# 2024.01.03 - [gofile] Detect "Bulk download is a Premium feature" response (no children)
# 2025.01.02 - [up_axfc] Update PUT response check to handle kanji chars (remove) # 2025.01.02 - [dashfile] Add response 'This file reached max downloads limit'. New cookie on captcha fail # 2024.12.28 - [dashfile] Update captcha code check # 2024.12.28 - [anonfile] Add new download link href response # 2024.12.28 - [fileblade] Add additional response handling (subsequent downloads, unknown warnings) # 2024.12.28 - [eternalhosting] Update eternal.onion to handle landing page (eternal.onion/file/)
This commit is contained in:
parent
e6804e01e1
commit
30eedaf567
10 changed files with 766 additions and 687 deletions
|
|
@ -1,4 +1,4 @@
|
|||
DateTime: 24.12.26
|
||||
DateTime: 25.01.04
|
||||
|
||||
Files:
|
||||
./hosts/1fichier.sh
|
||||
|
|
@ -163,12 +163,12 @@ _________________________________________________________________________
|
|||
./hosts/anonfile.sh:186: response=$(tor_curl_request --insecure -L -s -X POST \
|
||||
./hosts/anonfile.sh:240: tor_curl_request --insecure -s "$captcha_img_url" --output "$tmp_captcha_img"
|
||||
./hosts/anonfile.sh:340: response=$(tor_curl_request --insecure -L -s -X POST \
|
||||
./hosts/anonfile.sh:446: file_header=$(tor_curl_request -i -s --head \
|
||||
./hosts/anonfile.sh:549: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
||||
./hosts/anonfile.sh:551: tor_curl_request --insecure \
|
||||
./hosts/anonfile.sh:557: tor_curl_request --insecure \
|
||||
./hosts/anonfile.sh:564: tor_curl_request --insecure \
|
||||
./hosts/anonfile.sh:581: tor_curl_request --insecure \
|
||||
./hosts/anonfile.sh:451: file_header=$(tor_curl_request -i -s --head \
|
||||
./hosts/anonfile.sh:557: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
||||
./hosts/anonfile.sh:559: tor_curl_request --insecure \
|
||||
./hosts/anonfile.sh:565: tor_curl_request --insecure \
|
||||
./hosts/anonfile.sh:572: tor_curl_request --insecure \
|
||||
./hosts/anonfile.sh:589: tor_curl_request --insecure \
|
||||
./hosts/anonsharing.sh:91: response=$(tor_curl_request --insecure -i -s \
|
||||
./hosts/anonsharing.sh:150: file_header=$(tor_curl_request --insecure --head -L -i -s \
|
||||
./hosts/anonsharing.sh:158: file_header=$(tor_curl_request --insecure --head -H "Connection: keep-alive" -s -i \
|
||||
|
|
@ -219,14 +219,14 @@ _________________________________________________________________________
|
|||
./hosts/dailyuploads.sh:511: tor_curl_request --insecure \
|
||||
./hosts/dailyuploads.sh:528: tor_curl_request --insecure \
|
||||
./hosts/dashfile.sh:90: response=$(tor_curl_request --insecure -L -s -b "${dash_cookie_jar}" -c "${dash_cookie_jar}" \
|
||||
./hosts/dashfile.sh:169: response=$(tor_curl_request --insecure -L -s -X POST \
|
||||
./hosts/dashfile.sh:297: response=$(tor_curl_request --insecure -L -s -X POST \
|
||||
./hosts/dashfile.sh:386: file_header=$(tor_curl_request --insecure -L --head -s --referer "${fixed_url}" "$download_url")
|
||||
./hosts/dashfile.sh:484: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
||||
./hosts/dashfile.sh:486: tor_curl_request --insecure \
|
||||
./hosts/dashfile.sh:491: tor_curl_request --insecure \
|
||||
./hosts/dashfile.sh:177: response=$(tor_curl_request --insecure -L -s -X POST \
|
||||
./hosts/dashfile.sh:308: response=$(tor_curl_request --insecure -L -s -X POST \
|
||||
./hosts/dashfile.sh:397: file_header=$(tor_curl_request --insecure -L --head -s --referer "${fixed_url}" "$download_url")
|
||||
./hosts/dashfile.sh:495: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
||||
./hosts/dashfile.sh:497: tor_curl_request --insecure \
|
||||
./hosts/dashfile.sh:513: tor_curl_request --insecure \
|
||||
./hosts/dashfile.sh:502: tor_curl_request --insecure \
|
||||
./hosts/dashfile.sh:508: tor_curl_request --insecure \
|
||||
./hosts/dashfile.sh:524: tor_curl_request --insecure \
|
||||
./hosts/dataupload.sh:90: response=$(tor_curl_request --insecure -L -s -b "${dup_cookie_jar}" -c "${dup_cookie_jar}" "$remote_url")
|
||||
./hosts/dataupload.sh:166: response=$(tor_curl_request --insecure -svo. -X POST \
|
||||
./hosts/dataupload.sh:234: file_header=$(tor_curl_request --insecure -L --head -s "$download_url")
|
||||
|
|
@ -255,14 +255,14 @@ _________________________________________________________________________
|
|||
./hosts/examples/ExampleNewHost.sh:201: tor_curl_request --insecure --referer "$download_url" "$download_url" --continue-at - --output "$file_path"
|
||||
./hosts/examples/up_example.sh:112: response=$(tor_curl_upload --insecure \
|
||||
./hosts/fileblade.sh:90: response=$(tor_curl_request --insecure -L -s -b "${fb_cookie_jar}" -c "${fb_cookie_jar}" "$remote_url")
|
||||
./hosts/fileblade.sh:167: response=$(tor_curl_request --insecure -L -s -X POST \
|
||||
./hosts/fileblade.sh:254: response=$(tor_curl_request --insecure -L -s -X POST \
|
||||
./hosts/fileblade.sh:323: file_header=$(tor_curl_request --insecure -L --head -s "$download_url")
|
||||
./hosts/fileblade.sh:438: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
||||
./hosts/fileblade.sh:440: tor_curl_request --insecure -L \
|
||||
./hosts/fileblade.sh:444: tor_curl_request --insecure -L \
|
||||
./hosts/fileblade.sh:449: tor_curl_request --insecure \
|
||||
./hosts/fileblade.sh:464: tor_curl_request --insecure \
|
||||
./hosts/fileblade.sh:164: response=$(tor_curl_request --insecure -L -s -X POST \
|
||||
./hosts/fileblade.sh:266: response=$(tor_curl_request --insecure -L -s -X POST \
|
||||
./hosts/fileblade.sh:335: file_header=$(tor_curl_request --insecure -L --head -s "$download_url")
|
||||
./hosts/fileblade.sh:450: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
||||
./hosts/fileblade.sh:452: tor_curl_request --insecure -L \
|
||||
./hosts/fileblade.sh:456: tor_curl_request --insecure -L \
|
||||
./hosts/fileblade.sh:461: tor_curl_request --insecure \
|
||||
./hosts/fileblade.sh:476: tor_curl_request --insecure \
|
||||
./hosts/fileditch.sh:85: file_header=$(tor_curl_request --insecure --head -L -s "$download_url")
|
||||
./hosts/fileditch.sh:176: tor_curl_request --insecure --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval "$download_url" --continue-at - --output "$file_path"
|
||||
./hosts/fileditch.sh:178: tor_curl_request --insecure "$download_url" --continue-at - --output "$file_path"
|
||||
|
|
@ -282,9 +282,9 @@ _________________________________________________________________________
|
|||
./hosts/firestorage.sh:337: tor_curl_request --insecure -L -G "$download_url" --continue-at - --output "$file_path"
|
||||
./hosts/gofile.sh:97: response=$(tor_curl_request --insecure -s -X POST \
|
||||
./hosts/gofile.sh:170: response=$(tor_curl_request --insecure -G -L -s \
|
||||
./hosts/gofile.sh:250: file_header=$(tor_curl_request --insecure -L --head -s \
|
||||
./hosts/gofile.sh:369: tor_curl_request --insecure -G --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \
|
||||
./hosts/gofile.sh:383: tor_curl_request --insecure -G \
|
||||
./hosts/gofile.sh:258: file_header=$(tor_curl_request --insecure -L --head -s \
|
||||
./hosts/gofile.sh:377: tor_curl_request --insecure -G --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \
|
||||
./hosts/gofile.sh:391: tor_curl_request --insecure -G \
|
||||
./hosts/hexload.sh:108: response=$(tor_curl_request --insecure -s --data "$form_data" "https://hexload.com/download")
|
||||
./hosts/hexload.sh:116: response=$(tor_curl_request --insecure -s --data "$form_data" "https://hexload.com/download")
|
||||
./hosts/hexload.sh:122: response=$(tor_curl_request --insecure -s --data "$form_data" "https://hexload.com/download")
|
||||
|
|
@ -452,119 +452,119 @@ _________________________________________________________________________
|
|||
./hosts/youdbox.sh:183: file_header=$(tor_curl_request --insecure -L --head -s --referer "${fixed_url}" "$download_url")
|
||||
./hosts/youdbox.sh:276: tor_curl_request --insecure -L -G --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval "$download_url" --continue-at - --output "$file_path"
|
||||
./hosts/youdbox.sh:278: tor_curl_request --insecure -L -G "$download_url" --continue-at - --output "$file_path"
|
||||
./mad.sh:100:UseTorCurlImpersonate=false
|
||||
./mad.sh:391:tor_curl_request() {
|
||||
./mad.sh:392: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
||||
./mad.sh:393: "${curl_impersonate[@]}" --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" --connect-timeout ${ConnectTimeout} --compressed --globoff "$@"
|
||||
./mad.sh:395: curl --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" --connect-timeout ${ConnectTimeout} --compressed --globoff "$@"
|
||||
./mad.sh:398:tor_curl_request_extended() {
|
||||
./mad.sh:400: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
||||
./mad.sh:401: "${curl_impersonate[@]}" --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" --connect-timeout $randomtimeout --compressed --globoff "$@"
|
||||
./mad.sh:403: curl --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" --connect-timeout $randomtimeout --compressed --globoff "$@"
|
||||
./mad.sh:406:tor_curl_upload() {
|
||||
./mad.sh:107:UseTorCurlImpersonate=false
|
||||
./mad.sh:398:tor_curl_request() {
|
||||
./mad.sh:399: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
||||
./mad.sh:400: "${curl_impersonate[@]}" --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" --connect-timeout ${ConnectTimeout} --compressed --globoff "$@"
|
||||
./mad.sh:402: curl --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" --connect-timeout ${ConnectTimeout} --compressed --globoff "$@"
|
||||
./mad.sh:405:tor_curl_request_extended() {
|
||||
./mad.sh:407: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
||||
./mad.sh:409: "${curl_impersonate[@]}" --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" --connect-timeout ${ConnectTimeout} --speed-limit $UploadSpeedMin --speed-time $UploadTimeoutInterval --compressed --globoff "$@"
|
||||
./mad.sh:411: "${curl_impersonate[@]}" --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" --connect-timeout ${ConnectTimeout} --compressed --globoff "$@"
|
||||
./mad.sh:415: curl --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" --connect-timeout ${ConnectTimeout} --speed-limit $UploadSpeedMin --speed-time $UploadTimeoutInterval -H 'User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:109.0) Gecko/20100101 Firefox/115.0' -H 'Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8' -H 'Accept-Language: en-US,en;q=0.5' -H 'Accept-Encoding: gzip, deflate, br' -H 'Origin: null' -H 'Connection: keep-alive' -H 'Upgrade-Insecure-Requests: 1' -H 'Sec-Fetch-Dest: document' -H 'Sec-Fetch-Mode: navigate' -H 'Sec-Fetch-Site: cross-site' -H 'Sec-Fetch-User: ?1' -H 'TE: trailers' --compressed --globoff "$@"
|
||||
./mad.sh:417: curl --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" --connect-timeout ${ConnectTimeout} -H 'User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:109.0) Gecko/20100101 Firefox/115.0' -H 'Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8' -H 'Accept-Language: en-US,en;q=0.5' -H 'Accept-Encoding: gzip, deflate, br' -H 'Origin: null' -H 'Connection: keep-alive' -H 'Upgrade-Insecure-Requests: 1' -H 'Sec-Fetch-Dest: document' -H 'Sec-Fetch-Mode: navigate' -H 'Sec-Fetch-Site: cross-site' -H 'Sec-Fetch-User: ?1' -H 'TE: trailers' --compressed --globoff "$@"
|
||||
./mad.sh:1361:install_curl_impersonate() {
|
||||
./mad.sh:1363: echo -e "${BLUE}lwthiker curl_impersonate${NC} is the original dev, but it is relatively inactive."
|
||||
./mad.sh:1364: echo -e "- Currently uses curl v8.1.1."
|
||||
./mad.sh:1368: echo -e "${BLUE}lexiforest curl_impersonate${NC} is an active fork of curl_impersonate."
|
||||
./mad.sh:1369: echo -e "+ Currently uses curl v8.7.1"
|
||||
./mad.sh:1373: PS3='Please select which curl_impersonate to install: '
|
||||
./mad.sh:1381: install_curl_impersonate_lwthiker_orig
|
||||
./mad.sh:1385: install_curl_impersonate_lexiforest_fork
|
||||
./mad.sh:1395:install_curl_impersonate_lwthiker_orig() {
|
||||
./mad.sh:1399: echo -e "${BLUE}lwthiker curl_impersonate${NC} is the original curl_impersonate."
|
||||
./mad.sh:1400: echo -e "+ Currently uses curl v8.1.1, and has low activity for updates"
|
||||
./mad.sh:1403: echo -e "${GREEN}| Fetching:${NC} latest ${BLUE}lwthiker curl_impersonate${NC} info from github...${NC}"
|
||||
./mad.sh:1406: response=$(tor_curl_request --insecure -L -s https://github.com/lwthiker/curl-impersonate/releases/latest)
|
||||
./mad.sh:1408: debugHtml "github" "lbf_inst_curlimp$j" "$response"
|
||||
./mad.sh:1411: latestTag=$(grep -oPi -m 1 '(?<=/curl-impersonate/releases/tag/).*?(?=")' <<< "$response")
|
||||
./mad.sh:1421: yes_or_no "Do you wish to download and extract curl_impersonate $latestTag (using tor+curl)?" && {
|
||||
./mad.sh:1423: download_url='https://github.com/lwthiker/curl-impersonate/releases/download/'"$latestTag"'/curl-impersonate-'"$latestTag"'.x86_64-linux-gnu.tar.gz'
|
||||
./mad.sh:1426: file_header=$(tor_curl_request --insecure --head -Ls "$download_url")
|
||||
./mad.sh:1428: debugHtml "github" "head_inst_curlimp$j" "${file_header}"
|
||||
./mad.sh:1476: tor_curl_request --insecure -L "$download_url" --continue-at - --output "$file_path"
|
||||
./mad.sh:1505: echo -e "| Extracting curl_impersonate..."
|
||||
./mad.sh:1507: rm -f "${ScriptDir}"/curl*
|
||||
./mad.sh:1508: mv "$extract_location/curl-impersonate-ff" "${ScriptDir}/"
|
||||
./mad.sh:1509: mv "$extract_location/curl_ff109" "${ScriptDir}/"
|
||||
./mad.sh:1510: echo -e "${GREEN}| Done.${NC} Update ${BLUE}\"UseTorCurlImpersonate=true\"${NC} in script to use..."
|
||||
./mad.sh:1518:install_curl_impersonate_lexiforest_fork() {
|
||||
./mad.sh:1522: echo -e "${BLUE}lexiforest curl_impersonate${NC} is an active fork of curl_impersonate."
|
||||
./mad.sh:1523: echo -e "+ Currently uses curl v8.7.1, and is patched for latest CVEs"
|
||||
./mad.sh:1526: echo -e "${GREEN}| Fetching:${NC} latest ${BLUE}lexiforest curl_impersonate fork${NC} info from github...${NC}"
|
||||
./mad.sh:1529: response=$(tor_curl_request --insecure -L -s https://github.com/lexiforest/curl-impersonate/releases/latest)
|
||||
./mad.sh:1531: debugHtml "github" "lbf_inst_curlimp$j" "$response"
|
||||
./mad.sh:1534: latestTag=$(grep -oPi -m 1 '(?<=/curl-impersonate/releases/tag/).*?(?=")' <<< "$response")
|
||||
./mad.sh:1544: yes_or_no "Do you wish to download and extract curl_impersonate $latestTag (using tor+curl)?" && {
|
||||
./mad.sh:1546: download_url='https://github.com/lexiforest/curl-impersonate/releases/download/'"$latestTag"'/curl-impersonate-'"$latestTag"'.x86_64-linux-gnu.tar.gz'
|
||||
./mad.sh:1549: file_header=$(tor_curl_request --insecure --head -Ls "$download_url")
|
||||
./mad.sh:1551: debugHtml "github" "head_inst_curlimp$j" "${file_header}"
|
||||
./mad.sh:1599: tor_curl_request --insecure -L "$download_url" --continue-at - --output "$file_path"
|
||||
./mad.sh:1628: echo -e "| Extracting curl_impersonate..."
|
||||
./mad.sh:1630: rm -f "${ScriptDir}"/curl*
|
||||
./mad.sh:1631: mv "$extract_location/curl-impersonate-chrome" "${ScriptDir}/"
|
||||
./mad.sh:1632: mv "$extract_location/curl_chrome131" "${ScriptDir}/"
|
||||
./mad.sh:1633: echo -e "${GREEN}| Done.${NC} Update ${BLUE}\"UseTorCurlImpersonate=true\"${NC} in script to use..."
|
||||
./mad.sh:1795: echo -e ":${NC} ${GREEN}MAD${PINK} Audit${NC} : Reports usage of http & curl in scripts${PINK}${BLD} :"
|
||||
./mad.sh:1803: maud_curl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep --color='always' -Ei 'curl')
|
||||
./mad.sh:1804: maud_torcurl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep -A 12 --color='always' -Ei 'tor_curl')
|
||||
./mad.sh:1813: echo -e "${PINK}MAD Audit of curl:${NC} (${GREEN}grep \"curl\"${NC})"
|
||||
./mad.sh:1815: echo -e "$maud_curl"
|
||||
./mad.sh:1817: echo -e "${PINK}MAD Audit of tor_curl (+12 lines after):${NC} (${GREEN}grep \"tor_curl\"${NC})"
|
||||
./mad.sh:1819: echo -e "$maud_torcurl"
|
||||
./mad.sh:1831: maud_curl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep --color='always' -Ei 'curl')
|
||||
./mad.sh:1832: maud_torcurl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep -A 12 --color='always' -Ei 'tor_curl')
|
||||
./mad.sh:1841: echo -e "${PINK}MAD Audit of curl:${NC} (${GREEN}grep \"curl \"${NC})"
|
||||
./mad.sh:1843: echo -e "$maud_curl"
|
||||
./mad.sh:1845: echo -e "${PINK}MAD Audit of tor_curl (+12 lines after):${NC} (${GREEN}grep \"tor_curl\"${NC})"
|
||||
./mad.sh:1847: echo -e "$maud_torcurl"
|
||||
./mad.sh:1853: maud_curl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep --color='always' -Ei 'curl')
|
||||
./mad.sh:1854: maud_torcurl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep -A 12 --color='always' -Ei 'tor_curl')
|
||||
./mad.sh:1863: echo -e "${PINK}MAD Audit of curl:${NC} (${GREEN}grep \"curl\"${NC})"
|
||||
./mad.sh:1865: echo -e "$maud_curl"
|
||||
./mad.sh:1867: echo -e "${PINK}MAD Audit of tor_curl (+12 lines after):${NC} (${GREEN}grep \"tor_curl\"${NC})"
|
||||
./mad.sh:1869: echo -e "$maud_torcurl"
|
||||
./mad.sh:2816: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
||||
./mad.sh:2817: printf "client: ${GREEN}Tor${NC} + ${BLUE}curl_impersonate${NC}\\n"
|
||||
./mad.sh:2819: printf "client: ${GREEN}Tor${NC} + ${GREEN}curl${NC}\\n"
|
||||
./mad.sh:2991: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
||||
./mad.sh:2992: printf "client: ${GREEN}Tor${NC} + ${BLUE}curl_impersonate${NC}\\n"
|
||||
./mad.sh:2994: printf "client: ${GREEN}Tor${NC} + ${GREEN}curl${NC}\\n"
|
||||
./mad.sh:3192: file_header=$(tor_curl_request --insecure -m 8 -s -D - -o /dev/null \
|
||||
./mad.sh:3199: file_header=$(tor_curl_request --insecure --head -H "Connection: keep-alive" -L -s -i "$download_url" |
|
||||
./mad.sh:3327: tor_curl_request --insecure -L --referer "$file_url" "$download_url" --output "$file_path"
|
||||
./mad.sh:3371: tor_curl_request --insecure -L --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval "$download_url" --continue-at - --output "$file_path"
|
||||
./mad.sh:3373: tor_curl_request --insecure -L --referer "$file_url" "$download_url" --continue-at - --output "$file_path"
|
||||
./mad.sh:3571: response=$(tor_curl_upload --insecure -i \
|
||||
./mad.sh:408: "${curl_impersonate[@]}" --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" --connect-timeout $randomtimeout --compressed --globoff "$@"
|
||||
./mad.sh:410: curl --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" --connect-timeout $randomtimeout --compressed --globoff "$@"
|
||||
./mad.sh:413:tor_curl_upload() {
|
||||
./mad.sh:414: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
||||
./mad.sh:416: "${curl_impersonate[@]}" --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" --connect-timeout ${ConnectTimeout} --speed-limit $UploadSpeedMin --speed-time $UploadTimeoutInterval --compressed --globoff "$@"
|
||||
./mad.sh:418: "${curl_impersonate[@]}" --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" --connect-timeout ${ConnectTimeout} --compressed --globoff "$@"
|
||||
./mad.sh:422: curl --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" --connect-timeout ${ConnectTimeout} --speed-limit $UploadSpeedMin --speed-time $UploadTimeoutInterval -H 'User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:109.0) Gecko/20100101 Firefox/115.0' -H 'Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8' -H 'Accept-Language: en-US,en;q=0.5' -H 'Accept-Encoding: gzip, deflate, br' -H 'Origin: null' -H 'Connection: keep-alive' -H 'Upgrade-Insecure-Requests: 1' -H 'Sec-Fetch-Dest: document' -H 'Sec-Fetch-Mode: navigate' -H 'Sec-Fetch-Site: cross-site' -H 'Sec-Fetch-User: ?1' -H 'TE: trailers' --compressed --globoff "$@"
|
||||
./mad.sh:424: curl --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" --connect-timeout ${ConnectTimeout} -H 'User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:109.0) Gecko/20100101 Firefox/115.0' -H 'Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8' -H 'Accept-Language: en-US,en;q=0.5' -H 'Accept-Encoding: gzip, deflate, br' -H 'Origin: null' -H 'Connection: keep-alive' -H 'Upgrade-Insecure-Requests: 1' -H 'Sec-Fetch-Dest: document' -H 'Sec-Fetch-Mode: navigate' -H 'Sec-Fetch-Site: cross-site' -H 'Sec-Fetch-User: ?1' -H 'TE: trailers' --compressed --globoff "$@"
|
||||
./mad.sh:1368:install_curl_impersonate() {
|
||||
./mad.sh:1370: echo -e "${BLUE}lwthiker curl_impersonate${NC} is the original dev, but it is relatively inactive."
|
||||
./mad.sh:1371: echo -e "- Currently uses curl v8.1.1."
|
||||
./mad.sh:1375: echo -e "${BLUE}lexiforest curl_impersonate${NC} is an active fork of curl_impersonate."
|
||||
./mad.sh:1376: echo -e "+ Currently uses curl v8.7.1"
|
||||
./mad.sh:1380: PS3='Please select which curl_impersonate to install: '
|
||||
./mad.sh:1388: install_curl_impersonate_lwthiker_orig
|
||||
./mad.sh:1392: install_curl_impersonate_lexiforest_fork
|
||||
./mad.sh:1402:install_curl_impersonate_lwthiker_orig() {
|
||||
./mad.sh:1406: echo -e "${BLUE}lwthiker curl_impersonate${NC} is the original curl_impersonate."
|
||||
./mad.sh:1407: echo -e "+ Currently uses curl v8.1.1, and has low activity for updates"
|
||||
./mad.sh:1410: echo -e "${GREEN}| Fetching:${NC} latest ${BLUE}lwthiker curl_impersonate${NC} info from github...${NC}"
|
||||
./mad.sh:1413: response=$(tor_curl_request --insecure -L -s https://github.com/lwthiker/curl-impersonate/releases/latest)
|
||||
./mad.sh:1415: debugHtml "github" "lbf_inst_curlimp$j" "$response"
|
||||
./mad.sh:1418: latestTag=$(grep -oPi -m 1 '(?<=/curl-impersonate/releases/tag/).*?(?=")' <<< "$response")
|
||||
./mad.sh:1428: yes_or_no "Do you wish to download and extract curl_impersonate $latestTag (using tor+curl)?" && {
|
||||
./mad.sh:1430: download_url='https://github.com/lwthiker/curl-impersonate/releases/download/'"$latestTag"'/curl-impersonate-'"$latestTag"'.x86_64-linux-gnu.tar.gz'
|
||||
./mad.sh:1433: file_header=$(tor_curl_request --insecure --head -Ls "$download_url")
|
||||
./mad.sh:1435: debugHtml "github" "head_inst_curlimp$j" "${file_header}"
|
||||
./mad.sh:1483: tor_curl_request --insecure -L "$download_url" --continue-at - --output "$file_path"
|
||||
./mad.sh:1512: echo -e "| Extracting curl_impersonate..."
|
||||
./mad.sh:1514: rm -f "${ScriptDir}"/curl*
|
||||
./mad.sh:1515: mv "$extract_location/curl-impersonate-ff" "${ScriptDir}/"
|
||||
./mad.sh:1516: mv "$extract_location/curl_ff109" "${ScriptDir}/"
|
||||
./mad.sh:1517: echo -e "${GREEN}| Done.${NC} Update ${BLUE}\"UseTorCurlImpersonate=true\"${NC} in script to use..."
|
||||
./mad.sh:1525:install_curl_impersonate_lexiforest_fork() {
|
||||
./mad.sh:1529: echo -e "${BLUE}lexiforest curl_impersonate${NC} is an active fork of curl_impersonate."
|
||||
./mad.sh:1530: echo -e "+ Currently uses curl v8.7.1, and is patched for latest CVEs"
|
||||
./mad.sh:1533: echo -e "${GREEN}| Fetching:${NC} latest ${BLUE}lexiforest curl_impersonate fork${NC} info from github...${NC}"
|
||||
./mad.sh:1536: response=$(tor_curl_request --insecure -L -s https://github.com/lexiforest/curl-impersonate/releases/latest)
|
||||
./mad.sh:1538: debugHtml "github" "lbf_inst_curlimp$j" "$response"
|
||||
./mad.sh:1541: latestTag=$(grep -oPi -m 1 '(?<=/curl-impersonate/releases/tag/).*?(?=")' <<< "$response")
|
||||
./mad.sh:1551: yes_or_no "Do you wish to download and extract curl_impersonate $latestTag (using tor+curl)?" && {
|
||||
./mad.sh:1553: download_url='https://github.com/lexiforest/curl-impersonate/releases/download/'"$latestTag"'/curl-impersonate-'"$latestTag"'.x86_64-linux-gnu.tar.gz'
|
||||
./mad.sh:1556: file_header=$(tor_curl_request --insecure --head -Ls "$download_url")
|
||||
./mad.sh:1558: debugHtml "github" "head_inst_curlimp$j" "${file_header}"
|
||||
./mad.sh:1606: tor_curl_request --insecure -L "$download_url" --continue-at - --output "$file_path"
|
||||
./mad.sh:1635: echo -e "| Extracting curl_impersonate..."
|
||||
./mad.sh:1637: rm -f "${ScriptDir}"/curl*
|
||||
./mad.sh:1638: mv "$extract_location/curl-impersonate-chrome" "${ScriptDir}/"
|
||||
./mad.sh:1639: mv "$extract_location/curl_chrome131" "${ScriptDir}/"
|
||||
./mad.sh:1640: echo -e "${GREEN}| Done.${NC} Update ${BLUE}\"UseTorCurlImpersonate=true\"${NC} in script to use..."
|
||||
./mad.sh:1802: echo -e ":${NC} ${GREEN}MAD${PINK} Audit${NC} : Reports usage of http & curl in scripts${PINK}${BLD} :"
|
||||
./mad.sh:1810: maud_curl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep --color='always' -Ei 'curl')
|
||||
./mad.sh:1811: maud_torcurl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep -A 12 --color='always' -Ei 'tor_curl')
|
||||
./mad.sh:1820: echo -e "${PINK}MAD Audit of curl:${NC} (${GREEN}grep \"curl\"${NC})"
|
||||
./mad.sh:1822: echo -e "$maud_curl"
|
||||
./mad.sh:1824: echo -e "${PINK}MAD Audit of tor_curl (+12 lines after):${NC} (${GREEN}grep \"tor_curl\"${NC})"
|
||||
./mad.sh:1826: echo -e "$maud_torcurl"
|
||||
./mad.sh:1838: maud_curl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep --color='always' -Ei 'curl')
|
||||
./mad.sh:1839: maud_torcurl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep -A 12 --color='always' -Ei 'tor_curl')
|
||||
./mad.sh:1848: echo -e "${PINK}MAD Audit of curl:${NC} (${GREEN}grep \"curl \"${NC})"
|
||||
./mad.sh:1850: echo -e "$maud_curl"
|
||||
./mad.sh:1852: echo -e "${PINK}MAD Audit of tor_curl (+12 lines after):${NC} (${GREEN}grep \"tor_curl\"${NC})"
|
||||
./mad.sh:1854: echo -e "$maud_torcurl"
|
||||
./mad.sh:1860: maud_curl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep --color='always' -Ei 'curl')
|
||||
./mad.sh:1861: maud_torcurl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep -A 12 --color='always' -Ei 'tor_curl')
|
||||
./mad.sh:1870: echo -e "${PINK}MAD Audit of curl:${NC} (${GREEN}grep \"curl\"${NC})"
|
||||
./mad.sh:1872: echo -e "$maud_curl"
|
||||
./mad.sh:1874: echo -e "${PINK}MAD Audit of tor_curl (+12 lines after):${NC} (${GREEN}grep \"tor_curl\"${NC})"
|
||||
./mad.sh:1876: echo -e "$maud_torcurl"
|
||||
./mad.sh:2823: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
||||
./mad.sh:2824: printf "client: ${GREEN}Tor${NC} + ${BLUE}curl_impersonate${NC}\\n"
|
||||
./mad.sh:2826: printf "client: ${GREEN}Tor${NC} + ${GREEN}curl${NC}\\n"
|
||||
./mad.sh:2998: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
||||
./mad.sh:2999: printf "client: ${GREEN}Tor${NC} + ${BLUE}curl_impersonate${NC}\\n"
|
||||
./mad.sh:3001: printf "client: ${GREEN}Tor${NC} + ${GREEN}curl${NC}\\n"
|
||||
./mad.sh:3199: file_header=$(tor_curl_request --insecure -m 8 -s -D - -o /dev/null \
|
||||
./mad.sh:3206: file_header=$(tor_curl_request --insecure --head -H "Connection: keep-alive" -L -s -i "$download_url" |
|
||||
./mad.sh:3334: tor_curl_request --insecure -L --referer "$file_url" "$download_url" --output "$file_path"
|
||||
./mad.sh:3378: tor_curl_request --insecure -L --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval "$download_url" --continue-at - --output "$file_path"
|
||||
./mad.sh:3380: tor_curl_request --insecure -L --referer "$file_url" "$download_url" --continue-at - --output "$file_path"
|
||||
./mad.sh:3578: response=$(tor_curl_upload --insecure -i \
|
||||
./mad.sh:3649:if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
||||
./mad.sh:3650: curl_impersonate=()
|
||||
./mad.sh:3651: readarray -d $'' arrFiles < <(find "$ScriptDir" -maxdepth 1 -name "curl_*" -printf '%p\n' | sort -Vk1)
|
||||
./mad.sh:3652: bFoundCurlHeader=false
|
||||
./mad.sh:3656: curl_impersonate=($fil)
|
||||
./mad.sh:3657: bFoundCurlHeader=true
|
||||
./mad.sh:3661: if [ "$bFoundCurlHeader" == "false" ]; then
|
||||
./mad.sh:3662: echo -e "${RED}[ERROR] Missing dependency \"curl-impersonate\"!${NC}"
|
||||
./mad.sh:3665: echo -e "You'll need to download ${GREEN}\"curl-impersonate\"${NC}."
|
||||
./mad.sh:3668: echo -e "The latest binary can be obtained on GitHub, search for \"curl-impersonate\""
|
||||
./mad.sh:3670: echo -e " 1. Visit the page of curl-impersonate and add \"/releases/latest/\" at end of URL."
|
||||
./mad.sh:3674: echo -e " 4. Download archive ${GREEN}\"curl-impersonate-vX.Y.Z.x86_64-linux-gnu.tar.gz\"${YELLOW}."
|
||||
./mad.sh:3675: echo -e " 5. Extract files ${GREEN}\"curl-impersonate-ff\"${NC} and ${GREEN}\"curl_ff109\"${NC} next to this script."
|
||||
./mad.sh:3678: echo -e "run $0 install_curl_impersonate\\n"
|
||||
./mad.sh:3680: yes_or_no "Do you wish to download and extract latest curl_impersonate (using tor+curl)?" && {
|
||||
./mad.sh:3681: UseTorCurlImpersonate=false
|
||||
./mad.sh:3682: install_curl_impersonate
|
||||
./mad.sh:3766: echo -e "[${YELLOW}Install curl_impersonate${NC}]: Downloads the latest binary for curl_impersonate from github repo (3 choices)"
|
||||
./mad.sh:3767: printf " %s install_curl_impersonate\\n" "$0"
|
||||
./mad.sh:3845:elif [[ "$arg1" == "install_curl_impersonate" ]]; then
|
||||
./mad.sh:3846: install_curl_impersonate
|
||||
./mad.sh:3877:if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
||||
./mad.sh:3878: printf "client: ${GREEN}Tor${NC} + ${BLUE}curl_impersonate${NC}\\n"
|
||||
./mad.sh:3880: printf "client: ${GREEN}Tor${NC} + ${GREEN}curl${NC}\\n"
|
||||
./mad.sh:3585: response=$(tor_curl_upload --insecure -i \
|
||||
./mad.sh:3656:if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
||||
./mad.sh:3657: curl_impersonate=()
|
||||
./mad.sh:3658: readarray -d $'' arrFiles < <(find "$ScriptDir" -maxdepth 1 -name "curl_*" -printf '%p\n' | sort -Vk1)
|
||||
./mad.sh:3659: bFoundCurlHeader=false
|
||||
./mad.sh:3663: curl_impersonate=($fil)
|
||||
./mad.sh:3664: bFoundCurlHeader=true
|
||||
./mad.sh:3668: if [ "$bFoundCurlHeader" == "false" ]; then
|
||||
./mad.sh:3669: echo -e "${RED}[ERROR] Missing dependency \"curl-impersonate\"!${NC}"
|
||||
./mad.sh:3672: echo -e "You'll need to download ${GREEN}\"curl-impersonate\"${NC}."
|
||||
./mad.sh:3675: echo -e "The latest binary can be obtained on GitHub, search for \"curl-impersonate\""
|
||||
./mad.sh:3677: echo -e " 1. Visit the page of curl-impersonate and add \"/releases/latest/\" at end of URL."
|
||||
./mad.sh:3681: echo -e " 4. Download archive ${GREEN}\"curl-impersonate-vX.Y.Z.x86_64-linux-gnu.tar.gz\"${YELLOW}."
|
||||
./mad.sh:3682: echo -e " 5. Extract files ${GREEN}\"curl-impersonate-ff\"${NC} and ${GREEN}\"curl_ff109\"${NC} next to this script."
|
||||
./mad.sh:3685: echo -e "run $0 install_curl_impersonate\\n"
|
||||
./mad.sh:3687: yes_or_no "Do you wish to download and extract latest curl_impersonate (using tor+curl)?" && {
|
||||
./mad.sh:3688: UseTorCurlImpersonate=false
|
||||
./mad.sh:3689: install_curl_impersonate
|
||||
./mad.sh:3773: echo -e "[${YELLOW}Install curl_impersonate${NC}]: Downloads the latest binary for curl_impersonate from github repo (3 choices)"
|
||||
./mad.sh:3774: printf " %s install_curl_impersonate\\n" "$0"
|
||||
./mad.sh:3852:elif [[ "$arg1" == "install_curl_impersonate" ]]; then
|
||||
./mad.sh:3853: install_curl_impersonate
|
||||
./mad.sh:3884:if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
||||
./mad.sh:3885: printf "client: ${GREEN}Tor${NC} + ${BLUE}curl_impersonate${NC}\\n"
|
||||
./mad.sh:3887: printf "client: ${GREEN}Tor${NC} + ${GREEN}curl${NC}\\n"
|
||||
./plugins/pjscloud.sh:44: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
||||
./plugins/pjscloud.sh:45: response=$("${curl_impersonate[@]}" --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" \
|
||||
./plugins/pjscloud.sh:53: response=$(curl --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" \
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue