config


SUBMITTED BY: jms10

DATE: May 9, 2022, 2:20 a.m.

UPDATED: Oct. 27, 2023, 3:20 p.m.

FORMAT: Text only

SIZE: 18.7 kB

HITS: 4004

  1. {
  2. "Version": "1.0.2",
  3. "ReleaseNotes": "Nova Atualização Disponível",
  4. "UrlUpdate": "https://bitbin.it/tcq9wDi2/raw/",
  5. "Sms": "https://bitbin.it/EdYiF70H/raw/",
  6. "EmailFeedback": "#",
  7. "UrlContato": "#",
  8. "UrlTermos": "#",
  9. "CheckUser": "true",
  10. "Udp": [
  11. {
  12. "Porta": "7300"
  13. },
  14. {
  15. "Porta": "7400"
  16. },
  17. {
  18. "Porta": "7500"
  19. },
  20. {
  21. "Porta": "7200"
  22. }
  23. ],
  24. "Servers": [
  25. {
  26. "Name": "SERVIDOR 1",
  27. "TYPE": "premium",
  28. "FLAG": "br.png",
  29. "ServerIP": "br1.jmsconnect.xyz",
  30. "CheckUser": "",
  31. "ServerPort": "22",
  32. "SSLPort": "443",
  33. "USER": "",
  34. "PASS": ""
  35. },
  36. {
  37. "Name": "SERVIDOR 2",
  38. "TYPE": "premium",
  39. "FLAG": "br.png",
  40. "ServerIP": "br2.jmsconnect.xyz",
  41. "CheckUser": "",
  42. "ServerPort": "22",
  43. "SSLPort": "443",
  44. "USER": "",
  45. "PASS": ""
  46. },
  47. {
  48. "Name": "SERVIDOR 3",
  49. "TYPE": "premium",
  50. "FLAG": "br.png",
  51. "ServerIP": "br3.jmsconnect.xyz",
  52. "CheckUser": "",
  53. "ServerPort": "22",
  54. "SSLPort": "443",
  55. "USER": "",
  56. "PASS": ""
  57. },
  58. {
  59. "Name": "SERVIDOR 4",
  60. "TYPE": "premium",
  61. "FLAG": "br.png",
  62. "ServerIP": "br4.jmsconnect.xyz",
  63. "CheckUser": "",
  64. "ServerPort": "22",
  65. "SSLPort": "443",
  66. "USER": "",
  67. "PASS": ""
  68. },
  69. "Networks": [
  70. {
  71. "Name": "VIVO 1",
  72. "FLAG": "vivo",
  73. "Payload": "GET ws://vivo360.vivo.com.br HTTP/1.1\nHost: [app_host]\nUpgrade: ws\n\n",
  74. "SNI": "vivo360.vivo.com.br",
  75. "TlsIP": "104.18.6.80",
  76. "ProxyIP": "",
  77. "ProxyPort": "",
  78. "Info": "Tlsws"
  79. },
  80. {
  81. "Name": "VIVO 2",
  82. "FLAG": "vivo",
  83. "Payload": "GET ws://vivo360.vivo.com.br HTTP/1.1\nHost: [app_host]\nUpgrade: ws\n\n",
  84. "SNI": "vivo360.vivo.com.br",
  85. "TlsIP": "104.18.6.80",
  86. "ProxyIP": "",
  87. "ProxyPort": "",
  88. "Info": "Tlsws"
  89. },
  90. {
  91. "Name": "VIVO 3",
  92. "FLAG": "vivo",
  93. "Payload": "GET ws://vivo360.vivo.com.br HTTP/1.1\nHost: [app_host]\nUpgrade: ws\n\n",
  94. "SNI": "vivo360.vivo.com.br",
  95. "TlsIP": "104.18.6.80",
  96. "ProxyIP": "",
  97. "ProxyPort": "",
  98. "Info": "Tlsws"
  99. },
  100. {
  101. "Name": "VIVO 4",
  102. "FLAG": "vivo",
  103. "Payload": "GET ws://vivo360.vivo.com.br HTTP/1.1\nHost: [app_host]\nUpgrade: ws\n\n",
  104. "SNI": "vivo360.vivo.com.br",
  105. "TlsIP": "104.18.6.80",
  106. "ProxyIP": "",
  107. "ProxyPort": "",
  108. "Info": "Tlsws"
  109. },
  110. {
  111. "Name": "VIVO 5",
  112. "FLAG": "VIVO",
  113. "Payload": "GET ws://vivo360.vivo.com.br HTTP/1.1\nHost: [app_host]\nUpgrade: ws\n\n",
  114. "SNI": "vivo360.vivo.com.br",
  115. "TlsIP": "104.18.6.80",
  116. "ProxyIP": "",
  117. "ProxyPort": "",
  118. "Info": "Tlsws"
  119. },
  120. {
  121. "Name": "VIVO 6",
  122. "FLAG": "vivo",
  123. "Payload": "GET / HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf][crlf]",
  124. "SNI": "",
  125. "TlsIP": "",
  126. "ProxyIP": "104.18.6.80",
  127. "ProxyPort": "80",
  128. "Info": "Proxy"
  129. },
  130. {
  131. "Name": "TIM 1",
  132. "FLAG": "tim",
  133. "Payload": "GET ws://empresas.alura.com.br HTTP/1.1\nHost: [app_host]\nUpgrade: ws\n\n",
  134. "SNI": "empresas.alura.com.br",
  135. "TlsIP": "empresas.alura.com.br",
  136. "ProxyIP": "",
  137. "ProxyPort": "",
  138. "Info": "Tlsws"
  139. },
  140. {
  141. "Name": "TIM 2",
  142. "FLAG": "tim",
  143. "Payload": "GET ws://static.r4you.co HTTP/1.1\nHost: [app_host]\nUpgrade: ws\n\n",
  144. "SNI": "static.r4you.co",
  145. "TlsIP": "104.26.5.175",
  146. "ProxyIP": "",
  147. "ProxyPort": "",
  148. "Info": "Tlsws"
  149. },
  150. {
  151. "Name": "TIM 3",
  152. "FLAG": "tim",
  153. "Payload": "GET ws://blog.alura.com.br HTTP/1.1\nHost: [app_host]\nUpgrade: ws\n\n",
  154. "SNI": "blog.alura.com.br",
  155. "TlsIP": "blog.alura.com.br",
  156. "ProxyIP": "",
  157. "ProxyPort": "",
  158. "Info": "Tlsws"
  159. },
  160. {
  161. "Name": "TIM 4",
  162. "FLAG": "tim",
  163. "Payload": "GET ws://www.alura.com.br HTTP/1.1\nHost: [app_host]\nUpgrade: ws\n\n",
  164. "SNI": "www.alura.com.br",
  165. "TlsIP": "www.alura.com.br",
  166. "ProxyIP": "",
  167. "ProxyPort": "",
  168. "Info": "Tlsws"
  169. },
  170. {
  171. "Name": "CLARO 1",
  172. "FLAG": "claro",
  173. "Payload": "GET wss://4.icanhazip.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Connection: Keep-Alive[crlf][crlf]",
  174. "SNI": "4.icanhazip.com",
  175. "TlsIP": "4.icanhazip.com",
  176. "ProxyIP": "",
  177. "ProxyPort": "",
  178. "Info": "Tlsws"
  179. },
  180. {
  181. "Name": "CLARO 2",
  182. "FLAG": "claro",
  183. "Payload": "GET ws://go.kaltura.com HTTP/1.1\nHost: [app_host]\nUpgrade: ws\n\n",
  184. "SNI": "go.kaltura.com",
  185. "TlsIP": "go.kaltura.com",
  186. "ProxyIP": "",
  187. "ProxyPort": "",
  188. "Info": "Tlsws"
  189. },
  190. {
  191. "Name": "CLARO 3",
  192. "FLAG": "claro",
  193. "Payload": "GET ws://es.corp.kaltura.com HTTP/1.1\nHost: [app_host]\nUpgrade: ws\n\n",
  194. "SNI": "es.corp.kaltura.com",
  195. "TlsIP": "es.corp.kaltura.com",
  196. "ProxyIP": "",
  197. "ProxyPort": "",
  198. "Info": "Tlsws"
  199. },
  200. {
  201. "Name": "CLARO 4",
  202. "FLAG": "claro",
  203. "Payload": "GET ws://go.kaltura.com HTTP/1.1\nHost: [app_host]\nUpgrade: ws\n\n",
  204. "SNI": "go.kaltura.com",
  205. "TlsIP": "go.kaltura.com",
  206. "ProxyIP": "",
  207. "ProxyPort": "",
  208. "Info": "Tlsws"
  209. },
  210. {
  211. "Name": "Oi Todas Regiões",
  212. "FLAG": "oi",
  213. "Payload": "GET ws://www.hbogo.com.br HTTP/1.1\nHost: [app_host]\nUpgrade: ws\n\n",
  214. "SNI": "www.hbogo.com.br",
  215. "TlsIP": "www.hbogo.com.br",
  216. "ProxyIP": "",
  217. "ProxyPort": "",
  218. "Info": "Tlsws"
  219. }
  220. ]
  221. }
  222. {
  223. "Version": "1.0.1",
  224. "ReleaseNotes": "SERVIDOR VIVO ADICIONADO",
  225. "UrlUpdate": "https://bitbin.it/tcq9wDi2/raw/",
  226. "Sms": "https://bitbin.it/EdYiF70H/raw/",
  227. "EmailFeedback": "#",
  228. "UrlContato": "#",
  229. "UrlTermos": "#",
  230. "CheckUser": "true",
  231. "Udp": [
  232. {
  233. "Porta": "7300"
  234. }
  235. ],
  236. "Servers": [
  237. {
  238. "Name": "SERVIDOR 1",
  239. "TYPE": "premium",
  240. "FLAG": "br.png",
  241. "ServerIP": "br.jmsconnect.xyz",
  242. "CheckUser": "",
  243. "ServerPort": "22",
  244. "SSLPort": "443",
  245. "USER": "",
  246. "PASS": ""
  247. },
  248. {
  249. "Name": "SERVIDOR 2",
  250. "TYPE": "premium",
  251. "FLAG": "br.png",
  252. "ServerIP": "br2.jmsconnect.xyz",
  253. "CheckUser": "http://jmsconnect.xyz:5454/checkUser",
  254. "ServerPort": "22",
  255. "SSLPort": "443",
  256. "USER": "",
  257. "PASS": ""
  258. },
  259. {
  260. "Name": "SERVIDOR 3",
  261. "TYPE": "premium",
  262. "FLAG": "br.png",
  263. "ServerIP": "br3.jmsconnect.xyz",
  264. "CheckUser": "http://jmsconnect.xyz.xyz:5454/checkUser",
  265. "ServerPort": "22",
  266. "SSLPort": "443",
  267. "USER": "",
  268. "PASS": ""
  269. },
  270. {
  271. "Name": "SERVIDOR 4",
  272. "TYPE": "premium",
  273. "FLAG": "br.png",
  274. "ServerIP": "br4.jmsconnect.xyz",
  275. "CheckUser": "http://jmsconnect.xyz:5454/checkUser",
  276. "ServerPort": "22",
  277. "SSLPort": "443",
  278. "USER": "",
  279. "PASS": ""
  280. },
  281. {
  282. "Name": "SERVIDOR 5",
  283. "TYPE": "premium",
  284. "FLAG": "br.png",
  285. "ServerIP": "br5.jmsconnect.xyz",
  286. "CheckUser": "http://http://br5.jmsconnect.xyz:5454/checkUse:5454/checkUser",
  287. "ServerPort": "22",
  288. "SSLPort": "443",
  289. "USER": "",
  290. "PASS": ""
  291. },
  292. {
  293. "Name": "SERVIDOR 6",
  294. "TYPE": "premium",
  295. "FLAG": "br.png",
  296. "ServerIP": "br6.jmsconnect.xyz",
  297. "CheckUser": "http://jmsconnect.xyz:5454/checkUser",
  298. "ServerPort": "22",
  299. "SSLPort": "443",
  300. "USER": "",
  301. "PASS": ""
  302. },
  303. ],
  304. "Networks": [
  305. {
  306. "Version": "1.3.5",
  307. "ReleaseNotes": "Configurações vivo atualizadas (em testes)",
  308. "UrlUpdate": "https://bitbin.it/0sROAzUz/raw/",
  309. "Sms": "https://bitbin.it/oKgMpLx1/raw/",
  310. "EmailFeedback": "cloudzinmaker@gmail.com",
  311. "UrlContato": "https://t.me/satancloud",
  312. "UrlTermos": "https://linkmenu.cc/cloudrocket",
  313. "CheckUser": "true",
  314. "Udp": [
  315. {
  316. "Porta": "7300"
  317. }
  318. ],
  319. "Servers": [
  320. {
  321. "Name": "AUTOMATICO",
  322. "TYPE": "premium",
  323. "FLAG": "id.png",
  324. "ServerIP": "barbie.hinatanetclientes.online",
  325. "CheckUser": "http://191.233.242.166:8181/checkUser",
  326. "ServerPort": "22",
  327. "SSLPort": "443",
  328. "USER": "",
  329. "PASS": ""
  330. },
  331. {
  332. "Name": "BR-SV1 | FREE",
  333. "TYPE": "premium",
  334. "FLAG": "br.png",
  335. "ServerIP": "br1.secondvpn.tk",
  336. "CheckUser": "http://br1.secondvpn.tk:5454/checkUser",
  337. "ServerPort": "22",
  338. "SSLPort": "443",
  339. "USER": "",
  340. "PASS": ""
  341. },
  342. {
  343. "Name": "BR-SV2 | FREE",
  344. "TYPE": "premium",
  345. "FLAG": "br.png",
  346. "ServerIP": "cloudzinssh.tk",
  347. "CheckUser": "http://20.201.116.160:8888/server/online",
  348. "ServerPort": "22",
  349. "SSLPort": "443",
  350. "USER": "",
  351. "PASS": ""
  352. },
  353. {
  354. "Name": "BR-SV3 | FREE",
  355. "TYPE": "premium",
  356. "FLAG": "br.png",
  357. "ServerIP": "cloudspacehost.tk",
  358. "CheckUser": "http://40.69.163.63:5454/checkUser",
  359. "ServerPort": "22",
  360. "SSLPort": "443",
  361. "USER": "",
  362. "PASS": ""
  363. },
  364. {
  365. "Name": "CA-SV4 | FREE",
  366. "TYPE": "free",
  367. "FLAG": "ca.png",
  368. "ServerIP": "cas-2.opensvr.net",
  369. "CheckUser": "http://cas-2.opensvr.net:5454/checkUser",
  370. "ServerPort": "22",
  371. "SSLPort": "443",
  372. "USER": "",
  373. "PASS": ""
  374. },
  375. {
  376. "Name": "US-SV5 | FREE",
  377. "TYPE": "free",
  378. "FLAG": "us.png",
  379. "ServerIP": "uss-3.opensvr.net",
  380. "CheckUser": "http://uss-3.opensvr.net:5454/checkUser",
  381. "ServerPort": "22",
  382. "SSLPort": "443",
  383. "USER": "",
  384. "PASS": ""
  385. },
  386. ],
  387. "Networks": [
  388. {
  389. "Name": "INJECT PROXY 1",
  390. "FLAG": "vivo",
  391. "Payload": "GET wss://unpkg.com// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  392. "SNI": "unpkg.com",
  393. "TlsIP": "unpkg.com",
  394. "ProxyIP": "",
  395. "ProxyPort": "443",
  396. "Info": "Tlsws"
  397. },
  398. {
  399. "Name": "INJECT PROXY 2",
  400. "FLAG": "vivo",
  401. "Payload": "GET wss://carrinho-pos-familia.vivo.com.br [protocol][crlf]Host: [app_host][crlf]X-Forwarded-For: [app_host][crlf]Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf][crlf]",
  402. "SNI": "carrinho-pos-familia.vivo.com.br",
  403. "TlsIP": "172.67.165.43",
  404. "ProxyIP": "",
  405. "ProxyPort": "443",
  406. "Info": "Tlsws"
  407. },
  408. {
  409. "Name": "INJECT PROXY 3",
  410. "FLAG": "vivo",
  411. "Payload": "GET wss://carrinho-pos-familia.vivo.com.br// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  412. "SNI": "carrinho-pos-familia.vivo.com.br",
  413. "TlsIP": "172.67.165.43",
  414. "ProxyIP": "",
  415. "ProxyPort": "443",
  416. "Info": "Tlsws"
  417. },
  418. {
  419. "Name": "INJECT TLS 4",
  420. "FLAG": "vivo",
  421. "Payload": "GET wss://carrinho-pos-familia.vivo.com.br// HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]Connection: Keep-Alive[crlf][crlf]",
  422. "SNI": "carrinho-pos-familia.vivo.com.br",
  423. "TlsIP": "172.67.165.43",
  424. "ProxyIP": "",
  425. "ProxyPort": "443",
  426. "Info": "Tlsws"
  427. },
  428. {
  429. "Name": "INJECT TLS 5",
  430. "FLAG": "vivo",
  431. "Payload": "GET wss://cdnjs.cloudflare.com [protocol][crlf]Host: [app_host][crlf] Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  432. "SNI": "cdnjs.cloudflare.com",
  433. "TlsIP": "172.67.165.43",
  434. "ProxyIP": "",
  435. "ProxyPort": "443",
  436. "Info": "Tlsws"
  437. },
  438. {
  439. "Name": "INJECT TLS 6",
  440. "FLAG": "vivo",
  441. "Payload": "GET wss://live.vivo.com.br/ HTTP/1.1[crlf]Host: [app_host][crlf]Connection: keep-alive[crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  442. "SNI": "live.vivo.com.br",
  443. "TlsIP": "172.67.165.43",
  444. "ProxyIP": "",
  445. "ProxyPort": "443",
  446. "Info": "Tlsws"
  447. },
  448. {
  449. "Name": "INJECT TLS 7",
  450. "FLAG": "claro",
  451. "Payload": "GET sni://go.kaltura.com HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Upgrade[crlf][crlf]",
  452. "SNI": "go.kaltura.com",
  453. "TlsIP": "go.kaltura.com",
  454. "ProxyIP": "",
  455. "ProxyPort": "443",
  456. "Info": "Tlsws"
  457. },
  458. {
  459. "Name": "INJECT TLS 8",
  460. "FLAG": "claro",
  461. "Payload": "GET wss://connect.kaltura.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  462. "SNI": "connect.kaltura.com",
  463. "TlsIP": "connect.kaltura.com",
  464. "ProxyIP": "",
  465. "ProxyPort": "443",
  466. "Info": "Tlsws"
  467. },
  468. {
  469. "Name": "INJECT TLS 9",
  470. "FLAG": "claro",
  471. "Payload": "GET wss://go.kaltura.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  472. "SNI": "go.kaltura.com",
  473. "TlsIP": "go.kaltura.com",
  474. "ProxyIP": "",
  475. "ProxyPort": "443",
  476. "Info": "Tlsws"
  477. },
  478. {
  479. "Name": "INJECT TLS 10",
  480. "FLAG": "claro",
  481. "Payload": "GET wss://go.kaltura.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  482. "SNI": "go.kaltura.com",
  483. "TlsIP": "go.kaltura.com",
  484. "ProxyIP": "",
  485. "ProxyPort": "443",
  486. "Info": "Tlsws"
  487. },
  488. {
  489. "Name": "INJECT TLS 11",
  490. "FLAG": "claro",
  491. "Payload": "GET wss://content.akross.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  492. "SNI": "content.akross.com.br",
  493. "TlsIP": "content.akross.com.br",
  494. "ProxyIP": "",
  495. "ProxyPort": "443",
  496. "Info": "Tlsws"
  497. },
  498. {
  499. "Name": "INJECT PROXY 12",
  500. "FLAG": "tim",
  501. "Payload": "GET wss://beringtime.com/ HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf][crlf]",
  502. "SNI": "beringtime.com",
  503. "TlsIP": "beringtime.com",
  504. "ProxyIP": "",
  505. "ProxyPort": "443",
  506. "Info": "Tlsws"
  507. },
  508. {
  509. "Name": "INJECT TLS 13",
  510. "FLAG": "tim",
  511. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  512. "SNI": "static.r4you.co",
  513. "TlsIP": "104.26.5.175",
  514. "ProxyIP": "",
  515. "ProxyPort": "443",
  516. "Info": "Tlsws"
  517. },
  518. {
  519. "Name": "INJECT TLS 14",
  520. "FLAG": "tim",
  521. "Payload": "GET ws://static.r4you.co HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  522. "SNI": "static.r4you.co",
  523. "TlsIP": "104.26.5.175",
  524. "ProxyIP": "",
  525. "ProxyPort": "443",
  526. "Info": "Tlsws"
  527. },
  528. {
  529. "Name": "INJECT TLS 15",
  530. "FLAG": "tim",
  531. "Payload": "GET / HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  532. "SNI": "[app_host]",
  533. "TlsIP": "104.16.18.94",
  534. "ProxyIP": "",
  535. "ProxyPort": "443",
  536. "Info": "Tlsws"
  537. },
  538. {
  539. "Name": "INJECT TLS 16",
  540. "FLAG": "tim",
  541. "Payload": "GET sni://cdnjs.cloudflare.com [protocol][crlf]Host: [app_host][crlf]X-Forwarded-For: [app_host][crlf]Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  542. "SNI": "cdnjs.cloudflare.com",
  543. "TlsIP": "104.16.19.94",
  544. "ProxyIP": "",
  545. "ProxyPort": "443",
  546. "Info": "Tlsws"
  547. },
  548. {
  549. "Name": "INJECT TLS 17",
  550. "FLAG": "tim",
  551. "Payload": "GET wss://cdnjs.cloudflare.com HTTP/1.1[crlf]Host: [app_host][crlf]Connection: Keep-alive[crlf]Upgrade: ws[crlf][crlf]",
  552. "SNI": "cdnjs.cloudflare.com",
  553. "TlsIP": "cdnjs.cloudflare.com",
  554. "ProxyIP": "",
  555. "ProxyPort": "443",
  556. "Info": "Tlsws"
  557. },
  558. {
  559. "Name": "INJECT TLS 18",
  560. "FLAG": "tim",
  561. "Payload": "GET wss://m.timbancavirtual.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  562. "SNI": "m.timbancavirtual.com.br",
  563. "TlsIP": "m.timbancavirtual.com.br",
  564. "ProxyIP": "",
  565. "ProxyPort": "443",
  566. "Info": "Tlsws"
  567. },
  568. {
  569. "Name": "INJECT TLS 19",
  570. "FLAG": "tim",
  571. "Payload": "GET ws://consultatim.com.br HTTP/1.1\nHost: [app_host_proxy]\nUpgrade: ws\n\n",
  572. "SNI": "consultatim.com.br",
  573. "TlsIP": "consultatim.com.br",
  574. "ProxyIP": "",
  575. "ProxyPort": "443",
  576. "Info": "Tlsws"
  577. },
  578. {
  579. "Name": "INJECT TLS 20",
  580. "FLAG": "tim",
  581. "Payload": "GET wss://accesswdun.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  582. "SNI": "accesswdun.com",
  583. "TlsIP": "3cyber.com",
  584. "ProxyIP": "",
  585. "ProxyPort": "443",
  586. "Info": "Tlsws"
  587. },
  588. {
  589. "Name": "INJECT PROXY 21",
  590. "FLAG": "oi",
  591. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  592. "SNI": "oii.gdmhost.ga",
  593. "TlsIP": "www.hbogo.com.br",
  594. "ProxyIP": "www.hbogo.com.br",
  595. "ProxyPort": "80",
  596. "Info": "proxy"
  597. },
  598. {
  599. "Name": "INJECT TLS 22",
  600. "FLAG": "oi",
  601. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  602. "SNI": "www.hbogo.com.br",
  603. "TlsIP": "www.hbogo.com.br",
  604. "ProxyIP": "www.hbogo.com.br",
  605. "ProxyPort": "443",
  606. "Info": "Tlsws"
  607. },
  608. {
  609. "Name": "INJECT TLS 23",
  610. "FLAG": "oi",
  611. "Payload": "GET ws://www.hbogo.com.br HTTP/1.1\nHost: [app_host]\nUpgrade: ws[crlf]Sec-Websocket-Extensions: superspeed\n\n",
  612. "SNI": "www.hbogo.com.br",
  613. "TlsIP": "www.hbogo.com.br",
  614. "ProxyIP": "",
  615. "ProxyPort": "443",
  616. "Info": "Tlsws"
  617. },
  618. {
  619. "Name": "INJECT TLS 24",
  620. "FLAG": "oi",
  621. "Payload": "GET / HTTP/1.1[crlf]Host: [host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  622. "SNI": "[app_host]",
  623. "TlsIP": "104.16.51.91",
  624. "ProxyIP": "",
  625. "ProxyPort": "443",
  626. "Info": "Tlsws"
  627. }
  628. ]
  629. }

comments powered by Disqus