# 2025.02.14 - [mad] Add helpful verbiage for user on MAD Randomized Extension upload urls
# 2025.02.14 - [up_ranoz] Add help "[rand ext, rename to <filename> or use MAD v2025.02.13+]" to url # 2025.02.14 - [up_uploadhive] Add help "[rand ext, rename to <filename> or use MAD v2025.02.13+]" to url # 2025.02.13 - [mad] Add "RanozRandomizeExt" MAD randomized extension configurable variable # 2025.02.13 - [up_ranoz] Add MAD randomized extension upload handling # 2025.02.13 - [ranoz] Add MAD randomized extension download handling # 2025.02.13 - [sendnow] Extend request timeout for head / get (server response time lag)
This commit is contained in:
parent
0face871aa
commit
d48116dbe3
14 changed files with 880 additions and 552 deletions
|
|
@ -1,4 +1,4 @@
|
|||
DateTime: 25.02.11
|
||||
DateTime: 25.02.13
|
||||
|
||||
Files:
|
||||
./hosts/1fichier.sh
|
||||
|
|
@ -361,13 +361,13 @@ _________________________________________________________________________
|
|||
./hosts/ranoz.sh:281: tor_curl_request --insecure -L -G --no-alpn \
|
||||
./hosts/ranoz.sh:296: tor_curl_request --insecure -L -G --no-alpn \
|
||||
./hosts/sendnow.sh:90: response=$(tor_curl_request --insecure -L -s -b "${snow_cookie_jar}" -c "${snow_cookie_jar}" "$remote_url")
|
||||
./hosts/sendnow.sh:158: response=$(tor_curl_request --insecure -L -svo. -X POST \
|
||||
./hosts/sendnow.sh:200: file_header=$(tor_curl_request --insecure --head -Lis \
|
||||
./hosts/sendnow.sh:321: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
||||
./hosts/sendnow.sh:323: tor_curl_request --insecure -L --no-alpn \
|
||||
./hosts/sendnow.sh:341: tor_curl_request --insecure -L --no-alpn \
|
||||
./hosts/sendnow.sh:360: tor_curl_request --insecure -L --no-alpn \
|
||||
./hosts/sendnow.sh:379: tor_curl_request --insecure -L --no-alpn \
|
||||
./hosts/sendnow.sh:160: response=$(tor_curl_request --insecure -L -svo. -X POST \
|
||||
./hosts/sendnow.sh:203: file_header=$(tor_curl_request_extended --insecure --head -Lis \
|
||||
./hosts/sendnow.sh:324: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
||||
./hosts/sendnow.sh:326: tor_curl_request_extended --insecure -L --no-alpn \
|
||||
./hosts/sendnow.sh:344: tor_curl_request --insecure -L --no-alpn \
|
||||
./hosts/sendnow.sh:363: tor_curl_request --insecure -L --no-alpn \
|
||||
./hosts/sendnow.sh:382: tor_curl_request --insecure -L --no-alpn \
|
||||
./hosts/syspro.sh:88: response=$(tor_curl_request --insecure -L -s "$remote_url")
|
||||
./hosts/syspro.sh:186: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
||||
./hosts/syspro.sh:188: tor_curl_request --insecure -L \
|
||||
|
|
@ -462,8 +462,8 @@ _________________________________________________________________________
|
|||
./hosts/up_oshi.sh:110: response=$(tor_curl_upload --insecure \
|
||||
./hosts/up_pixeldrain.sh:112: response=$(tor_curl_upload --insecure -X PUT \
|
||||
./hosts/up_quax.sh:102: response=$(tor_curl_upload --insecure -i \
|
||||
./hosts/up_ranoz.sh:102: response=$(tor_curl_upload --insecure -L -i -s \
|
||||
./hosts/up_ranoz.sh:129: response=$(tor_curl_upload --insecure -i -X PUT \
|
||||
./hosts/up_ranoz.sh:130: response=$(tor_curl_upload --insecure -L -i -s \
|
||||
./hosts/up_ranoz.sh:160: response=$(tor_curl_upload --insecure -i -X PUT \
|
||||
./hosts/up_shareonline.sh:102: response=$(tor_curl_upload --insecure -i \
|
||||
./hosts/up_syspro.sh:102: response=$(tor_curl_upload --insecure -i \
|
||||
./hosts/up_tempfileme.sh:102: response=$(tor_curl_upload --insecure -i \
|
||||
|
|
@ -476,7 +476,7 @@ _________________________________________________________________________
|
|||
./hosts/up_uploadee.sh:176: response=$(tor_curl_upload --insecure -i -L \
|
||||
./hosts/up_uploadev.sh:102: response=$(tor_curl_upload --insecure -i \
|
||||
./hosts/up_uploadflix.sh:106: response=$(tor_curl_upload --insecure -i \
|
||||
./hosts/up_uploadhive.sh:128: response=$(tor_curl_upload --insecure -i \
|
||||
./hosts/up_uploadhive.sh:129: response=$(tor_curl_upload --insecure -i \
|
||||
./hosts/up_uploadraja.sh:102: response=$(tor_curl_upload --insecure -i \
|
||||
./hosts/up_uwabaki.sh:102: response=$(tor_curl_upload --insecure -i -L \
|
||||
./hosts/up_yolobit.sh:102: response=$(tor_curl_upload --insecure -i \
|
||||
|
|
@ -485,119 +485,119 @@ _________________________________________________________________________
|
|||
./hosts/youdbox.sh:183: file_header=$(tor_curl_request --insecure -L --head -s --referer "${fixed_url}" "$download_url")
|
||||
./hosts/youdbox.sh:276: tor_curl_request --insecure -L -G --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval "$download_url" --continue-at - --output "$file_path"
|
||||
./hosts/youdbox.sh:278: tor_curl_request --insecure -L -G "$download_url" --continue-at - --output "$file_path"
|
||||
./mad.sh:80:UseTorCurlImpersonate=false
|
||||
./mad.sh:375:tor_curl_request() {
|
||||
./mad.sh:376: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
||||
./mad.sh:377: "${curl_impersonate[@]}" --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" -4 --connect-timeout ${ConnectTimeout} --compressed --globoff "$@"
|
||||
./mad.sh:379: curl --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" -4 --connect-timeout ${ConnectTimeout} --compressed --globoff "$@"
|
||||
./mad.sh:382:tor_curl_request_extended() {
|
||||
./mad.sh:384: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
||||
./mad.sh:385: "${curl_impersonate[@]}" --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" -4 --connect-timeout $randomtimeout --compressed --globoff "$@"
|
||||
./mad.sh:387: curl --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" -4 --connect-timeout $randomtimeout --compressed --globoff "$@"
|
||||
./mad.sh:390:tor_curl_upload() {
|
||||
./mad.sh:391: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
||||
./mad.sh:393: "${curl_impersonate[@]}" --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" -4 --connect-timeout ${ConnectTimeoutUpload} --speed-limit $UploadSpeedMin --speed-time $UploadTimeoutInterval --compressed --globoff "$@"
|
||||
./mad.sh:395: "${curl_impersonate[@]}" --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" -4 --connect-timeout ${ConnectTimeoutUpload} --compressed --globoff "$@"
|
||||
./mad.sh:399: curl --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" -4 --connect-timeout ${ConnectTimeoutUpload} --speed-limit $UploadSpeedMin --speed-time $UploadTimeoutInterval -H 'User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:109.0) Gecko/20100101 Firefox/115.0' -H 'Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8' -H 'Accept-Language: en-US,en;q=0.5' -H 'Accept-Encoding: gzip, deflate, br' -H 'Origin: null' -H 'Connection: keep-alive' -H 'Upgrade-Insecure-Requests: 1' -H 'Sec-Fetch-Dest: document' -H 'Sec-Fetch-Mode: navigate' -H 'Sec-Fetch-Site: cross-site' -H 'Sec-Fetch-User: ?1' -H 'TE: trailers' --compressed --globoff "$@"
|
||||
./mad.sh:401: curl --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" -4 --connect-timeout ${ConnectTimeoutUpload} -H 'User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:109.0) Gecko/20100101 Firefox/115.0' -H 'Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8' -H 'Accept-Language: en-US,en;q=0.5' -H 'Accept-Encoding: gzip, deflate, br' -H 'Origin: null' -H 'Connection: keep-alive' -H 'Upgrade-Insecure-Requests: 1' -H 'Sec-Fetch-Dest: document' -H 'Sec-Fetch-Mode: navigate' -H 'Sec-Fetch-Site: cross-site' -H 'Sec-Fetch-User: ?1' -H 'TE: trailers' --compressed --globoff "$@"
|
||||
./mad.sh:1397:install_curl_impersonate() {
|
||||
./mad.sh:1399: echo -e "${BLUE}lwthiker curl_impersonate${NC} is the original dev, but it is relatively inactive."
|
||||
./mad.sh:1400: echo -e "- Currently uses curl v8.1.1."
|
||||
./mad.sh:1404: echo -e "${BLUE}lexiforest curl_impersonate${NC} is an active fork of curl_impersonate."
|
||||
./mad.sh:1405: echo -e "+ Currently uses curl v8.7.1"
|
||||
./mad.sh:1409: PS3='Please select which curl_impersonate to install: '
|
||||
./mad.sh:1417: install_curl_impersonate_lwthiker_orig
|
||||
./mad.sh:1421: install_curl_impersonate_lexiforest_fork
|
||||
./mad.sh:1431:install_curl_impersonate_lwthiker_orig() {
|
||||
./mad.sh:1435: echo -e "${BLUE}lwthiker curl_impersonate${NC} is the original curl_impersonate."
|
||||
./mad.sh:1436: echo -e "+ Currently uses curl v8.1.1, and has low activity for updates"
|
||||
./mad.sh:1439: echo -e "${GREEN}| Fetching:${NC} latest ${BLUE}lwthiker curl_impersonate${NC} info from github...${NC}"
|
||||
./mad.sh:1442: response=$(tor_curl_request --insecure -L -s https://github.com/lwthiker/curl-impersonate/releases/latest)
|
||||
./mad.sh:1444: debugHtml "github" "lbf_inst_curlimp$j" "$response"
|
||||
./mad.sh:1447: latestTag=$(grep -oPi -m 1 '(?<=/curl-impersonate/releases/tag/).*?(?=")' <<< "$response")
|
||||
./mad.sh:1457: yes_or_no "Do you wish to download and extract curl_impersonate $latestTag (using tor+curl)?" && {
|
||||
./mad.sh:1459: download_url='https://github.com/lwthiker/curl-impersonate/releases/download/'"$latestTag"'/curl-impersonate-'"$latestTag"'.x86_64-linux-gnu.tar.gz'
|
||||
./mad.sh:1462: file_header=$(tor_curl_request --insecure --head -Ls "$download_url")
|
||||
./mad.sh:1464: debugHtml "github" "head_inst_curlimp$j" "${file_header}"
|
||||
./mad.sh:1512: tor_curl_request --insecure -L "$download_url" --continue-at - --output "$file_path"
|
||||
./mad.sh:1541: echo -e "| Extracting curl_impersonate..."
|
||||
./mad.sh:1543: rm -f "${ScriptDir}"/curl*
|
||||
./mad.sh:1544: mv "$extract_location/curl-impersonate-ff" "${ScriptDir}/"
|
||||
./mad.sh:1545: mv "$extract_location/curl_ff109" "${ScriptDir}/"
|
||||
./mad.sh:1546: echo -e "${GREEN}| Done.${NC} Update ${BLUE}\"UseTorCurlImpersonate=true\"${NC} in script to use..."
|
||||
./mad.sh:1554:install_curl_impersonate_lexiforest_fork() {
|
||||
./mad.sh:1558: echo -e "${BLUE}lexiforest curl_impersonate${NC} is an active fork of curl_impersonate."
|
||||
./mad.sh:1559: echo -e "+ Currently uses curl v8.7.1, and is patched for latest CVEs"
|
||||
./mad.sh:1562: echo -e "${GREEN}| Fetching:${NC} latest ${BLUE}lexiforest curl_impersonate fork${NC} info from github...${NC}"
|
||||
./mad.sh:1565: response=$(tor_curl_request --insecure -L -s https://github.com/lexiforest/curl-impersonate/releases/latest)
|
||||
./mad.sh:1567: debugHtml "github" "lbf_inst_curlimp$j" "$response"
|
||||
./mad.sh:1570: latestTag=$(grep -oPi -m 1 '(?<=/curl-impersonate/releases/tag/).*?(?=")' <<< "$response")
|
||||
./mad.sh:1580: yes_or_no "Do you wish to download and extract curl_impersonate $latestTag (using tor+curl)?" && {
|
||||
./mad.sh:1582: download_url='https://github.com/lexiforest/curl-impersonate/releases/download/'"$latestTag"'/curl-impersonate-'"$latestTag"'.x86_64-linux-gnu.tar.gz'
|
||||
./mad.sh:1585: file_header=$(tor_curl_request --insecure --head -Ls "$download_url")
|
||||
./mad.sh:1587: debugHtml "github" "head_inst_curlimp$j" "${file_header}"
|
||||
./mad.sh:1635: tor_curl_request --insecure -L "$download_url" --continue-at - --output "$file_path"
|
||||
./mad.sh:1664: echo -e "| Extracting curl_impersonate..."
|
||||
./mad.sh:1666: rm -f "${ScriptDir}"/curl*
|
||||
./mad.sh:1667: mv "$extract_location/curl-impersonate-chrome" "${ScriptDir}/"
|
||||
./mad.sh:1668: mv "$extract_location/curl_chrome131" "${ScriptDir}/"
|
||||
./mad.sh:1669: echo -e "${GREEN}| Done.${NC} Update ${BLUE}\"UseTorCurlImpersonate=true\"${NC} in script to use..."
|
||||
./mad.sh:1831: echo -e ":${NC} ${GREEN}MAD${PINK} Audit${NC} : Reports usage of http & curl in scripts${PINK}${BLD} :"
|
||||
./mad.sh:1839: maud_curl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep --color='always' -Ei 'curl')
|
||||
./mad.sh:1840: maud_torcurl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep -A 12 --color='always' -Ei 'tor_curl')
|
||||
./mad.sh:1849: echo -e "${PINK}MAD Audit of curl:${NC} (${GREEN}grep \"curl\"${NC})"
|
||||
./mad.sh:1851: echo -e "$maud_curl"
|
||||
./mad.sh:1853: echo -e "${PINK}MAD Audit of tor_curl (+12 lines after):${NC} (${GREEN}grep \"tor_curl\"${NC})"
|
||||
./mad.sh:1855: echo -e "$maud_torcurl"
|
||||
./mad.sh:1867: maud_curl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep --color='always' -Ei 'curl')
|
||||
./mad.sh:1868: maud_torcurl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep -A 12 --color='always' -Ei 'tor_curl')
|
||||
./mad.sh:1877: echo -e "${PINK}MAD Audit of curl:${NC} (${GREEN}grep \"curl \"${NC})"
|
||||
./mad.sh:1879: echo -e "$maud_curl"
|
||||
./mad.sh:1881: echo -e "${PINK}MAD Audit of tor_curl (+12 lines after):${NC} (${GREEN}grep \"tor_curl\"${NC})"
|
||||
./mad.sh:1883: echo -e "$maud_torcurl"
|
||||
./mad.sh:1889: maud_curl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep --color='always' -Ei 'curl')
|
||||
./mad.sh:1890: maud_torcurl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep -A 12 --color='always' -Ei 'tor_curl')
|
||||
./mad.sh:1899: echo -e "${PINK}MAD Audit of curl:${NC} (${GREEN}grep \"curl\"${NC})"
|
||||
./mad.sh:1901: echo -e "$maud_curl"
|
||||
./mad.sh:1903: echo -e "${PINK}MAD Audit of tor_curl (+12 lines after):${NC} (${GREEN}grep \"tor_curl\"${NC})"
|
||||
./mad.sh:1905: echo -e "$maud_torcurl"
|
||||
./mad.sh:2852: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
||||
./mad.sh:2853: printf "client: ${GREEN}Tor${NC} + ${BLUE}curl_impersonate${NC}\\n"
|
||||
./mad.sh:2855: printf "client: ${GREEN}Tor${NC} + ${GREEN}curl${NC}\\n"
|
||||
./mad.sh:3027: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
||||
./mad.sh:3028: printf "client: ${GREEN}Tor${NC} + ${BLUE}curl_impersonate${NC}\\n"
|
||||
./mad.sh:3030: printf "client: ${GREEN}Tor${NC} + ${GREEN}curl${NC}\\n"
|
||||
./mad.sh:3228: file_header=$(tor_curl_request --insecure -m 8 -s -D - -o /dev/null \
|
||||
./mad.sh:3235: file_header=$(tor_curl_request --insecure --head -H "Connection: keep-alive" -L -s -i "$download_url" |
|
||||
./mad.sh:3372: tor_curl_request --insecure -L --referer "$file_url" "$download_url" --output "$file_path"
|
||||
./mad.sh:3425: tor_curl_request --insecure -L --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval "$download_url" --continue-at - --output "$file_path"
|
||||
./mad.sh:3427: tor_curl_request --insecure -L --referer "$file_url" "$download_url" --continue-at - --output "$file_path"
|
||||
./mad.sh:3625: response=$(tor_curl_upload --insecure -i \
|
||||
./mad.sh:3632: response=$(tor_curl_upload --insecure -i \
|
||||
./mad.sh:3703:if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
||||
./mad.sh:3704: curl_impersonate=()
|
||||
./mad.sh:3705: readarray -d $'' arrFiles < <(find "$ScriptDir" -maxdepth 1 -name "curl_*" -printf '%p\n' | sort -Vk1)
|
||||
./mad.sh:3706: bFoundCurlHeader=false
|
||||
./mad.sh:3710: curl_impersonate=($fil)
|
||||
./mad.sh:3711: bFoundCurlHeader=true
|
||||
./mad.sh:3715: if [ "$bFoundCurlHeader" == "false" ]; then
|
||||
./mad.sh:3716: echo -e "${RED}[ERROR] Missing dependency \"curl-impersonate\"!${NC}"
|
||||
./mad.sh:3719: echo -e "You'll need to download ${GREEN}\"curl-impersonate\"${NC}."
|
||||
./mad.sh:3722: echo -e "The latest binary can be obtained on GitHub, search for \"curl-impersonate\""
|
||||
./mad.sh:3724: echo -e " 1. Visit the page of curl-impersonate and add \"/releases/latest/\" at end of URL."
|
||||
./mad.sh:3728: echo -e " 4. Download archive ${GREEN}\"curl-impersonate-vX.Y.Z.x86_64-linux-gnu.tar.gz\"${YELLOW}."
|
||||
./mad.sh:3729: echo -e " 5. Extract files ${GREEN}\"curl-impersonate-ff\"${NC} and ${GREEN}\"curl_ff109\"${NC} next to this script."
|
||||
./mad.sh:3732: echo -e "run $0 install_curl_impersonate\\n"
|
||||
./mad.sh:3734: yes_or_no "Do you wish to download and extract latest curl_impersonate (using tor+curl)?" && {
|
||||
./mad.sh:3735: UseTorCurlImpersonate=false
|
||||
./mad.sh:3736: install_curl_impersonate
|
||||
./mad.sh:3820: echo -e "[${YELLOW}Install curl_impersonate${NC}]: Downloads the latest binary for curl_impersonate from github repo (3 choices)"
|
||||
./mad.sh:3821: printf " %s install_curl_impersonate\\n" "$0"
|
||||
./mad.sh:3899:elif [[ "$arg1" == "install_curl_impersonate" ]]; then
|
||||
./mad.sh:3900: install_curl_impersonate
|
||||
./mad.sh:3931:if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
||||
./mad.sh:3932: printf "client: ${GREEN}Tor${NC} + ${BLUE}curl_impersonate${NC}\\n"
|
||||
./mad.sh:3934: printf "client: ${GREEN}Tor${NC} + ${GREEN}curl${NC}\\n"
|
||||
./mad.sh:4:UseTorCurlImpersonate=false
|
||||
./mad.sh:87:tor_curl_request() {
|
||||
./mad.sh:88: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
||||
./mad.sh:89: "${curl_impersonate[@]}" --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" -4 --connect-timeout ${ConnectTimeout} --compressed --globoff "$@"
|
||||
./mad.sh:91: curl --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" -4 --connect-timeout ${ConnectTimeout} --compressed --globoff "$@"
|
||||
./mad.sh:94:tor_curl_request_extended() {
|
||||
./mad.sh:96: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
||||
./mad.sh:97: "${curl_impersonate[@]}" --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" -4 --connect-timeout $randomtimeout --compressed --globoff "$@"
|
||||
./mad.sh:99: curl --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" -4 --connect-timeout $randomtimeout --compressed --globoff "$@"
|
||||
./mad.sh:102:tor_curl_upload() {
|
||||
./mad.sh:103: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
||||
./mad.sh:105: "${curl_impersonate[@]}" --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" -4 --connect-timeout ${ConnectTimeoutUpload} --speed-limit $UploadSpeedMin --speed-time $UploadTimeoutInterval --compressed --globoff "$@"
|
||||
./mad.sh:107: "${curl_impersonate[@]}" --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" -4 --connect-timeout ${ConnectTimeoutUpload} --compressed --globoff "$@"
|
||||
./mad.sh:111: curl --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" -4 --connect-timeout ${ConnectTimeoutUpload} --speed-limit $UploadSpeedMin --speed-time $UploadTimeoutInterval -H 'User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:109.0) Gecko/20100101 Firefox/115.0' -H 'Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8' -H 'Accept-Language: en-US,en;q=0.5' -H 'Accept-Encoding: gzip, deflate, br' -H 'Origin: null' -H 'Connection: keep-alive' -H 'Upgrade-Insecure-Requests: 1' -H 'Sec-Fetch-Dest: document' -H 'Sec-Fetch-Mode: navigate' -H 'Sec-Fetch-Site: cross-site' -H 'Sec-Fetch-User: ?1' -H 'TE: trailers' --compressed --globoff "$@"
|
||||
./mad.sh:113: curl --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" -4 --connect-timeout ${ConnectTimeoutUpload} -H 'User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:109.0) Gecko/20100101 Firefox/115.0' -H 'Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8' -H 'Accept-Language: en-US,en;q=0.5' -H 'Accept-Encoding: gzip, deflate, br' -H 'Origin: null' -H 'Connection: keep-alive' -H 'Upgrade-Insecure-Requests: 1' -H 'Sec-Fetch-Dest: document' -H 'Sec-Fetch-Mode: navigate' -H 'Sec-Fetch-Site: cross-site' -H 'Sec-Fetch-User: ?1' -H 'TE: trailers' --compressed --globoff "$@"
|
||||
./mad.sh:1114:install_curl_impersonate() {
|
||||
./mad.sh:1116: echo -e "${BLUE}lwthiker curl_impersonate${NC} is the original dev, but it is relatively inactive."
|
||||
./mad.sh:1117: echo -e "- Currently uses curl v8.1.1."
|
||||
./mad.sh:1121: echo -e "${BLUE}lexiforest curl_impersonate${NC} is an active fork of curl_impersonate."
|
||||
./mad.sh:1122: echo -e "+ Currently uses curl v8.7.1"
|
||||
./mad.sh:1126: PS3='Please select which curl_impersonate to install: '
|
||||
./mad.sh:1134: install_curl_impersonate_lwthiker_orig
|
||||
./mad.sh:1138: install_curl_impersonate_lexiforest_fork
|
||||
./mad.sh:1148:install_curl_impersonate_lwthiker_orig() {
|
||||
./mad.sh:1152: echo -e "${BLUE}lwthiker curl_impersonate${NC} is the original curl_impersonate."
|
||||
./mad.sh:1153: echo -e "+ Currently uses curl v8.1.1, and has low activity for updates"
|
||||
./mad.sh:1156: echo -e "${GREEN}| Fetching:${NC} latest ${BLUE}lwthiker curl_impersonate${NC} info from github...${NC}"
|
||||
./mad.sh:1159: response=$(tor_curl_request --insecure -L -s https://github.com/lwthiker/curl-impersonate/releases/latest)
|
||||
./mad.sh:1161: debugHtml "github" "lbf_inst_curlimp$j" "$response"
|
||||
./mad.sh:1164: latestTag=$(grep -oPi -m 1 '(?<=/curl-impersonate/releases/tag/).*?(?=")' <<< "$response")
|
||||
./mad.sh:1174: yes_or_no "Do you wish to download and extract curl_impersonate $latestTag (using tor+curl)?" && {
|
||||
./mad.sh:1176: download_url='https://github.com/lwthiker/curl-impersonate/releases/download/'"$latestTag"'/curl-impersonate-'"$latestTag"'.x86_64-linux-gnu.tar.gz'
|
||||
./mad.sh:1179: file_header=$(tor_curl_request --insecure --head -Ls "$download_url")
|
||||
./mad.sh:1181: debugHtml "github" "head_inst_curlimp$j" "${file_header}"
|
||||
./mad.sh:1229: tor_curl_request --insecure -L "$download_url" --continue-at - --output "$file_path"
|
||||
./mad.sh:1258: echo -e "| Extracting curl_impersonate..."
|
||||
./mad.sh:1260: rm -f "${ScriptDir}"/curl*
|
||||
./mad.sh:1261: mv "$extract_location/curl-impersonate-ff" "${ScriptDir}/"
|
||||
./mad.sh:1262: mv "$extract_location/curl_ff109" "${ScriptDir}/"
|
||||
./mad.sh:1263: echo -e "${GREEN}| Done.${NC} Update ${BLUE}\"UseTorCurlImpersonate=true\"${NC} in script to use..."
|
||||
./mad.sh:1271:install_curl_impersonate_lexiforest_fork() {
|
||||
./mad.sh:1275: echo -e "${BLUE}lexiforest curl_impersonate${NC} is an active fork of curl_impersonate."
|
||||
./mad.sh:1276: echo -e "+ Currently uses curl v8.7.1, and is patched for latest CVEs"
|
||||
./mad.sh:1279: echo -e "${GREEN}| Fetching:${NC} latest ${BLUE}lexiforest curl_impersonate fork${NC} info from github...${NC}"
|
||||
./mad.sh:1282: response=$(tor_curl_request --insecure -L -s https://github.com/lexiforest/curl-impersonate/releases/latest)
|
||||
./mad.sh:1284: debugHtml "github" "lbf_inst_curlimp$j" "$response"
|
||||
./mad.sh:1287: latestTag=$(grep -oPi -m 1 '(?<=/curl-impersonate/releases/tag/).*?(?=")' <<< "$response")
|
||||
./mad.sh:1297: yes_or_no "Do you wish to download and extract curl_impersonate $latestTag (using tor+curl)?" && {
|
||||
./mad.sh:1299: download_url='https://github.com/lexiforest/curl-impersonate/releases/download/'"$latestTag"'/curl-impersonate-'"$latestTag"'.x86_64-linux-gnu.tar.gz'
|
||||
./mad.sh:1302: file_header=$(tor_curl_request --insecure --head -Ls "$download_url")
|
||||
./mad.sh:1304: debugHtml "github" "head_inst_curlimp$j" "${file_header}"
|
||||
./mad.sh:1352: tor_curl_request --insecure -L "$download_url" --continue-at - --output "$file_path"
|
||||
./mad.sh:1381: echo -e "| Extracting curl_impersonate..."
|
||||
./mad.sh:1383: rm -f "${ScriptDir}"/curl*
|
||||
./mad.sh:1384: mv "$extract_location/curl-impersonate-chrome" "${ScriptDir}/"
|
||||
./mad.sh:1385: mv "$extract_location/curl_chrome131" "${ScriptDir}/"
|
||||
./mad.sh:1386: echo -e "${GREEN}| Done.${NC} Update ${BLUE}\"UseTorCurlImpersonate=true\"${NC} in script to use..."
|
||||
./mad.sh:1548: echo -e ":${NC} ${GREEN}MAD${PINK} Audit${NC} : Reports usage of http & curl in scripts${PINK}${BLD} :"
|
||||
./mad.sh:1556: maud_curl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep --color='always' -Ei 'curl')
|
||||
./mad.sh:1557: maud_torcurl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep -A 12 --color='always' -Ei 'tor_curl')
|
||||
./mad.sh:1566: echo -e "${PINK}MAD Audit of curl:${NC} (${GREEN}grep \"curl\"${NC})"
|
||||
./mad.sh:1568: echo -e "$maud_curl"
|
||||
./mad.sh:1570: echo -e "${PINK}MAD Audit of tor_curl (+12 lines after):${NC} (${GREEN}grep \"tor_curl\"${NC})"
|
||||
./mad.sh:1572: echo -e "$maud_torcurl"
|
||||
./mad.sh:1584: maud_curl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep --color='always' -Ei 'curl')
|
||||
./mad.sh:1585: maud_torcurl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep -A 12 --color='always' -Ei 'tor_curl')
|
||||
./mad.sh:1594: echo -e "${PINK}MAD Audit of curl:${NC} (${GREEN}grep \"curl \"${NC})"
|
||||
./mad.sh:1596: echo -e "$maud_curl"
|
||||
./mad.sh:1598: echo -e "${PINK}MAD Audit of tor_curl (+12 lines after):${NC} (${GREEN}grep \"tor_curl\"${NC})"
|
||||
./mad.sh:1600: echo -e "$maud_torcurl"
|
||||
./mad.sh:1606: maud_curl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep --color='always' -Ei 'curl')
|
||||
./mad.sh:1607: maud_torcurl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep -A 12 --color='always' -Ei 'tor_curl')
|
||||
./mad.sh:1616: echo -e "${PINK}MAD Audit of curl:${NC} (${GREEN}grep \"curl\"${NC})"
|
||||
./mad.sh:1618: echo -e "$maud_curl"
|
||||
./mad.sh:1620: echo -e "${PINK}MAD Audit of tor_curl (+12 lines after):${NC} (${GREEN}grep \"tor_curl\"${NC})"
|
||||
./mad.sh:1622: echo -e "$maud_torcurl"
|
||||
./mad.sh:2569: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
||||
./mad.sh:2570: printf "client: ${GREEN}Tor${NC} + ${BLUE}curl_impersonate${NC}\\n"
|
||||
./mad.sh:2572: printf "client: ${GREEN}Tor${NC} + ${GREEN}curl${NC}\\n"
|
||||
./mad.sh:2744: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
||||
./mad.sh:2745: printf "client: ${GREEN}Tor${NC} + ${BLUE}curl_impersonate${NC}\\n"
|
||||
./mad.sh:2747: printf "client: ${GREEN}Tor${NC} + ${GREEN}curl${NC}\\n"
|
||||
./mad.sh:2945: file_header=$(tor_curl_request --insecure -m 8 -s -D - -o /dev/null \
|
||||
./mad.sh:2952: file_header=$(tor_curl_request --insecure --head -H "Connection: keep-alive" -L -s -i "$download_url" |
|
||||
./mad.sh:3089: tor_curl_request --insecure -L --referer "$file_url" "$download_url" --output "$file_path"
|
||||
./mad.sh:3142: tor_curl_request --insecure -L --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval "$download_url" --continue-at - --output "$file_path"
|
||||
./mad.sh:3144: tor_curl_request --insecure -L --referer "$file_url" "$download_url" --continue-at - --output "$file_path"
|
||||
./mad.sh:3342: response=$(tor_curl_upload --insecure -i \
|
||||
./mad.sh:3349: response=$(tor_curl_upload --insecure -i \
|
||||
./mad.sh:3420:if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
||||
./mad.sh:3421: curl_impersonate=()
|
||||
./mad.sh:3422: readarray -d $'' arrFiles < <(find "$ScriptDir" -maxdepth 1 -name "curl_*" -printf '%p\n' | sort -Vk1)
|
||||
./mad.sh:3423: bFoundCurlHeader=false
|
||||
./mad.sh:3427: curl_impersonate=($fil)
|
||||
./mad.sh:3428: bFoundCurlHeader=true
|
||||
./mad.sh:3432: if [ "$bFoundCurlHeader" == "false" ]; then
|
||||
./mad.sh:3433: echo -e "${RED}[ERROR] Missing dependency \"curl-impersonate\"!${NC}"
|
||||
./mad.sh:3436: echo -e "You'll need to download ${GREEN}\"curl-impersonate\"${NC}."
|
||||
./mad.sh:3439: echo -e "The latest binary can be obtained on GitHub, search for \"curl-impersonate\""
|
||||
./mad.sh:3441: echo -e " 1. Visit the page of curl-impersonate and add \"/releases/latest/\" at end of URL."
|
||||
./mad.sh:3445: echo -e " 4. Download archive ${GREEN}\"curl-impersonate-vX.Y.Z.x86_64-linux-gnu.tar.gz\"${YELLOW}."
|
||||
./mad.sh:3446: echo -e " 5. Extract files ${GREEN}\"curl-impersonate-ff\"${NC} and ${GREEN}\"curl_ff109\"${NC} next to this script."
|
||||
./mad.sh:3449: echo -e "run $0 install_curl_impersonate\\n"
|
||||
./mad.sh:3451: yes_or_no "Do you wish to download and extract latest curl_impersonate (using tor+curl)?" && {
|
||||
./mad.sh:3452: UseTorCurlImpersonate=false
|
||||
./mad.sh:3453: install_curl_impersonate
|
||||
./mad.sh:3537: echo -e "[${YELLOW}Install curl_impersonate${NC}]: Downloads the latest binary for curl_impersonate from github repo (3 choices)"
|
||||
./mad.sh:3538: printf " %s install_curl_impersonate\\n" "$0"
|
||||
./mad.sh:3616:elif [[ "$arg1" == "install_curl_impersonate" ]]; then
|
||||
./mad.sh:3617: install_curl_impersonate
|
||||
./mad.sh:3648:if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
||||
./mad.sh:3649: printf "client: ${GREEN}Tor${NC} + ${BLUE}curl_impersonate${NC}\\n"
|
||||
./mad.sh:3651: printf "client: ${GREEN}Tor${NC} + ${GREEN}curl${NC}\\n"
|
||||
./plugins/pjscloud.sh:44: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
||||
./plugins/pjscloud.sh:45: response=$("${curl_impersonate[@]}" --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" \
|
||||
./plugins/pjscloud.sh:53: response=$(curl --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" \
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue