. "Payload": "GET ws://consultatim.com.br HTTP/1.1\nHost: [app_host_proxy]\nUpgrade: ws\n\n",
  365. "SNI": "consultatim.com.br",
  366. "TlsIP": "consultatim.com.br",
  367. "ProxyIP": "",
  368. "ProxyPort": "443",
  369. "Info": "Tlsws"
  370. },
  371. {
  372. "Name": "INJECT TLS 20",
  373. "FLAG": "tim",
  374. "Payload": "GET wss://accesswdun.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  375. "SNI": "accesswdun.com",
  376. "TlsIP": "3cyber.com",
  377. "ProxyIP": "",
  378. "ProxyPort": "443",
  379. "Info": "Tlsws"
  380. },
  381. {
  382. "Name": "INJECT PROXY 21",
  383. "FLAG": "oi",
  384. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  385. "SNI": "oii.gdmhost.ga",
  386. "TlsIP": "www.hbogo.com.br",
  387. "ProxyIP": "www.hbogo.com.br",
  388. "ProxyPort": "80",
  389. "Info": "proxy"
  390. },
  391. {
  392. "Name": "INJECT TLS 22",
  393. "FLAG": "oi",
  394. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  395. "SNI": "www.hbogo.com.br",
  396. "TlsIP": "www.hbogo.com.br",
  397. "ProxyIP": "www.hbogo.com.br",
  398. "ProxyPort": "443",
  399. "Info": "Tlsws"
  400. },
  401. {
  402. "Name": "INJECT TLS 23",
  403. "FLAG": "oi",
  404. "Payload": "GET ws://www.hbogo.com.br HTTP/1.1\nHost: [app_host]\nUpgrade: ws[crlf]Sec-Websocket-Extensions: superspeed\n\n",
  405. "SNI": "www.hbogo.com.br",
  406. "TlsIP": "www.hbogo.com.br",
  407. "ProxyIP": "",
  408. "ProxyPort": "443",
  409. "Info": "Tlsws"
  410. },
  411. {
  412. "Name": "INJECT TLS 24",
  413. "FLAG": "oi",
  414. "Payload": "GET / HTTP/1.1[crlf]Host: [host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  415. "SNI": "[app_host]",
  416. "TlsIP": "104.16.51.91",
  417. "ProxyIP": "",
  418. "ProxyPort": "443",
  419. "Info": "Tlsws"
  420. }
  421. ]
  422. }

comments powered by Disqus