# 2025.02.25 - [mad + allhosts] Re-engineer BadHtml scan to only scan the first 10kb of downloaded partials
# 2025.02.24 - [pixeldrain] Update "The file is IP limited" response handling retry # 2025.02.22 - [blackcloud_onion] Add bcloud.onion download handling (url fixing) # 2025.02.21 - [anonfile] Update cdn link parsing to handle new subdomains # 2025.02.21 - [anonfile] Add download limit reached response handling # 2025.02.21 - [anonfile] Update file info retrieval (head no longer responds) # 2025.02.21 - [sendspace] Add sendspace.com as download host # 2025.02.21 - [oshi / up_oshi] Revert /nossl/ changes for oshi.at (clearnet)
This commit is contained in:
parent
6f338dec65
commit
83d17967d6
54 changed files with 1316 additions and 822 deletions
|
|
@ -1,4 +1,4 @@
|
|||
DateTime: 25.02.20
|
||||
DateTime: 25.02.24
|
||||
|
||||
Files:
|
||||
./hosts/1fichier.sh
|
||||
|
|
@ -11,6 +11,7 @@ Files:
|
|||
./hosts/ateasystems.sh
|
||||
./hosts/bedrive.sh
|
||||
./hosts/biteblob.sh
|
||||
./hosts/blackcloud_onion.sh
|
||||
./hosts/bowfile.sh
|
||||
./hosts/click.sh
|
||||
./hosts/cyssoux.sh
|
||||
|
|
@ -63,6 +64,7 @@ Files:
|
|||
./hosts/ramsgaard.sh
|
||||
./hosts/ranoz.sh
|
||||
./hosts/sendnow.sh
|
||||
./hosts/sendspace.sh
|
||||
./hosts/shareonline.sh
|
||||
./hosts/skrepr.sh
|
||||
./hosts/soyjak.sh
|
||||
|
|
@ -177,12 +179,11 @@ _________________________________________________________________________
|
|||
./hosts/anonfile.sh:186: response=$(tor_curl_request --insecure -L -s -X POST \
|
||||
./hosts/anonfile.sh:240: tor_curl_request --insecure -s "$captcha_img_url" --output "$tmp_captcha_img"
|
||||
./hosts/anonfile.sh:340: response=$(tor_curl_request --insecure -L -s -X POST \
|
||||
./hosts/anonfile.sh:453: file_header=$(tor_curl_request -i -s --head \
|
||||
./hosts/anonfile.sh:557: if [[ "${UseTorCurlImpersonate}" == "true" ]]; then
|
||||
./hosts/anonfile.sh:559: tor_curl_request --insecure \
|
||||
./hosts/anonfile.sh:565: tor_curl_request --insecure \
|
||||
./hosts/anonfile.sh:572: tor_curl_request --insecure \
|
||||
./hosts/anonfile.sh:589: tor_curl_request --insecure \
|
||||
./hosts/anonfile.sh:517: if [[ "${UseTorCurlImpersonate}" == "true" ]]; then
|
||||
./hosts/anonfile.sh:519: tor_curl_request --insecure \
|
||||
./hosts/anonfile.sh:525: tor_curl_request --insecure \
|
||||
./hosts/anonfile.sh:532: tor_curl_request --insecure \
|
||||
./hosts/anonfile.sh:549: tor_curl_request --insecure \
|
||||
./hosts/anonsharing.sh:91: response=$(tor_curl_request --insecure -i -s \
|
||||
./hosts/anonsharing.sh:150: file_header=$(tor_curl_request --insecure --head -L -i -s \
|
||||
./hosts/anonsharing.sh:158: file_header=$(tor_curl_request --insecure --head -H "Connection: keep-alive" -s -i \
|
||||
|
|
@ -204,8 +205,8 @@ _________________________________________________________________________
|
|||
./hosts/biteblob.sh:96: response=$(tor_curl_request --insecure -L -s "${fixed_url}")
|
||||
./hosts/biteblob.sh:144: file_header=$(tor_curl_request --insecure --head -L -s "$download_url")
|
||||
./hosts/biteblob.sh:227: tor_curl_request --insecure --referer "$file_url" "$download_url" --output "$file_path"
|
||||
./hosts/biteblob.sh:271: tor_curl_request --insecure --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval "$download_url" --continue-at - --output "$file_path"
|
||||
./hosts/biteblob.sh:273: tor_curl_request --insecure --referer "$file_url" "$download_url" --continue-at - --output "$file_path"
|
||||
./hosts/biteblob.sh:284: tor_curl_request --insecure --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval "$download_url" --continue-at - --output "$file_path"
|
||||
./hosts/biteblob.sh:286: tor_curl_request --insecure --referer "$file_url" "$download_url" --continue-at - --output "$file_path"
|
||||
./hosts/bowfile.sh:91: response=$(tor_curl_request --insecure -L -s -b "${bow_cookie_jar}" -c "${bow_cookie_jar}" \
|
||||
./hosts/bowfile.sh:143: response=$(tor_curl_request --insecure -s --head \
|
||||
./hosts/bowfile.sh:182: file_header=$(tor_curl_request --insecure -L -sS -i --head \
|
||||
|
|
@ -326,8 +327,8 @@ _________________________________________________________________________
|
|||
./hosts/isupload.sh:251: file_header=$(tor_curl_request --insecure --head -H "Connection: keep-alive" -L -s -i "$download_url" |
|
||||
./hosts/isupload.sh:263: file_header=$(tor_curl_request_extended --insecure --head -L -s "$download_url")
|
||||
./hosts/isupload.sh:355: tor_curl_request_extended --insecure -L "$download_url" --output "$file_path"
|
||||
./hosts/isupload.sh:399: tor_curl_request_extended --insecure -L --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval "$download_url" --continue-at - --output "$file_path"
|
||||
./hosts/isupload.sh:401: tor_curl_request_extended --insecure -L "$download_url" --continue-at - --output "$file_path"
|
||||
./hosts/isupload.sh:403: tor_curl_request_extended --insecure -L --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval "$download_url" --continue-at - --output "$file_path"
|
||||
./hosts/isupload.sh:405: tor_curl_request_extended --insecure -L "$download_url" --continue-at - --output "$file_path"
|
||||
./hosts/kraken.sh:104: PAGE=$(tor_curl_request --insecure --max-time "$ConnectTimeout" -s -L -c "${kraken_cookie_jar}" "${fixed_url}")
|
||||
./hosts/kraken.sh:169: down_request=$(tor_curl_request --insecure -L -s -b "${kraken_cookie_jar}" -c "${kraken_cookie_jar}" -F "token=${kraken_token}" "${kraken_action}")
|
||||
./hosts/kraken.sh:186: file_header=$(tor_curl_request --insecure --head -L -s -b "${kraken_cookie_jar}" -c "${kraken_cookie_jar}" --referer "$kraken_action" "$download_url")
|
||||
|
|
@ -341,16 +342,16 @@ _________________________________________________________________________
|
|||
./hosts/nippy.sh:188: file_header=$(tor_curl_request --insecure -L --head -s \
|
||||
./hosts/nippy.sh:299: tor_curl_request --insecure -L --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \
|
||||
./hosts/nippy.sh:302: tor_curl_request --insecure -L "$download_url" --continue-at - --output "$file_path"
|
||||
./hosts/oshi.sh:108: file_header=$(tor_curl_request --insecure --head -L -s --referer "$remote_url" "$download_url")
|
||||
./hosts/oshi.sh:202: tor_curl_request --insecure --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval --referer "$file_url" "$download_url" --continue-at - --output "$file_path"
|
||||
./hosts/oshi.sh:204: tor_curl_request --insecure --referer "$file_url" "$download_url" --continue-at - --output "$file_path"
|
||||
./hosts/oshi.sh:107: file_header=$(tor_curl_request --insecure --head -L -s --referer "$remote_url" "$download_url")
|
||||
./hosts/oshi.sh:201: tor_curl_request --insecure -L --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval --referer "$file_url" "$download_url" --continue-at - --output "$file_path"
|
||||
./hosts/oshi.sh:203: tor_curl_request --insecure -L --referer "$file_url" "$download_url" --continue-at - --output "$file_path"
|
||||
./hosts/pixeldrain.sh:94: response=$(tor_curl_request --insecure -L -s "https://pixeldrain.com/u/$fileid")
|
||||
./hosts/pixeldrain.sh:256: file_header=$(tor_curl_request --insecure --head -L -s --referer "$file_url" "$pdheadurl")
|
||||
./hosts/pixeldrain.sh:322: if [[ "${UseTorCurlImpersonate}" == "true" ]]; then
|
||||
./hosts/pixeldrain.sh:324: tor_curl_request --insecure \
|
||||
./hosts/pixeldrain.sh:328: tor_curl_request --insecure \
|
||||
./hosts/pixeldrain.sh:333: tor_curl_request --insecure \
|
||||
./hosts/pixeldrain.sh:342: tor_curl_request --insecure \
|
||||
./hosts/pixeldrain.sh:259: file_header=$(tor_curl_request --insecure --head -L -s --referer "$file_url" "$pdheadurl")
|
||||
./hosts/pixeldrain.sh:325: if [[ "${UseTorCurlImpersonate}" == "true" ]]; then
|
||||
./hosts/pixeldrain.sh:327: tor_curl_request --insecure \
|
||||
./hosts/pixeldrain.sh:331: tor_curl_request --insecure \
|
||||
./hosts/pixeldrain.sh:336: tor_curl_request --insecure \
|
||||
./hosts/pixeldrain.sh:345: tor_curl_request --insecure \
|
||||
./hosts/quax.sh:85: file_header=$(tor_curl_request --insecure --head -L -s "$download_url")
|
||||
./hosts/quax.sh:176: tor_curl_request --insecure --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval "$download_url" --continue-at - --output "$file_path"
|
||||
./hosts/quax.sh:178: tor_curl_request --insecure "$download_url" --continue-at - --output "$file_path"
|
||||
|
|
@ -361,14 +362,21 @@ _________________________________________________________________________
|
|||
./hosts/ranoz.sh:276: tor_curl_request --insecure -L -G --no-alpn \
|
||||
./hosts/ranoz.sh:281: tor_curl_request --insecure -L -G --no-alpn \
|
||||
./hosts/ranoz.sh:296: tor_curl_request --insecure -L -G --no-alpn \
|
||||
./hosts/sendnow.sh:90: response=$(tor_curl_request --insecure -L -s -b "${snow_cookie_jar}" -c "${snow_cookie_jar}" "$remote_url")
|
||||
