config


SUBMITTED BY: jms10

DATE: May 9, 2022, 2:20 a.m.

UPDATED: Oct. 27, 2023, 3:20 p.m.

FORMAT: Text only

SIZE: 12.8 kB

HITS: 4004

  1. {
  2. "Version": "1.2.11",
  3. "ReleaseNotes": "SERVIDOR VIVO ADICIONADO",
  4. "UrlUpdate": "https://bitbin.it/tcq9wDi2/raw/",
  5. "Sms": "https://bitbin.it/EdYiF70H/raw/",
  6. "EmailFeedback": "#",
  7. "UrlContato": "#",
  8. "UrlTermos": "#",
  9. "CheckUser": "true",
  10. "Udp": [
  11. {
  12. "Porta": "7300"
  13. }
  14. ],
  15. "Servers": [
  16. {
  17. "Name": "SERVIDOR 1",
  18. "TYPE": "premium",
  19. "FLAG": "br.png",
  20. "ServerIP": "br.jmsconnect.xyz",
  21. "CheckUser": "",
  22. "ServerPort": "22",
  23. "SSLPort": "443",
  24. "USER": "",
  25. "PASS": ""
  26. },
  27. {
  28. "Name": "SERVIDOR 2",
  29. "TYPE": "premium",
  30. "FLAG": "br.png",
  31. "ServerIP": "br2.jmsconnect.xyz",
  32. "CheckUser": "http://jmsconnect.xyz:5454/checkUser",
  33. "ServerPort": "22",
  34. "SSLPort": "443",
  35. "USER": "",
  36. "PASS": ""
  37. },
  38. {
  39. "Name": "SERVIDOR 3",
  40. "TYPE": "premium",
  41. "FLAG": "br.png",
  42. "ServerIP": "br3.jmsconnect.xyz",
  43. "CheckUser": "http://jmsconnect.xyz.xyz:5454/checkUser",
  44. "ServerPort": "22",
  45. "SSLPort": "443",
  46. "USER": "",
  47. "PASS": ""
  48. },
  49. {
  50. "Name": "SERVIDOR 4",
  51. "TYPE": "premium",
  52. "FLAG": "br.png",
  53. "ServerIP": "br4.jmsconnect.xyz",
  54. "CheckUser": "http://jmsconnect.xyz:5454/checkUser",
  55. "ServerPort": "22",
  56. "SSLPort": "443",
  57. "USER": "",
  58. "PASS": ""
  59. },
  60. {
  61. "Name": "SERVIDOR 5",
  62. "TYPE": "premium",
  63. "FLAG": "br.png",
  64. "ServerIP": "br5.jmsconnect.xyz",
  65. "CheckUser": "http://http://br5.jmsconnect.xyz:5454/checkUse:5454/checkUser",
  66. "ServerPort": "22",
  67. "SSLPort": "443",
  68. "USER": "",
  69. "PASS": ""
  70. },
  71. {
  72. "Name": "SERVIDOR 6",
  73. "TYPE": "premium",
  74. "FLAG": "br.png",
  75. "ServerIP": "br6.jmsconnect.xyz",
  76. "CheckUser": "http://jmsconnect.xyz:5454/checkUser",
  77. "ServerPort": "22",
  78. "SSLPort": "443",
  79. "USER": "",
  80. "PASS": ""
  81. },
  82. ],
  83. "Networks": [
  84. {
  85. "Version": "1.3.5",
  86. "ReleaseNotes": "Configurações vivo atualizadas (em testes)",
  87. "UrlUpdate": "https://bitbin.it/0sROAzUz/raw/",
  88. "Sms": "https://bitbin.it/oKgMpLx1/raw/",
  89. "EmailFeedback": "cloudzinmaker@gmail.com",
  90. "UrlContato": "https://t.me/satancloud",
  91. "UrlTermos": "https://linkmenu.cc/cloudrocket",
  92. "CheckUser": "true",
  93. "Udp": [
  94. {
  95. "Porta": "7300"
  96. }
  97. ],
  98. "Servers": [
  99. {
  100. "Name": "AUTOMATICO",
  101. "TYPE": "premium",
  102. "FLAG": "id.png",
  103. "ServerIP": "barbie.hinatanetclientes.online",
  104. "CheckUser": "http://191.233.242.166:8181/checkUser",
  105. "ServerPort": "22",
  106. "SSLPort": "443",
  107. "USER": "",
  108. "PASS": ""
  109. },
  110. {
  111. "Name": "BR-SV1 | FREE",
  112. "TYPE": "premium",
  113. "FLAG": "br.png",
  114. "ServerIP": "br1.secondvpn.tk",
  115. "CheckUser": "http://br1.secondvpn.tk:5454/checkUser",
  116. "ServerPort": "22",
  117. "SSLPort": "443",
  118. "USER": "",
  119. "PASS": ""
  120. },
  121. {
  122. "Name": "BR-SV2 | FREE",
  123. "TYPE": "premium",
  124. "FLAG": "br.png",
  125. "ServerIP": "cloudzinssh.tk",
  126. "CheckUser": "http://20.201.116.160:8888/server/online",
  127. "ServerPort": "22",
  128. "SSLPort": "443",
  129. "USER": "",
  130. "PASS": ""
  131. },
  132. {
  133. "Name": "BR-SV3 | FREE",
  134. "TYPE": "premium",
  135. "FLAG": "br.png",
  136. "ServerIP": "cloudspacehost.tk",
  137. "CheckUser": "http://40.69.163.63:5454/checkUser",
  138. "ServerPort": "22",
  139. "SSLPort": "443",
  140. "USER": "",
  141. "PASS": ""
  142. },
  143. {
  144. "Name": "CA-SV4 | FREE",
  145. "TYPE": "free",
  146. "FLAG": "ca.png",
  147. "ServerIP": "cas-2.opensvr.net",
  148. "CheckUser": "http://cas-2.opensvr.net:5454/checkUser",
  149. "ServerPort": "22",
  150. "SSLPort": "443",
  151. "USER": "",
  152. "PASS": ""
  153. },
  154. {
  155. "Name": "US-SV5 | FREE",
  156. "TYPE": "free",
  157. "FLAG": "us.png",
  158. "ServerIP": "uss-3.opensvr.net",
  159. "CheckUser": "http://uss-3.opensvr.net:5454/checkUser",
  160. "ServerPort": "22",
  161. "SSLPort": "443",
  162. "USER": "",
  163. "PASS": ""
  164. },
  165. ],
  166. "Networks": [
  167. {
  168. "Name": "INJECT PROXY 1",
  169. "FLAG": "vivo",
  170. "Payload": "GET wss://unpkg.com// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  171. "SNI": "unpkg.com",
  172. "TlsIP": "unpkg.com",
  173. "ProxyIP": "",
  174. "ProxyPort": "443",
  175. "Info": "Tlsws"
  176. },
  177. {
  178. "Name": "INJECT PROXY 2",
  179. "FLAG": "vivo",
  180. "Payload": "GET wss://carrinho-pos-familia.vivo.com.br [protocol][crlf]Host: [app_host][crlf]X-Forwarded-For: [app_host][crlf]Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf][crlf]",
  181. "SNI": "carrinho-pos-familia.vivo.com.br",
  182. "TlsIP": "172.67.165.43",
  183. "ProxyIP": "",
  184. "ProxyPort": "443",
  185. "Info": "Tlsws"
  186. },
  187. {
  188. "Name": "INJECT PROXY 3",
  189. "FLAG": "vivo",
  190. "Payload": "GET wss://carrinho-pos-familia.vivo.com.br// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  191. "SNI": "carrinho-pos-familia.vivo.com.br",
  192. "TlsIP": "172.67.165.43",
  193. "ProxyIP": "",
  194. "ProxyPort": "443",
  195. "Info": "Tlsws"
  196. },
  197. {
  198. "Name": "INJECT TLS 4",
  199. "FLAG": "vivo",
  200. "Payload": "GET wss://carrinho-pos-familia.vivo.com.br// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  201. "SNI": "carrinho-pos-familia.vivo.com.br",
  202. "TlsIP": "172.67.165.43",
  203. "ProxyIP": "",
  204. "ProxyPort": "443",
  205. "Info": "Tlsws"
  206. },
  207. {
  208. "Name": "INJECT TLS 5",
  209. "FLAG": "vivo",
  210. "Payload": "GET wss://cdnjs.cloudflare.com [protocol][crlf]Host: [app_host][crlf] Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  211. "SNI": "cdnjs.cloudflare.com",
  212. "TlsIP": "172.67.165.43",
  213. "ProxyIP": "",
  214. "ProxyPort": "443",
  215. "Info": "Tlsws"
  216. },
  217. {
  218. "Name": "INJECT TLS 6",
  219. "FLAG": "vivo",
  220. "Payload": "GET wss://live.vivo.com.br/ HTTP/1.1[crlf]Host: [app_host][crlf]Connection: keep-alive[crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  221. "SNI": "live.vivo.com.br",
  222. "TlsIP": "172.67.165.43",
  223. "ProxyIP": "",
  224. "ProxyPort": "443",
  225. "Info": "Tlsws"
  226. },
  227. {
  228. "Name": "INJECT TLS 7",
  229. "FLAG": "claro",
  230. "Payload": "GET sni://go.kaltura.com HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Upgrade[crlf][crlf]",
  231. "SNI": "go.kaltura.com",
  232. "TlsIP": "go.kaltura.com",
  233. "ProxyIP": "",
  234. "ProxyPort": "443",
  235. "Info": "Tlsws"
  236. },
  237. {
  238. "Name": "INJECT TLS 8",
  239. "FLAG": "claro",
  240. "Payload": "GET wss://connect.kaltura.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  241. "SNI": "connect.kaltura.com",
  242. "TlsIP": "connect.kaltura.com",
  243. "ProxyIP": "",
  244. "ProxyPort": "443",
  245. "Info": "Tlsws"
  246. },
  247. {
  248. "Name": "INJECT TLS 9",
  249. "FLAG": "claro",
  250. "Payload": "GET wss://go.kaltura.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  251. "SNI": "go.kaltura.com",
  252. "TlsIP": "go.kaltura.com",
  253. "ProxyIP": "",
  254. "ProxyPort": "443",
  255. "Info": "Tlsws"
  256. },
  257. {
  258. "Name": "INJECT TLS 10",
  259. "FLAG": "claro",
  260. "Payload": "GET wss://go.kaltura.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  261. "SNI": "go.kaltura.com",
  262. "TlsIP": "go.kaltura.com",
  263. "ProxyIP": "",
  264. "ProxyPort": "443",
  265. "Info": "Tlsws"
  266. },
  267. {
  268. "Name": "INJECT TLS 11",
  269. "FLAG": "claro",
  270. "Payload": "GET wss://content.akross.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  271. "SNI": "content.akross.com.br",
  272. "TlsIP": "content.akross.com.br",
  273. "ProxyIP": "",
  274. "ProxyPort": "443",
  275. "Info": "Tlsws"
  276. },
  277. {
  278. "Name": "INJECT PROXY 12",
  279. "FLAG": "tim",
  280. "Payload": "GET wss://beringtime.com/ HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf][crlf]",
  281. "SNI": "beringtime.com",
  282. "TlsIP": "beringtime.com",
  283. "ProxyIP": "",
  284. "ProxyPort": "443",
  285. "Info": "Tlsws"
  286. },
  287. {
  288. "Name": "INJECT TLS 13",
  289. "FLAG": "tim",
  290. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  291. "SNI": "static.r4you.co",
  292. "TlsIP": "104.26.5.175",
  293. "ProxyIP": "",
  294. "ProxyPort": "443",
  295. "Info": "Tlsws"
  296. },
  297. {
  298. "Name": "INJECT TLS 14",
  299. "FLAG": "tim",
  300. "Payload": "GET ws://static.r4you.co HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  301. "SNI": "static.r4you.co",
  302. "TlsIP": "104.26.5.175",
  303. "ProxyIP": "",
  304. "ProxyPort": "443",
  305. "Info": "Tlsws"
  306. },
  307. {
  308. "Name": "INJECT TLS 15",
  309. "FLAG": "tim",
  310. "Payload": "GET / HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  311. "SNI": "[app_host]",
  312. "TlsIP": "104.16.18.94",
  313. "ProxyIP": "",
  314. "ProxyPort": "443",
  315. "Info": "Tlsws"
  316. },
  317. {
  318. "Name": "INJECT TLS 16",
  319. "FLAG": "tim",
  320. "Payload": "GET sni://cdnjs.cloudflare.com [protocol][crlf]Host: [app_host][crlf]X-Forwarded-For: [app_host][crlf]Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  321. "SNI": "cdnjs.cloudflare.com",
  322. "TlsIP": "104.16.19.94",
  323. "ProxyIP": "",
  324. "ProxyPort": "443",
  325. "Info": "Tlsws"
  326. },
  327. {
  328. "Name": "INJECT TLS 17",
  329. "FLAG": "tim",
  330. "Payload": "GET wss://cdnjs.cloudflare.com HTTP/1.1[crlf]Host: [app_host][crlf]Connection: Keep-alive[crlf]Upgrade: ws[crlf][crlf]",
  331. "SNI": "cdnjs.cloudflare.com",
  332. "TlsIP": "cdnjs.cloudflare.com",
  333. "ProxyIP": "",
  334. "ProxyPort": "443",
  335. "Info": "Tlsws"
  336. },
  337. {
  338. "Name": "INJECT TLS 18",
  339. "FLAG": "tim",
  340. "Payload": "GET wss://m.timbancavirtual.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  341. "SNI": "m.timbancavirtual.com.br",
  342. "TlsIP": "m.timbancavirtual.com.br",
  343. "ProxyIP": "",
  344. "ProxyPort": "443",
  345. "Info": "Tlsws"
  346. },
  347. {
  348. "Name": "INJECT TLS 19",
  349. "FLAG": "tim",
  350. "Payload": "GET ws://consultatim.com.br HTTP/1.1\nHost: [app_host_proxy]\nUpgrade: ws\n\n",
  351. "SNI": "consultatim.com.br",
  352. "TlsIP": "consultatim.com.br",
  353. "ProxyIP": "",
  354. "ProxyPort": "443",
  355. "Info": "Tlsws"
  356. },
  357. {
  358. "Name": "INJECT TLS 20",
  359. "FLAG": "tim",
  360. "Payload": "GET wss://accesswdun.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  361. "SNI": "accesswdun.com",
  362. "TlsIP": "3cyber.com",
  363. "ProxyIP": "",
  364. "ProxyPort": "443",
  365. "Info": "Tlsws"
  366. },
  367. {
  368. "Name": "INJECT PROXY 21",
  369. "FLAG": "oi",
  370. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  371. "SNI": "oii.gdmhost.ga",
  372. "TlsIP": "www.hbogo.com.br",
  373. "ProxyIP": "www.hbogo.com.br",
  374. "ProxyPort": "80",
  375. "Info": "proxy"
  376. },
  377. {
  378. "Name": "INJECT TLS 22",
  379. "FLAG": "oi",
  380. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  381. "SNI": "www.hbogo.com.br",
  382. "TlsIP": "www.hbogo.com.br",
  383. "ProxyIP": "www.hbogo.com.br",
  384. "ProxyPort": "443",
  385. "Info": "Tlsws"
  386. },
  387. {
  388. "Name": "INJECT TLS 23",
  389. "FLAG": "oi",
  390. "Payload": "GET ws://www.hbogo.com.br HTTP/1.1\nHost: [app_host]\nUpgrade: ws[crlf]Sec-Websocket-Extensions: superspeed\n\n",
  391. "SNI": "www.hbogo.com.br",
  392. "TlsIP": "www.hbogo.com.br",
  393. "ProxyIP": "",
  394. "ProxyPort": "443",
  395. "Info": "Tlsws"
  396. },
  397. {
  398. "Name": "INJECT TLS 24",
  399. "FLAG": "oi",
  400. "Payload": "GET / HTTP/1.1[crlf]Host: [host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  401. "SNI": "[app_host]",
  402. "TlsIP": "104.16.51.91",
  403. "ProxyIP": "",
  404. "ProxyPort": "443",
  405. "Info": "Tlsws"
  406. }
  407. ]
  408. }

comments powered by Disqus