./hosts/sendnow.sh:160: response=$(tor_curl_request --insecure -L -svo. -X POST \
|
||||
./hosts/sendnow.sh:204: file_header=$(tor_curl_request_extended --insecure --head -Lis \
|
||||
./hosts/sendnow.sh:325: if [[ "${UseTorCurlImpersonate}" == "true" ]]; then
|
||||
./hosts/sendnow.sh:327: tor_curl_request_extended --insecure -L --no-alpn \
|
||||
./hosts/sendnow.sh:345: tor_curl_request --insecure -L --no-alpn \
|
||||
./hosts/sendnow.sh:364: tor_curl_request --insecure -L --no-alpn \
|
||||
./hosts/sendnow.sh:383: tor_curl_request --insecure -L --no-alpn \
|
||||
./hosts/sendnow.sh:89: response=$(tor_curl_request --insecure -L -s -b "${snow_cookie_jar}" -c "${snow_cookie_jar}" "$remote_url")
|
||||
./hosts/sendnow.sh:162: response=$(tor_curl_request --insecure -L -svo. -X POST \
|
||||
./hosts/sendnow.sh:206: file_header=$(tor_curl_request_extended --insecure --head -Lis \
|
||||
./hosts/sendnow.sh:327: if [[ "${UseTorCurlImpersonate}" == "true" ]]; then
|
||||
./hosts/sendnow.sh:329: tor_curl_request_extended --insecure -L --no-alpn \
|
||||
./hosts/sendnow.sh:347: tor_curl_request --insecure -L --no-alpn \
|
||||
./hosts/sendnow.sh:366: tor_curl_request --insecure -L --no-alpn \
|
||||
./hosts/sendnow.sh:385: tor_curl_request --insecure -L --no-alpn \
|
||||
./hosts/sendspace.sh:90: response=$(tor_curl_request --insecure -L -s -b "${ss_cookie_jar}" -c "${ss_cookie_jar}" "$remote_url")
|
||||
./hosts/sendspace.sh:157: file_header=$(tor_curl_request --insecure -L --head -s \
|
||||
./hosts/sendspace.sh:273: if [[ "${UseTorCurlImpersonate}" == "true" ]]; then
|
||||
./hosts/sendspace.sh:275: tor_curl_request --insecure --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval "$download_url" --continue-at - --output "$file_path"
|
||||
./hosts/sendspace.sh:277: tor_curl_request --insecure "$download_url" --continue-at - --output "$file_path"
|
||||
./hosts/sendspace.sh:281: tor_curl_request --insecure --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \
|
||||
./hosts/sendspace.sh:296: tor_curl_request --insecure \
|
||||
./hosts/syspro.sh:88: response=$(tor_curl_request --insecure -L -s "$remote_url")
|
||||
./hosts/syspro.sh:186: if [[ "${UseTorCurlImpersonate}" == "true" ]]; then
|
||||
./hosts/syspro.sh:188: tor_curl_request --insecure -L \
|
||||
|
|
@ -487,119 +495,119 @@ _________________________________________________________________________
|
|||
./hosts/youdbox.sh:183: file_header=$(tor_curl_request --insecure -L --head -s --referer "${fixed_url}" "$download_url")
|
||||
./hosts/youdbox.sh:276: tor_curl_request --insecure -L -G --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval "$download_url" --continue-at - --output "$file_path"
|
||||
./hosts/youdbox.sh:278: tor_curl_request --insecure -L -G "$download_url" --continue-at - --output "$file_path"
|
||||
./mad.sh:98:UseTorCurlImpersonate=false
|
||||
./mad.sh:394:tor_curl_request() {
|
||||
./mad.sh:395: if [[ "${UseTorCurlImpersonate}" == "true" ]]; then
|
||||
./mad.sh:396: "${curl_impersonate[@]}" --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" -4 --connect-timeout ${ConnectTimeout} --compressed --globoff "$@"
|
||||
./mad.sh:398: curl --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" -4 --connect-timeout ${ConnectTimeout} --compressed --globoff "$@"
|
||||
./mad.sh:401:tor_curl_request_extended() {
|
||||
./mad.sh:91:UseTorCurlImpersonate=false
|
||||
./mad.sh:387:tor_curl_request() {
|
||||
./mad.sh:388: if [[ "${UseTorCurlImpersonate}" == "true" ]]; then
|
||||
./mad.sh:389: "${curl_impersonate[@]}" --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" -4 --connect-timeout ${ConnectTimeout} --compressed --globoff "$@"
|
||||
./mad.sh:391: curl --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" -4 --connect-timeout ${ConnectTimeout} --compressed --globoff "$@"
|
||||
./mad.sh:394:tor_curl_request_extended() {
|
||||
./mad.sh:396: if [[ "${UseTorCurlImpersonate}" == "true" ]]; then
|
||||
./mad.sh:397: "${curl_impersonate[@]}" --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" -4 --connect-timeout $randomtimeout --compressed --globoff "$@"
|
||||
./mad.sh:399: curl --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" -4 --connect-timeout $randomtimeout --compressed --globoff "$@"
|
||||
./mad.sh:402:tor_curl_upload() {
|
||||
./mad.sh:403: if [[ "${UseTorCurlImpersonate}" == "true" ]]; then
|
||||
./mad.sh:404: "${curl_impersonate[@]}" --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" -4 --connect-timeout $randomtimeout --compressed --globoff "$@"
|
||||
./mad.sh:406: curl --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" -4 --connect-timeout $randomtimeout --compressed --globoff "$@"
|
||||
./mad.sh:409:tor_curl_upload() {
|
||||
./mad.sh:410: if [[ "${UseTorCurlImpersonate}" == "true" ]]; then
|
||||
./mad.sh:412: "${curl_impersonate[@]}" --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" -4 --connect-timeout ${ConnectTimeoutUpload} --speed-limit $UploadSpeedMin --speed-time $UploadTimeoutInterval --compressed --globoff "$@"
|
||||
./mad.sh:414: "${curl_impersonate[@]}" --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" -4 --connect-timeout ${ConnectTimeoutUpload} --compressed --globoff "$@"
|
||||
./mad.sh:418: curl --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" -4 --connect-timeout ${ConnectTimeoutUpload} --speed-limit $UploadSpeedMin --speed-time $UploadTimeoutInterval -H 'User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:109.0) Gecko/20100101 Firefox/115.0' -H 'Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8' -H 'Accept-Language: en-US,en;q=0.5' -H 'Accept-Encoding: gzip, deflate, br' -H 'Origin: null' -H 'Connection: keep-alive' -H 'Upgrade-Insecure-Requests: 1' -H 'Sec-Fetch-Dest: document' -H 'Sec-Fetch-Mode: navigate' -H 'Sec-Fetch-Site: cross-site' -H 'Sec-Fetch-User: ?1' -H 'TE: trailers' --compressed --globoff "$@"
|
||||
./mad.sh:420: curl --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" -4 --connect-timeout ${ConnectTimeoutUpload} -H 'User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:109.0) Gecko/20100101 Firefox/115.0' -H 'Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8' -H 'Accept-Language: en-US,en;q=0.5' -H 'Accept-Encoding: gzip, deflate, br' -H 'Origin: null' -H 'Connection: keep-alive' -H 'Upgrade-Insecure-Requests: 1' -H 'Sec-Fetch-Dest: document' -H 'Sec-Fetch-Mode: navigate' -H 'Sec-Fetch-Site: cross-site' -H 'Sec-Fetch-User: ?1' -H 'TE: trailers' --compressed --globoff "$@"
|
||||
./mad.sh:1421:install_curl_impersonate() {
|
||||
./mad.sh:1423: echo -e "${BLUE}lwthiker curl_impersonate${NC} is the original dev, but it is relatively inactive."
|
||||
./mad.sh:1424: echo -e "- Currently uses curl v8.1.1."
|
||||
./mad.sh:1428: echo -e "${BLUE}lexiforest curl_impersonate${NC} is an active fork of curl_impersonate."
|
||||
./mad.sh:1429: echo -e "+ Currently uses curl v8.7.1"
|
||||
./mad.sh:1433: PS3='Please select which curl_impersonate to install: '
|
||||
./mad.sh:1441: install_curl_impersonate_lwthiker_orig
|
||||
./mad.sh:1445: install_curl_impersonate_lexiforest_fork
|
||||
./mad.sh:1455:install_curl_impersonate_lwthiker_orig() {
|
||||
./mad.sh:1459: echo -e "${BLUE}lwthiker curl_impersonate${NC} is the original curl_impersonate."
|
||||
./mad.sh:1460: echo -e "+ Currently uses curl v8.1.1, and has low activity for updates"
|
||||
./mad.sh:1463: echo -e "${GREEN}| Fetching:${NC} latest ${BLUE}lwthiker curl_impersonate${NC} info from github...${NC}"
|
||||
./mad.sh:1466: response=$(tor_curl_request --insecure -L -s https://github.com/lwthiker/curl-impersonate/releases/latest)
|
||||
./mad.sh:1468: debugHtml "github" "lbf_inst_curlimp$j" "$response"
|
||||
./mad.sh:1471: latestTag=$(grep -oPi -m 1 '(?<=/curl-impersonate/releases/tag/).*?(?=")' <<< "$response")
|
||||
./mad.sh:1481: yes_or_no "Do you wish to download and extract curl_impersonate $latestTag (using tor+curl)?" && {
|
||||
./mad.sh:1483: download_url='https://github.com/lwthiker/curl-impersonate/releases/download/'"$latestTag"'/curl-impersonate-'"$latestTag"'.x86_64-linux-gnu.tar.gz'
|
||||
./mad.sh:1486: file_header=$(tor_curl_request --insecure --head -Ls "$download_url")
|
||||
./mad.sh:1488: debugHtml "github" "head_inst_curlimp$j" "${file_header}"
|
||||
./mad.sh:1536: tor_curl_request --insecure -L "$download_url" --continue-at - --output "$file_path"
|
||||
./mad.sh:1565: echo -e "| Extracting curl_impersonate..."
|
||||
./mad.sh:1567: rm -f "${ScriptDir}"/curl*
|
||||
./mad.sh:1568: mv "$extract_location/curl-impersonate-ff" "${ScriptDir}/"
|
||||
./mad.sh:1569: mv "$extract_location/curl_ff109" "${ScriptDir}/"
|
||||
./mad.sh:1570: echo -e "${GREEN}| Done.${NC} Update ${BLUE}\"UseTorCurlImpersonate=true\"${NC} in script to use..."
|
||||
./mad.sh:1578:install_curl_impersonate_lexiforest_fork() {
|
||||
./mad.sh:1582: echo -e "${BLUE}lexiforest curl_impersonate${NC} is an active fork of curl_impersonate."
|
||||
./mad.sh:1583: echo -e "+ Currently uses curl v8.7.1, and is patched for latest CVEs"
|
||||
./mad.sh:1586: echo -e "${GREEN}| Fetching:${NC} latest ${BLUE}lexiforest curl_impersonate fork${NC} info from github...${NC}"
|
||||
./mad.sh:1589: response=$(tor_curl_request --insecure -L -s https://github.com/lexiforest/curl-impersonate/releases/latest)
|
||||
./mad.sh:1591: debugHtml "github" "lbf_inst_curlimp$j" "$response"
|
||||
./mad.sh:1594: latestTag=$(grep -oPi -m 1 '(?<=/curl-impersonate/releases/tag/).*?(?=")' <<< "$response")
|
||||
./mad.sh:1604: yes_or_no "Do you wish to download and extract curl_impersonate $latestTag (using tor+curl)?" && {
|
||||
./mad.sh:1606: download_url='https://github.com/lexiforest/curl-impersonate/releases/download/'"$latestTag"'/curl-impersonate-'"$latestTag"'.x86_64-linux-gnu.tar.gz'
|
||||
./mad.sh:1609: file_header=$(tor_curl_request --insecure --head -Ls "$download_url")
|
||||
./mad.sh:1611: debugHtml "github" "head_inst_curlimp$j" "${file_header}"
|
||||
./mad.sh:1659: tor_curl_request --insecure -L "$download_url" --continue-at - --output "$file_path"
|
||||
./mad.sh:1688: echo -e "| Extracting curl_impersonate..."
|
||||
./mad.sh:1690: rm -f "${ScriptDir}"/curl*
|
||||
./mad.sh:1691: mv "$extract_location/curl-impersonate-chrome" "${ScriptDir}/"
|
||||
./mad.sh:1692: mv "$extract_location/curl_chrome131" "${ScriptDir}/"
|
||||
./mad.sh:1693: echo -e "${GREEN}| Done.${NC} Update ${BLUE}\"UseTorCurlImpersonate=true\"${NC} in script to use..."
|
||||
./mad.sh:1855: echo -e ":${NC} ${GREEN}MAD${PINK} Audit${NC} : Reports usage of http & curl in scripts${PINK}${BLD} :"
|
||||
./mad.sh:1863: maud_curl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep --color='always' -Ei 'curl')
|
||||
./mad.sh:1864: maud_torcurl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep -A 12 --color='always' -Ei 'tor_curl')
|
||||
./mad.sh:1873: echo -e "${PINK}MAD Audit of curl:${NC} (${GREEN}grep \"curl\"${NC})"
|
||||
./mad.sh:1875: echo -e "$maud_curl"
|
||||
./mad.sh:1877: echo -e "${PINK}MAD Audit of tor_curl (+12 lines after):${NC} (${GREEN}grep \"tor_curl\"${NC})"
|
||||
./mad.sh:1879: echo -e "$maud_torcurl"
|
||||
./mad.sh:1891: maud_curl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep --color='always' -Ei 'curl')
|
||||
./mad.sh:1892: maud_torcurl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep -A 12 --color='always' -Ei 'tor_curl')
|
||||
./mad.sh:1901: echo -e "${PINK}MAD Audit of curl:${NC} (${GREEN}grep \"curl \"${NC})"
|
||||
./mad.sh:1903: echo -e "$maud_curl"
|
||||
./mad.sh:1905: echo -e "${PINK}MAD Audit of tor_curl (+12 lines after):${NC} (${GREEN}grep \"tor_curl\"${NC})"
|
||||
./mad.sh:1907: echo -e "$maud_torcurl"
|
||||
./mad.sh:1913: maud_curl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep --color='always' -Ei 'curl')
|
||||
./mad.sh:1914: maud_torcurl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep -A 12 --color='always' -Ei 'tor_curl')
|
||||
./mad.sh:1923: echo -e "${PINK}MAD Audit of curl:${NC} (${GREEN}grep \"curl\"${NC})"
|
||||
./mad.sh:1925: echo -e "$maud_curl"
|
||||
./mad.sh:1927: echo -e "${PINK}MAD Audit of tor_curl (+12 lines after):${NC} (${GREEN}grep \"tor_curl\"${NC})"
|
||||
./mad.sh:1929: echo -e "$maud_torcurl"
|
||||
./mad.sh:2876: if [[ "${UseTorCurlImpersonate}" == "true" ]]; then
|
||||
./mad.sh:2877: printf "client: ${GREEN}Tor${NC} + ${BLUE}curl_impersonate${NC}\\n"
|
||||
./mad.sh:2879: printf "client: ${GREEN}Tor${NC} + ${GREEN}curl${NC}\\n"
|
||||
./mad.sh:3051: if [[ "${UseTorCurlImpersonate}" == "true" ]]; then
|
||||
./mad.sh:3052: printf "client: ${GREEN}Tor${NC} + ${BLUE}curl_impersonate${NC}\\n"
|
||||
./mad.sh:3054: printf "client: ${GREEN}Tor${NC} + ${GREEN}curl${NC}\\n"
|
||||
./mad.sh:3252: file_header=$(tor_curl_request --insecure -m 8 -s -D - -o /dev/null \
|
||||
./mad.sh:3259: file_header=$(tor_curl_request --insecure --head -H "Connection: keep-alive" -L -s -i "$download_url" |
|
||||
./mad.sh:3396: tor_curl_request --insecure -L --referer "$file_url" "$download_url" --output "$file_path"
|
||||
./mad.sh:3449: tor_curl_request --insecure -L --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval "$download_url" --continue-at - --output "$file_path"
|
||||
./mad.sh:3451: tor_curl_request --insecure -L --referer "$file_url" "$download_url" --continue-at - --output "$file_path"
|
||||
./mad.sh:3649: response=$(tor_curl_upload --insecure -i \
|
||||
./mad.sh:3656: response=$(tor_curl_upload --insecure -i \
|
||||
./mad.sh:3727:if [[ "${UseTorCurlImpersonate}" == "true" ]]; then
|
||||
./mad.sh:3728: curl_impersonate=()
|
||||
./mad.sh:3729: readarray -d $'' arrFiles < <(find "$ScriptDir" -maxdepth 1 -name "curl_*" -printf '%p\n' | sort -Vk1)
|
||||
./mad.sh:3730: bFoundCurlHeader=false
|
||||
./mad.sh:3734: curl_impersonate=($fil)
|
||||
./mad.sh:3735: bFoundCurlHeader=true
|
||||
./mad.sh:3739: if [[ "$bFoundCurlHeader" == "false" ]]; then
|
||||
./mad.sh:3740: echo -e "${RED}[ERROR] Missing dependency \"curl-impersonate\"!${NC}"
|
||||
./mad.sh:3743: echo -e "You'll need to download ${GREEN}\"curl-impersonate\"${NC}."
|
||||
./mad.sh:3746: echo -e "The latest binary can be obtained on GitHub, search for \"curl-impersonate\""
|
||||
./mad.sh:3748: echo -e " 1. Visit the page of curl-impersonate and add \"/releases/latest/\" at end of URL."
|
||||
./mad.sh:3752: echo -e " 4. Download archive ${GREEN}\"curl-impersonate-vX.Y.Z.x86_64-linux-gnu.tar.gz\"${YELLOW}."
|
||||
./mad.sh:3753: echo -e " 5. Extract files ${GREEN}\"curl-impersonate-ff\"${NC} and ${GREEN}\"curl_ff109\"${NC} next to this script."
|
||||
./mad.sh:3756: echo -e "run $0 install_curl_impersonate\\n"
|
||||
./mad.sh:3758: yes_or_no "Do you wish to download and extract latest curl_impersonate (using tor+curl)?" && {
|
||||
./mad.sh:3759: UseTorCurlImpersonate=false
|
||||
./mad.sh:3760: install_curl_impersonate
|
||||
./mad.sh:3844: echo -e "[${YELLOW}Install curl_impersonate${NC}]: Downloads the latest binary for curl_impersonate from github repo (3 choices)"
|
||||
./mad.sh:3845: printf " %s install_curl_impersonate\\n" "$0"
|
||||
./mad.sh:3923:elif [[ "$arg1" == "install_curl_impersonate" ]]; then
|
||||
./mad.sh:3924: install_curl_impersonate
|
||||
./mad.sh:3955:if [[ "${UseTorCurlImpersonate}" == "true" ]]; then
|
||||
./mad.sh:3956: printf "client: ${GREEN}Tor${NC} + ${BLUE}curl_impersonate${NC}\\n"
|
||||
./mad.sh:3958: printf "client: ${GREEN}Tor${NC} + ${GREEN}curl${NC}\\n"
|
||||
./mad.sh:405: "${curl_impersonate[@]}" --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" -4 --connect-timeout ${ConnectTimeoutUpload} --speed-limit $UploadSpeedMin --speed-time $UploadTimeoutInterval --compressed --globoff "$@"
|
||||
./mad.sh:407: "${curl_impersonate[@]}" --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" -4 --connect-timeout ${ConnectTimeoutUpload} --compressed --globoff "$@"
|
||||
./mad.sh:411: curl --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" -4 --connect-timeout ${ConnectTimeoutUpload} --speed-limit $UploadSpeedMin --speed-time $UploadTimeoutInterval -H 'User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:109.0) Gecko/20100101 Firefox/115.0' -H 'Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8' -H 'Accept-Language: en-US,en;q=0.5' -H 'Accept-Encoding: gzip, deflate, br' -H 'Origin: null' -H 'Connection: keep-alive' -H 'Upgrade-Insecure-Requests: 1' -H 'Sec-Fetch-Dest: document' -H 'Sec-Fetch-Mode: navigate' -H 'Sec-Fetch-Site: cross-site' -H 'Sec-Fetch-User: ?1' -H 'TE: trailers' --compressed --globoff "$@"
|
||||
./mad.sh:413: curl --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" -4 --connect-timeout ${ConnectTimeoutUpload} -H 'User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:109.0) Gecko/20100101 Firefox/115.0' -H 'Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8' -H 'Accept-Language: en-US,en;q=0.5' -H 'Accept-Encoding: gzip, deflate, br' -H 'Origin: null' -H 'Connection: keep-alive' -H 'Upgrade-Insecure-Requests: 1' -H 'Sec-Fetch-Dest: document' -H 'Sec-Fetch-Mode: navigate' -H 'Sec-Fetch-Site: cross-site' -H 'Sec-Fetch-User: ?1' -H 'TE: trailers' --compressed --globoff "$@"
|
||||
./mad.sh:1415:install_curl_impersonate() {
|
||||
./mad.sh:1417: echo -e "${BLUE}lwthiker curl_impersonate${NC} is the original dev, but it is relatively inactive."
|
||||
./mad.sh:1418: echo -e "- Currently uses curl v8.1.1."
|
||||
./mad.sh:1422: echo -e "${BLUE}lexiforest curl_impersonate${NC} is an active fork of curl_impersonate."
|
||||
./mad.sh:1423: echo -e "+ Currently uses curl v8.7.1"
|
||||
./mad.sh:1427: PS3='Please select which curl_impersonate to install: '
|
||||
./mad.sh:1435: install_curl_impersonate_lwthiker_orig
|
||||
./mad.sh:1439: install_curl_impersonate_lexiforest_fork
|
||||
./mad.sh:1449:install_curl_impersonate_lwthiker_orig() {
|
||||
./mad.sh:1453: echo -e "${BLUE}lwthiker curl_impersonate${NC} is the original curl_impersonate."
|
||||
./mad.sh:1454: echo -e "+ Currently uses curl v8.1.1, and has low activity for updates"
|
||||
./mad.sh:1457: echo -e "${GREEN}| Fetching:${NC} latest ${BLUE}lwthiker curl_impersonate${NC} info from github...${NC}"
|
||||
./mad.sh:1460: response=$(tor_curl_request --insecure -L -s https://github.com/lwthiker/curl-impersonate/releases/latest)
|
||||
./mad.sh:1462: debugHtml "github" "lbf_inst_curlimp$j" "$response"
|
||||
./mad.sh:1465: latestTag=$(grep -oPi -m 1 '(?<=/curl-impersonate/releases/tag/).*?(?=")' <<< "$response")
|
||||
./mad.sh:1475: yes_or_no "Do you wish to download and extract curl_impersonate $latestTag (using tor+curl)?" && {
|
||||
./mad.sh:1477: download_url='https://github.com/lwthiker/curl-impersonate/releases/download/'"$latestTag"'/curl-impersonate-'"$latestTag"'.x86_64-linux-gnu.tar.gz'
|
||||
./mad.sh:1480: file_header=$(tor_curl_request --insecure --head -Ls "$download_url")
|
||||
./mad.sh:1482: debugHtml "github" "head_inst_curlimp$j" "${file_header}"
|
||||
./mad.sh:1530: tor_curl_request --insecure -L "$download_url" --continue-at - --output "$file_path"
|
||||
./mad.sh:1559: echo -e "| Extracting curl_impersonate..."
|
||||
./mad.sh:1561: rm -f "${ScriptDir}"/curl*
|
||||
./mad.sh:1562: mv "$extract_location/curl-impersonate-ff" "${ScriptDir}/"
|
||||
./mad.sh:1563: mv "$extract_location/curl_ff109" "${ScriptDir}/"
|
||||
./mad.sh:1564: echo -e "${GREEN}| Done.${NC} Update ${BLUE}\"UseTorCurlImpersonate=true\"${NC} in script to use..."
|
||||
./mad.sh:1572:install_curl_impersonate_lexiforest_fork() {
|
||||
./mad.sh:1576: echo -e "${BLUE}lexiforest curl_impersonate${NC} is an active fork of curl_impersonate."
|
||||
./mad.sh:1577: echo -e "+ Currently uses curl v8.7.1, and is patched for latest CVEs"
|
||||
./mad.sh:1580: echo -e "${GREEN}| Fetching:${NC} latest ${BLUE}lexiforest curl_impersonate fork${NC} info from github...${NC}"
|
||||
./mad.sh:1583: response=$(tor_curl_request --insecure -L -s https://github.com/lexiforest/curl-impersonate/releases/latest)
|
||||
./mad.sh:1585: debugHtml "github" "lbf_inst_curlimp$j" "$response"
|
||||
./mad.sh:1588: latestTag=$(grep -oPi -m 1 '(?<=/curl-impersonate/releases/tag/).*?(?=")' <<< "$response")
|
||||
./mad.sh:1598: yes_or_no "Do you wish to download and extract curl_impersonate $latestTag (using tor+curl)?" && {
|
||||
./mad.sh:1600: download_url='https://github.com/lexiforest/curl-impersonate/releases/download/'"$latestTag"'/curl-impersonate-'"$latestTag"'.x86_64-linux-gnu.tar.gz'
|
||||
./mad.sh:1603: file_header=$(tor_curl_request --insecure --head -Ls "$download_url")
|
||||
./mad.sh:1605: debugHtml "github" "head_inst_curlimp$j" "${file_header}"
|
||||
./mad.sh:1653: tor_curl_request --insecure -L "$download_url" --continue-at - --output "$file_path"
|
||||
./mad.sh:1682: echo -e "| Extracting curl_impersonate..."
|
||||
./mad.sh:1684: rm -f "${ScriptDir}"/curl*
|
||||
./mad.sh:1685: mv "$extract_location/curl-impersonate-chrome" "${ScriptDir}/"
|
||||
./mad.sh:1686: mv "$extract_location/curl_chrome131" "${ScriptDir}/"
|
||||
./mad.sh:1687: echo -e "${GREEN}| Done.${NC} Update ${BLUE}\"UseTorCurlImpersonate=true\"${NC} in script to use..."
|
||||
./mad.sh:1849: echo -e ":${NC} ${GREEN}MAD${PINK} Audit${NC} : Reports usage of http & curl in scripts${PINK}${BLD} :"
|
||||
./mad.sh:1857: maud_curl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep --color='always' -Ei 'curl')
|
||||
./mad.sh:1858: maud_torcurl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep -A 12 --color='always' -Ei 'tor_curl')
|
||||
./mad.sh:1867: echo -e "${PINK}MAD Audit of curl:${NC} (${GREEN}grep \"curl\"${NC})"
|
||||
./mad.sh:1869: echo -e "$maud_curl"
|
||||
./mad.sh:1871: echo -e "${PINK}MAD Audit of tor_curl (+12 lines after):${NC} (${GREEN}grep \"tor_curl\"${NC})"
|
||||
./mad.sh:1873: echo -e "$maud_torcurl"
|
||||
./mad.sh:1885: maud_curl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep --color='always' -Ei 'curl')
|
||||
./mad.sh:1886: maud_torcurl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep -A 12 --color='always' -Ei 'tor_curl')
|
||||
./mad.sh:1895: echo -e "${PINK}MAD Audit of curl:${NC} (${GREEN}grep \"curl \"${NC})"
|
||||
./mad.sh:1897: echo -e "$maud_curl"
|
||||
./mad.sh:1899: echo -e "${PINK}MAD Audit of tor_curl (+12 lines after):${NC} (${GREEN}grep \"tor_curl\"${NC})"
|
||||
./mad.sh:1901: echo -e "$maud_torcurl"
|
||||
./mad.sh:1907: maud_curl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep --color='always' -Ei 'curl')
|
||||
./mad.sh:1908: maud_torcurl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep -A 12 --color='always' -Ei 'tor_curl')
|
||||
./mad.sh:1917: echo -e "${PINK}MAD Audit of curl:${NC} (${GREEN}grep \"curl\"${NC})"
|
||||
./mad.sh:1919: echo -e "$maud_curl"
|
||||
./mad.sh:1921: echo -e "${PINK}MAD Audit of tor_curl (+12 lines after):${NC} (${GREEN}grep \"tor_curl\"${NC})"
|
||||
./mad.sh:1923: echo -e "$maud_torcurl"
|
||||
./mad.sh:2878: if [[ "${UseTorCurlImpersonate}" == "true" ]]; then
|
||||
./mad.sh:2879: printf "client: ${GREEN}Tor${NC} + ${BLUE}curl_impersonate${NC}\\n"
|
||||
./mad.sh:2881: printf "client: ${GREEN}Tor${NC} + ${GREEN}curl${NC}\\n"
|
||||
./mad.sh:3053: if [[ "${UseTorCurlImpersonate}" == "true" ]]; then
|
||||
./mad.sh:3054: printf "client: ${GREEN}Tor${NC} + ${BLUE}curl_impersonate${NC}\\n"
|
||||
./mad.sh:3056: printf "client: ${GREEN}Tor${NC} + ${GREEN}curl${NC}\\n"
|
||||
./mad.sh:3254: file_header=$(tor_curl_request --insecure -m 8 -s -D - -o /dev/null \
|
||||
./mad.sh:3261: file_header=$(tor_curl_request --insecure --head -H "Connection: keep-alive" -L -s -i "$download_url" |
|
||||
./mad.sh:3398: tor_curl_request --insecure -L --referer "$file_url" "$download_url" --output "$file_path"
|
||||
./mad.sh:3455: tor_curl_request --insecure -L --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval "$download_url" --continue-at - --output "$file_path"
|
||||
./mad.sh:3457: tor_curl_request --insecure -L --referer "$file_url" "$download_url" --continue-at - --output "$file_path"
|
||||
./mad.sh:3655: response=$(tor_curl_upload --insecure -i \
|
||||
./mad.sh:3662: response=$(tor_curl_upload --insecure -i \
|
||||
./mad.sh:3733:if [[ "${UseTorCurlImpersonate}" == "true" ]]; then
|
||||
./mad.sh:3734: curl_impersonate=()
|
||||
./mad.sh:3735: readarray -d $'' arrFiles < <(find "$ScriptDir" -maxdepth 1 -name "curl_*" -printf '%p\n' | sort -Vk1)
|
||||
./mad.sh:3736: bFoundCurlHeader=false
|
||||
./mad.sh:3740: curl_impersonate=($fil)
|
||||
./mad.sh:3741: bFoundCurlHeader=true
|
||||
./mad.sh:3745: if [[ "$bFoundCurlHeader" == "false" ]]; then
|
||||
./mad.sh:3746: echo -e "${RED}[ERROR] Missing dependency \"curl-impersonate\"!${NC}"
|
||||
./mad.sh:3749: echo -e "You'll need to download ${GREEN}\"curl-impersonate\"${NC}."
|
||||
./mad.sh:3752: echo -e "The latest binary can be obtained on GitHub, search for \"curl-impersonate\""
|
||||
./mad.sh:3754: echo -e " 1. Visit the page of curl-impersonate and add \"/releases/latest/\" at end of URL."
|
||||
./mad.sh:3758: echo -e " 4. Download archive ${GREEN}\"curl-impersonate-vX.Y.Z.x86_64-linux-gnu.tar.gz\"${YELLOW}."
|
||||
./mad.sh:3759: echo -e " 5. Extract files ${GREEN}\"curl-impersonate-ff\"${NC} and ${GREEN}\"curl_ff109\"${NC} next to this script."
|
||||
./mad.sh:3762: echo -e "run $0 install_curl_impersonate\\n"
|
||||
./mad.sh:3764: yes_or_no "Do you wish to download and extract latest curl_impersonate (using tor+curl)?" && {
|
||||
./mad.sh:3765: UseTorCurlImpersonate=false
|
||||
./mad.sh:3766: install_curl_impersonate
|
||||
./mad.sh:3850: echo -e "[${YELLOW}Install curl_impersonate${NC}]: Downloads the latest binary for curl_impersonate from github repo (3 choices)"
|
||||
./mad.sh:3851: printf " %s install_curl_impersonate\\n" "$0"
|
||||
./mad.sh:3929:elif [[ "$arg1" == "install_curl_impersonate" ]]; then
|
||||
./mad.sh:3930: install_curl_impersonate
|
||||
./mad.sh:3961:if [[ "${UseTorCurlImpersonate}" == "true" ]]; then
|
||||
./mad.sh:3962: printf "client: ${GREEN}Tor${NC} + ${BLUE}curl_impersonate${NC}\\n"
|
||||
./mad.sh:3964: printf "client: ${GREEN}Tor${NC} + ${GREEN}curl${NC}\\n"
|
||||
./plugins/pjscloud.sh:44: if [[ "${UseTorCurlImpersonate}" == "true" ]]; then
|
||||
./plugins/pjscloud.sh:45: response=$("${curl_impersonate[@]}" --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" \
|
||||
./plugins/pjscloud.sh:53: response=$(curl --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" \
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue