# 2024.12.26 - [up_kouploader / up_axfc / up_torup] Fixed failedRetryUpload (was using download logging)

#               * Thanks Belky
# 2024.12.26 - [anonfile / up_anonfile] Add anonfile.de as upload / download host
# 2024.12.25 - [dashfile / up_dashfile] Add dashfile.net as upload / download host
# 2024.12.25 - [isupload] Change to use tor_curl_request_extended (server response is often slow)
#               - Accept 200 OK response to continue (do not require filename / filesize)
# 2024.12.25 - [fileblade] Add response handling for free file download dissallowed > 100MB.
#               "The file owner does not allow FREE users to download files which are over 100 MB"
# 2024.12.25 - [mad] Add "UploadHiveRandomizeExt" option to config with default=true
# 2024.12.25 - [uploadhive / up_uploadhive] Update renaming random ext files to their original names
#               - Handle multipart 7z & rar (abc.7z.###, abc.part#.rar)
# 2024.12.25 - [syspro / up_syspro] Add share.syspro.com.br as upload / download host
# 2024.12.24 - [mad] Add EnabledUploadHosts / EnabledDownloadHosts setting to fine-tune which hosts to use
#               ** Options: recommended, online, all (Default=recommended)
#               - recommended: loads all hosts verified working with MAD
#               - online: loads all hosts available online / working (includes captcha / js restricted)
#               - all: loads all hosts in hosts folder
# 2024.12.24 - [up_ateasystems / ateasystems] Add share.ateasystems.com as upload / download host
# 2024.12.23 - [up_uploadbay / uploadbay] Add uploadbay.net as upload / download host
# 2024.12.23 - [up_herbolistique / herbolistique] Add transfert.herbolistique.com as upload / download host
# 2024.12.23 - [uploadhive] Auto-rename random extension downloads
# 2024.12.23 - [up_uploadhive] Change upload file extension to random 3 letters (uhive blocks .7z, .zip, .rar now)
# 2024.12.23 - [up_offshorecat] Fixed upload. Updated apikey.
# 2024.12.23 - [up_fileditch] Fixed upload. Added response handling for Tor Blocked node (retries)
# 2024.12.23 - [up_freesocial / freesocial] Add files.freesocial.co as upload / download host
# 2024.12.23 - [up_cyssoux / cyssoux] Add partage.cyssoux.fr as upload / download host
# 2024.12.22 - [mad] Add jira_Upload function -- used for all jirafeau hosts
# 2024.12.22 - [up_*AllJiraHosts*] Consolidated / moved all hosts upload functions to mad.sh
#               - Minimized jira host code (~6000 lines of duplicates removed)
#               - Jira hosts: acid, anarchaserver, depotkaz, dictvm, eddowding, familleflender, filesquid,
#                 free4e, harrault, linxx, moocloud, nantes, netlib, skrepr, soyjak
# 2024.12.20 - [fileblade / up_fileblade] Add fileblade.com as upload / download host
# 2024.12.20 - [isupload / up_isupload] Add isupload.com as upload / download host
# 2024.12.15 - [mediafire] Add mediafire download link processing
# 2024.12.12 - [dictvm / up_dictvm] Add dictvm.org as upload / download host
# 2024.12.12 - [eddowding / up_eddowding] Add eddowding.com as upload / download host
# 2024.12.12 - [up_pixeldrain] Modify upload to use PUT
# 2024.12.12 - [mad] Update pixeldrain api key
# 2024.12.09 - [ranoz] Fix filenames with spaces
# 2024.11.29 - [innocent] Update to use tor_curl_request_extended for head/get
# 2024.11.29 - [quax] Update 404 Not found response handling
This commit is contained in:
kittykat 2024-12-27 19:47:09 +00:00
parent ec7d121c0e
commit e6804e01e1
Signed by: kittykat
GPG key ID: E3F1556620F70C3C
58 changed files with 6609 additions and 2223 deletions

View file

@ -1,27 +1,34 @@
DateTime: 24.11.18
DateTime: 24.12.26
Files:
./hosts/1fichier.sh
./hosts/9saves.sh
./hosts/acid.sh
./hosts/anarchaserver.sh
./hosts/anonfile.sh
./hosts/anonsharing.sh
./hosts/archived/nekofile.sh
./hosts/ateasystems.sh
./hosts/bedrive.sh
./hosts/biteblob.sh
./hosts/bowfile.sh
./hosts/click.sh
./hosts/cyssoux.sh
./hosts/dailyuploads.sh
./hosts/dashfile.sh
./hosts/dataupload.sh
./hosts/dbree.sh
./hosts/depotkaz.sh
./hosts/dictvm.sh
./hosts/discreetshare.sh
./hosts/dosya.sh
./hosts/downloadgg.sh
./hosts/eddowding.sh
./hosts/eternalhosting.sh
./hosts/examples/ExampleNewHost.sh
./hosts/examples/up_example.sh
./hosts/familleflender.sh
./hosts/fileblade.sh
./hosts/fileditch.sh
./hosts/filedoge.sh
./hosts/filedot.sh
@ -29,14 +36,19 @@ Files:
./hosts/filesquid.sh
./hosts/firestorage.sh
./hosts/free4e.sh
./hosts/freesocial.sh
./hosts/gofile.sh
./hosts/harrault.sh
./hosts/herbolistique.sh
./hosts/hexload.sh
./hosts/innocent.sh
./hosts/isupload.sh
./hosts/kraken.sh
./hosts/lainsafe.sh
./hosts/lainsafe_onion.sh
./hosts/linxx.sh
./hosts/mediafire.sh
./hosts/moocloud.sh
./hosts/nantes.sh
./hosts/netlib.sh
./hosts/nippy.sh
@ -44,15 +56,18 @@ Files:
./hosts/offshorecat.sh
./hosts/oshi.sh
./hosts/pixeldrain.sh
./hosts/quax.sh
./hosts/ranoz.sh
./hosts/shareonline.sh
./hosts/skrepr.sh
./hosts/soyjak.sh
./hosts/syspro.sh
./hosts/tempfileme.sh
./hosts/tempsh.sh
./hosts/torup.sh
./hosts/turboonion.sh
./hosts/up2share.sh
./hosts/uploadbay.sh
./hosts/uploadee.sh
./hosts/uploadev.sh
./hosts/uploadflix.sh
@ -60,28 +75,39 @@ Files:
./hosts/up_1fichier.sh
./hosts/up_acid.sh
./hosts/up_anarchaserver.sh
./hosts/up_anonfile.sh
./hosts/up_anonsharing.sh
./hosts/up_ateasystems.sh
./hosts/up_axfc.sh
./hosts/up_bedrive.sh
./hosts/up_bowfile.sh
./hosts/up_cyssoux.sh
./hosts/up_dailyuploads.sh
./hosts/up_dashfile.sh
./hosts/up_dataupload.sh
./hosts/up_dbree.sh
./hosts/up_depotkaz.sh
./hosts/up_dictvm.sh
./hosts/up_dosya.sh
./hosts/up_eddowding.sh
./hosts/up_familleflender.sh
./hosts/up_fileblade.sh
./hosts/up_fileditch.sh
./hosts/up_filehaus.sh
./hosts/up_filesquid.sh
./hosts/up_firestorage.sh
./hosts/up_free4e.sh
./hosts/up_freesocial.sh
./hosts/up_gofile.sh
./hosts/up_harrault.sh
./hosts/up_herbolistique.sh
./hosts/up_hexload.sh
./hosts/up_innocent.sh
./hosts/up_isupload.sh
./hosts/up_kouploader.sh
./hosts/up_kraken.sh
./hosts/up_linxx.sh
./hosts/up_moocloud.sh
./hosts/up_nantes.sh
./hosts/up_netlib.sh
./hosts/up_nippy.sh
@ -89,14 +115,17 @@ Files:
./hosts/up_offshorecat.sh
./hosts/up_oshi.sh
./hosts/up_pixeldrain.sh
./hosts/up_quax.sh
./hosts/up_ranoz.sh
./hosts/up_shareonline.sh
./hosts/up_skrepr.sh
./hosts/up_soyjak.sh
./hosts/up_syspro.sh
./hosts/up_tempfileme.sh
./hosts/up_tempsh.sh
./hosts/up_torup.sh
./hosts/up_turboonion.sh
./hosts/up_uploadbay.sh
./hosts/up_uploadee.sh
./hosts/up_uploadev.sh
./hosts/up_uploadflix.sh
@ -130,11 +159,27 @@ _________________________________________________________________________
./hosts/9saves.sh:297: tor_curl_request --insecure \
./hosts/9saves.sh:304: tor_curl_request --insecure \
./hosts/9saves.sh:321: tor_curl_request --insecure \
./hosts/anonfile.sh:96: response=$(tor_curl_request --insecure -L -s -b "${anon_cookie_jar}" -c "${anon_cookie_jar}" \
./hosts/anonfile.sh:186: response=$(tor_curl_request --insecure -L -s -X POST \
./hosts/anonfile.sh:240: tor_curl_request --insecure -s "$captcha_img_url" --output "$tmp_captcha_img"
./hosts/anonfile.sh:340: response=$(tor_curl_request --insecure -L -s -X POST \
./hosts/anonfile.sh:446: file_header=$(tor_curl_request -i -s --head \
./hosts/anonfile.sh:549: if [ "${UseTorCurlImpersonate}" == "true" ]; then
./hosts/anonfile.sh:551: tor_curl_request --insecure \
./hosts/anonfile.sh:557: tor_curl_request --insecure \
./hosts/anonfile.sh:564: tor_curl_request --insecure \
./hosts/anonfile.sh:581: tor_curl_request --insecure \
./hosts/anonsharing.sh:91: response=$(tor_curl_request --insecure -i -s \
./hosts/anonsharing.sh:150: file_header=$(tor_curl_request --insecure --head -L -i -s \
./hosts/anonsharing.sh:158: file_header=$(tor_curl_request --insecure --head -H "Connection: keep-alive" -s -i \
./hosts/anonsharing.sh:273: tor_curl_request --insecure --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval "$download_url" --output "$file_path"
./hosts/anonsharing.sh:275: tor_curl_request --insecure "$download_url" --output "$file_path"
./hosts/ateasystems.sh:88: response=$(tor_curl_request --insecure -L -s "$remote_url")
./hosts/ateasystems.sh:218: if [ "${UseTorCurlImpersonate}" == "true" ]; then
./hosts/ateasystems.sh:220: tor_curl_request --insecure \
./hosts/ateasystems.sh:225: tor_curl_request --insecure \
./hosts/ateasystems.sh:231: tor_curl_request --insecure \
./hosts/ateasystems.sh:237: tor_curl_request --insecure \
./hosts/bedrive.sh:90: response=$(tor_curl_request --insecure -L -s \
./hosts/bedrive.sh:149: file_header=$(tor_curl_request --insecure --head -L -i -s \
./hosts/bedrive.sh:270: if [ "${UseTorCurlImpersonate}" == "true" ]; then
@ -173,6 +218,15 @@ _________________________________________________________________________
./hosts/dailyuploads.sh:504: tor_curl_request --insecure \
./hosts/dailyuploads.sh:511: tor_curl_request --insecure \
./hosts/dailyuploads.sh:528: tor_curl_request --insecure \
./hosts/dashfile.sh:90: response=$(tor_curl_request --insecure -L -s -b "${dash_cookie_jar}" -c "${dash_cookie_jar}" \
./hosts/dashfile.sh:169: response=$(tor_curl_request --insecure -L -s -X POST \
./hosts/dashfile.sh:297: response=$(tor_curl_request --insecure -L -s -X POST \
./hosts/dashfile.sh:386: file_header=$(tor_curl_request --insecure -L --head -s --referer "${fixed_url}" "$download_url")
./hosts/dashfile.sh:484: if [ "${UseTorCurlImpersonate}" == "true" ]; then
./hosts/dashfile.sh:486: tor_curl_request --insecure \
./hosts/dashfile.sh:491: tor_curl_request --insecure \
./hosts/dashfile.sh:497: tor_curl_request --insecure \
./hosts/dashfile.sh:513: tor_curl_request --insecure \
./hosts/dataupload.sh:90: response=$(tor_curl_request --insecure -L -s -b "${dup_cookie_jar}" -c "${dup_cookie_jar}" "$remote_url")
./hosts/dataupload.sh:166: response=$(tor_curl_request --insecure -svo. -X POST \
./hosts/dataupload.sh:234: file_header=$(tor_curl_request --insecure -L --head -s "$download_url")
@ -200,6 +254,15 @@ _________________________________________________________________________
./hosts/examples/ExampleNewHost.sh:199: tor_curl_request --insecure --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval --referer "$download_url" "$download_url" --continue-at - --output "$file_path"
./hosts/examples/ExampleNewHost.sh:201: tor_curl_request --insecure --referer "$download_url" "$download_url" --continue-at - --output "$file_path"
./hosts/examples/up_example.sh:112: response=$(tor_curl_upload --insecure \
./hosts/fileblade.sh:90: response=$(tor_curl_request --insecure -L -s -b "${fb_cookie_jar}" -c "${fb_cookie_jar}" "$remote_url")
./hosts/fileblade.sh:167: response=$(tor_curl_request --insecure -L -s -X POST \
./hosts/fileblade.sh:254: response=$(tor_curl_request --insecure -L -s -X POST \
./hosts/fileblade.sh:323: file_header=$(tor_curl_request --insecure -L --head -s "$download_url")
./hosts/fileblade.sh:438: if [ "${UseTorCurlImpersonate}" == "true" ]; then
./hosts/fileblade.sh:440: tor_curl_request --insecure -L \
./hosts/fileblade.sh:444: tor_curl_request --insecure -L \
./hosts/fileblade.sh:449: tor_curl_request --insecure \
./hosts/fileblade.sh:464: tor_curl_request --insecure \
./hosts/fileditch.sh:85: file_header=$(tor_curl_request --insecure --head -L -s "$download_url")
./hosts/fileditch.sh:176: tor_curl_request --insecure --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval "$download_url" --continue-at - --output "$file_path"
./hosts/fileditch.sh:178: tor_curl_request --insecure "$download_url" --continue-at - --output "$file_path"
@ -210,35 +273,48 @@ _________________________________________________________________________
./hosts/filedot.sh:406: file_header=$(tor_curl_request --insecure -L --head -s --referer "${fixed_url}" "$download_url")
./hosts/filedot.sh:499: tor_curl_request --insecure -L -G --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval "$download_url" --continue-at - --output "$file_path"
./hosts/filedot.sh:501: tor_curl_request --insecure -L -G "$download_url" --continue-at - --output "$file_path"
./hosts/filehaus.sh:100: file_header=$(tor_curl_request --insecure -L --head -s --referer "${remote_url//\.org/\.cc}" "$download_url")
./hosts/filehaus.sh:197: tor_curl_request --insecure --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval --referer "$download_url" "$download_url" --continue-at - --output "$file_path"
./hosts/filehaus.sh:199: tor_curl_request --insecure --referer "$download_url" "$download_url" --continue-at - --output "$file_path"
./hosts/filehaus.sh:100: file_header=$(tor_curl_request_extended --insecure -L --head -s --referer "${remote_url//\.org/\.cc}" "$download_url")
./hosts/filehaus.sh:193: tor_curl_request_extended --insecure --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval --referer "$download_url" "$download_url" --continue-at - --output "$file_path"
./hosts/filehaus.sh:195: tor_curl_request_extended --insecure --referer "$download_url" "$download_url" --continue-at - --output "$file_path"
./hosts/firestorage.sh:98: response=$(tor_curl_request --insecure -L -s "${fixed_url}")
./hosts/firestorage.sh:226: file_header=$(tor_curl_request --insecure -L --head -s --referer "${fixed_url}" "$download_url")
./hosts/firestorage.sh:335: tor_curl_request --insecure -L -G --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval "$download_url" --continue-at - --output "$file_path"
./hosts/firestorage.sh:337: tor_curl_request --insecure -L -G "$download_url" --continue-at - --output "$file_path"
./hosts/gofile.sh:97: response=$(tor_curl_request --insecure -s -X POST \
./hosts/gofile.sh:170: response=$(tor_curl_request --insecure -G -L -s \
./hosts/gofile.sh:241: file_header=$(tor_curl_request --insecure -L --head -s \
./hosts/gofile.sh:359: tor_curl_request --insecure -G --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \
./hosts/gofile.sh:373: tor_curl_request --insecure -G \
./hosts/gofile.sh:250: file_header=$(tor_curl_request --insecure -L --head -s \
./hosts/gofile.sh:369: tor_curl_request --insecure -G --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \
./hosts/gofile.sh:383: tor_curl_request --insecure -G \
./hosts/hexload.sh:108: response=$(tor_curl_request --insecure -s --data "$form_data" "https://hexload.com/download")
./hosts/hexload.sh:116: response=$(tor_curl_request --insecure -s --data "$form_data" "https://hexload.com/download")
./hosts/hexload.sh:122: response=$(tor_curl_request --insecure -s --data "$form_data" "https://hexload.com/download")
./hosts/hexload.sh:254: file_header=$(tor_curl_request --insecure --head -L -s --referer "$file_url" "$download_url")
./hosts/hexload.sh:321: tor_curl_request --insecure --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval --referer "$file_url" "$download_url" --continue-at - --output "$file_path"
./hosts/hexload.sh:323: tor_curl_request --insecure --referer "$file_url" "$download_url" --continue-at - --output "$file_path"
./hosts/innocent.sh:97: file_header=$(tor_curl_request --insecure --head -L -s "$download_url")
./hosts/innocent.sh:100: file_header=$(tor_curl_request --insecure -m 8 -s -D - -o /dev/null \
./hosts/innocent.sh:97: file_header=$(tor_curl_request_extended --insecure --head -L -s "$download_url")
./hosts/innocent.sh:100: file_header=$(tor_curl_request --insecure -m 16 -s -D - -o /dev/null \
./hosts/innocent.sh:107: file_header=$(tor_curl_request --insecure --head -H "Connection: keep-alive" -L -s -i "$download_url" |
./hosts/innocent.sh:119: file_header=$(tor_curl_request --insecure --head -L -s "$download_url")
./hosts/innocent.sh:211: tor_curl_request --insecure "$download_url" --continue-at - --output "$file_path"
./hosts/innocent.sh:214: tor_curl_request --insecure "$download_url" --output "$file_path"
./hosts/innocent.sh:211: tor_curl_request_extended --insecure "$download_url" --continue-at - --output "$file_path"
./hosts/innocent.sh:214: tor_curl_request_extended --insecure "$download_url" --output "$file_path"
./hosts/isupload.sh:90: response=$(tor_curl_request_extended --insecure -L -s -b "${isup_cookie_jar}" -c "${isup_cookie_jar}" "$remote_url")
./hosts/isupload.sh:164: response=$(tor_curl_request_extended --insecure -L -s -X POST \
./hosts/isupload.sh:238: file_header=$(tor_curl_request --insecure --head -L -s "$download_url")
./hosts/isupload.sh:241: file_header=$(tor_curl_request --insecure -m 16 -s -D - -o /dev/null \
./hosts/isupload.sh:248: file_header=$(tor_curl_request --insecure --head -H "Connection: keep-alive" -L -s -i "$download_url" |
./hosts/isupload.sh:260: file_header=$(tor_curl_request_extended --insecure --head -L -s "$download_url")
./hosts/isupload.sh:352: tor_curl_request_extended --insecure -L "$download_url" --output "$file_path"
./hosts/isupload.sh:396: tor_curl_request_extended --insecure -L --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval "$download_url" --continue-at - --output "$file_path"
./hosts/isupload.sh:398: tor_curl_request_extended --insecure -L "$download_url" --continue-at - --output "$file_path"
./hosts/kraken.sh:104: PAGE=$(tor_curl_request --insecure --max-time "$ConnectTimeout" -s -L -c "${kraken_cookie_jar}" "${fixed_url}")
./hosts/kraken.sh:169: down_request=$(tor_curl_request --insecure -L -s -b "${kraken_cookie_jar}" -c "${kraken_cookie_jar}" -F "token=${kraken_token}" "${kraken_action}")
./hosts/kraken.sh:186: file_header=$(tor_curl_request --insecure --head -L -s -b "${kraken_cookie_jar}" -c "${kraken_cookie_jar}" --referer "$kraken_action" "$download_url")
./hosts/kraken.sh:286: tor_curl_request --insecure --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval --referer "$kraken_action" "$download_url" --continue-at - --output "$file_path"
./hosts/kraken.sh:288: tor_curl_request --insecure --referer "$kraken_action" "$download_url" --continue-at - --output "$file_path"
./hosts/mediafire.sh:94: response=$(tor_curl_request --insecure -L -s \
./hosts/mediafire.sh:157: file_header=$(tor_curl_request --insecure -L --head -s \
./hosts/mediafire.sh:276: tor_curl_request_extended --insecure "$download_url" --continue-at - --output "$file_path"
./hosts/mediafire.sh:279: tor_curl_request_extended --insecure "$download_url" --output "$file_path"
./hosts/nippy.sh:119: response=$(tor_curl_request --insecure -L -s -b "${nippy_cookie_jar}" -c "${nippy_cookie_jar}" "$fixed_url")
./hosts/nippy.sh:188: file_header=$(tor_curl_request --insecure -L --head -s \
./hosts/nippy.sh:299: tor_curl_request --insecure -L --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \
@ -253,13 +329,22 @@ _________________________________________________________________________
./hosts/pixeldrain.sh:328: tor_curl_request --insecure \
./hosts/pixeldrain.sh:333: tor_curl_request --insecure \
./hosts/pixeldrain.sh:342: tor_curl_request --insecure \
./hosts/quax.sh:85: file_header=$(tor_curl_request --insecure --head -L -s "$download_url")
./hosts/quax.sh:176: tor_curl_request --insecure --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval "$download_url" --continue-at - --output "$file_path"
./hosts/quax.sh:178: tor_curl_request --insecure "$download_url" --continue-at - --output "$file_path"
./hosts/ranoz.sh:90: response=$(tor_curl_request --insecure -L -s "$remote_url")
./hosts/ranoz.sh:144: file_header=$(tor_curl_request --insecure --head -L -i -s "$download_url")
./hosts/ranoz.sh:253: if [ "${UseTorCurlImpersonate}" == "true" ]; then
./hosts/ranoz.sh:255: tor_curl_request --insecure -L -G --no-alpn \
./hosts/ranoz.sh:259: tor_curl_request --insecure -L -G --no-alpn \
./hosts/ranoz.sh:264: tor_curl_request --insecure -L -G --no-alpn \
./hosts/ranoz.sh:279: tor_curl_request --insecure -L -G --no-alpn \
./hosts/ranoz.sh:150: file_header=$(tor_curl_request --insecure --head -L -i -s "$download_url")
./hosts/ranoz.sh:259: if [ "${UseTorCurlImpersonate}" == "true" ]; then
./hosts/ranoz.sh:261: tor_curl_request --insecure -L -G --no-alpn \
./hosts/ranoz.sh:265: tor_curl_request --insecure -L -G --no-alpn \
./hosts/ranoz.sh:270: tor_curl_request --insecure -L -G --no-alpn \
./hosts/ranoz.sh:285: tor_curl_request --insecure -L -G --no-alpn \
./hosts/syspro.sh:88: response=$(tor_curl_request --insecure -L -s "$remote_url")
./hosts/syspro.sh:186: if [ "${UseTorCurlImpersonate}" == "true" ]; then
./hosts/syspro.sh:188: tor_curl_request --insecure -L \
./hosts/syspro.sh:193: tor_curl_request --insecure \
./hosts/syspro.sh:199: tor_curl_request --insecure -L \
./hosts/syspro.sh:205: tor_curl_request --insecure -L \
./hosts/tempfileme.sh:89: response=$(tor_curl_request --insecure -L -s "$remote_url")
./hosts/tempfileme.sh:170: file_header=$(tor_curl_request --insecure -L --head -s --referer "${remote_url}" "$download_url")
./hosts/tempfileme.sh:298: if [ "${UseTorCurlImpersonate}" == "true" ]; then
@ -309,61 +394,57 @@ _________________________________________________________________________
./hosts/uploadflix.sh:288: tor_curl_request --insecure -L -G "$download_url" --continue-at - --output "$file_path"
./hosts/uploadhive.sh:88: response=$(tor_curl_request --insecure -L -s "$remote_url")
./hosts/uploadhive.sh:134: response=$(tor_curl_request --insecure -L -s -X POST --data "$form_data" "$remote_url")
./hosts/uploadhive.sh:175: file_header=$(tor_curl_request --insecure --head -s -L --referer "$remote_url" "$download_url")
./hosts/uploadhive.sh:269: tor_curl_request --insecure -L -G --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval "$download_url" --continue-at - --output "$file_path"
./hosts/uploadhive.sh:271: tor_curl_request --insecure -L -G "$download_url" --continue-at - --output "$file_path"
./hosts/uploadhive.sh:185: file_header=$(tor_curl_request --insecure --head -s -L --referer "$remote_url" "$download_url")
./hosts/uploadhive.sh:279: tor_curl_request --insecure -L -G --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval "$download_url" --continue-at - --output "$file_path"
./hosts/uploadhive.sh:281: tor_curl_request --insecure -L -G "$download_url" --continue-at - --output "$file_path"
./hosts/up_1fichier.sh:107: response=$(tor_curl_request --insecure -L -s "https://1fichier.com/")
./hosts/up_1fichier.sh:180: response=$(tor_curl_upload --insecure -L \
./hosts/up_acid.sh:102: response=$(tor_curl_upload --insecure -i \
./hosts/up_anarchaserver.sh:102: response=$(tor_curl_upload --insecure -i \
./hosts/up_anonfile.sh:102: response=$(tor_curl_upload --insecure -i \
./hosts/up_anonsharing.sh:102: response=$(tor_curl_upload --insecure -i \
./hosts/up_ateasystems.sh:102: response=$(tor_curl_upload --insecure -i \
./hosts/up_axfc.sh:109: response=$(tor_curl_request --insecure -L -s -b "${axfc_cookie_jar}" -c "${axfc_cookie_jar}" "$fixed_url")
./hosts/up_axfc.sh:136: response=$(tor_curl_upload --insecure -L -s -X POST \
./hosts/up_axfc.sh:184: response=$(tor_curl_upload --insecure -L -i -X POST \
./hosts/up_bedrive.sh:102: response=$(tor_curl_upload --insecure -i \
./hosts/up_bowfile.sh:108: response=$(tor_curl_request --insecure -L -i \
./hosts/up_dailyuploads.sh:109: response=$(tor_curl_upload --insecure -i \
./hosts/up_dashfile.sh:102: response=$(tor_curl_upload --insecure -i \
./hosts/up_dataupload.sh:102: response=$(tor_curl_upload --insecure -i \
./hosts/up_dbree.sh:102: response=$(tor_curl_upload --insecure -i \
./hosts/up_depotkaz.sh:102: response=$(tor_curl_upload --insecure -i \
./hosts/up_dosya.sh:107: response=$(tor_curl_upload --insecure -L -i \
./hosts/up_familleflender.sh:102: response=$(tor_curl_upload --insecure -i \
./hosts/up_fileditch.sh:102: response=$(tor_curl_upload --insecure -i \
./hosts/up_fileblade.sh:104: response=$(tor_curl_upload --insecure -i \
./hosts/up_fileditch.sh:107: response=$(tor_curl_upload --insecure -i -L \
./hosts/up_filehaus.sh:106: response=$(tor_curl_upload --insecure -i \
./hosts/up_filesquid.sh:104: response=$(tor_curl_upload --insecure -i \
./hosts/up_firestorage.sh:113: response=$(tor_curl_upload --insecure -i \
./hosts/up_free4e.sh:94: response=$(tor_curl_upload --insecure -i \
./hosts/up_gofile.sh:102: response=$(tor_curl_request --insecure -L -s "https://api.gofile.io/servers")
./hosts/up_gofile.sh:121: response=$(tor_curl_upload --insecure -i \
./hosts/up_harrault.sh:101: response=$(tor_curl_upload --insecure -i \
./hosts/up_hexload.sh:109: response=$(tor_curl_upload --insecure -i \
./hosts/up_innocent.sh:99: response=$(tor_curl_upload --insecure -D - -o /dev/null \
./hosts/up_isupload.sh:104: response=$(tor_curl_upload --insecure -i \
./hosts/up_kouploader.sh:108: response=$(tor_curl_request --insecure -L -s -b "${ko_cookie_jar}" -c "${ko_cookie_jar}" "$PostUrlHost")
./hosts/up_kouploader.sh:132: response=$(tor_curl_upload --insecure -L -i \
./hosts/up_kraken.sh:115: response=$(tor_curl_upload --insecure -i \
./hosts/up_linxx.sh:102: response=$(tor_curl_upload --insecure -i \
./hosts/up_nantes.sh:102: response=$(tor_curl_upload --insecure -i \
./hosts/up_netlib.sh:102: response=$(tor_curl_upload --insecure -i \
./hosts/up_nippy.sh:125: response=$(tor_curl_upload --insecure -i \
./hosts/up_nofile.sh:102: response=$(tor_curl_upload --insecure -i \
./hosts/up_offshorecat.sh:104: response=$(tor_curl_upload --insecure -i \
./hosts/up_oshi.sh:110: response=$(tor_curl_upload --insecure \
./hosts/up_pixeldrain.sh:113: response=$(tor_curl_upload --insecure -i \
./hosts/up_pixeldrain.sh:112: response=$(tor_curl_upload --insecure -X PUT \
./hosts/up_quax.sh:102: response=$(tor_curl_upload --insecure -i \
./hosts/up_ranoz.sh:102: response=$(tor_curl_upload --insecure -L -i -s \
./hosts/up_ranoz.sh:131: response=$(tor_curl_upload --insecure -i -X PUT \
./hosts/up_ranoz.sh:129: response=$(tor_curl_upload --insecure -i -X PUT \
./hosts/up_shareonline.sh:102: response=$(tor_curl_upload --insecure -i \
./hosts/up_skrepr.sh:94: response=$(tor_curl_upload --insecure -i \
./hosts/up_soyjak.sh:102: response=$(tor_curl_upload --insecure -i \
./hosts/up_syspro.sh:102: response=$(tor_curl_upload --insecure -i \
./hosts/up_tempfileme.sh:102: response=$(tor_curl_upload --insecure -i \
./hosts/up_tempsh.sh:102: response=$(tor_curl_upload --insecure -i \
./hosts/up_torup.sh:109: response=$(tor_curl_request --insecure -L -s -b "${torp_cookie_jar}" -c "${torp_cookie_jar}" \
./hosts/up_torup.sh:149: response=$(tor_curl_upload --insecure -i \
./hosts/up_turboonion.sh:99: response=$(tor_curl_upload --insecure \
./hosts/up_uploadbay.sh:102: response=$(tor_curl_upload --insecure -i \
./hosts/up_uploadee.sh:106: response=$(tor_curl_request --insecure -L -s "https://www.upload.ee/ubr_link_upload.php")
./hosts/up_uploadee.sh:176: response=$(tor_curl_upload --insecure -i -L \
./hosts/up_uploadev.sh:102: response=$(tor_curl_upload --insecure -i \
./hosts/up_uploadflix.sh:106: response=$(tor_curl_upload --insecure -i \
./hosts/up_uploadhive.sh:102: response=$(tor_curl_upload --insecure -i \
./hosts/up_uploadhive.sh:128: response=$(tor_curl_upload --insecure -i \
./hosts/up_uploadraja.sh:102: response=$(tor_curl_upload --insecure -i \
./hosts/up_yolobit.sh:102: response=$(tor_curl_upload --insecure -i \
./hosts/youdbox.sh:95: response=$(tor_curl_request --insecure -L -i -s "${fixed_url}")
@ -371,117 +452,119 @@ _________________________________________________________________________
./hosts/youdbox.sh:183: file_header=$(tor_curl_request --insecure -L --head -s --referer "${fixed_url}" "$download_url")
./hosts/youdbox.sh:276: tor_curl_request --insecure -L -G --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval "$download_url" --continue-at - --output "$file_path"
./hosts/youdbox.sh:278: tor_curl_request --insecure -L -G "$download_url" --continue-at - --output "$file_path"
./mad.sh:107:UseTorCurlImpersonate=false
./mad.sh:385:tor_curl_request() {
./mad.sh:386: if [ "${UseTorCurlImpersonate}" == "true" ]; then
./mad.sh:387: "${curl_impersonate[@]}" --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" --connect-timeout ${ConnectTimeout} --compressed --globoff "$@"
./mad.sh:389: curl --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" --connect-timeout ${ConnectTimeout} --compressed --globoff "$@"
./mad.sh:392:tor_curl_request_extended() {
./mad.sh:393: if [ "${UseTorCurlImpersonate}" == "true" ]; then
./mad.sh:394: "${curl_impersonate[@]}" --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" --connect-timeout 60 --compressed --globoff "$@"
./mad.sh:396: curl --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" --connect-timeout 60 --compressed --globoff "$@"
./mad.sh:399:tor_curl_upload() {
./mad.sh:100:UseTorCurlImpersonate=false
./mad.sh:391:tor_curl_request() {
./mad.sh:392: if [ "${UseTorCurlImpersonate}" == "true" ]; then
./mad.sh:393: "${curl_impersonate[@]}" --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" --connect-timeout ${ConnectTimeout} --compressed --globoff "$@"
./mad.sh:395: curl --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" --connect-timeout ${ConnectTimeout} --compressed --globoff "$@"
./mad.sh:398:tor_curl_request_extended() {
./mad.sh:400: if [ "${UseTorCurlImpersonate}" == "true" ]; then
./mad.sh:402: "${curl_impersonate[@]}" --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" --connect-timeout ${ConnectTimeout} --speed-limit $UploadSpeedMin --speed-time $UploadTimeoutInterval --compressed --globoff "$@"
./mad.sh:404: "${curl_impersonate[@]}" --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" --connect-timeout ${ConnectTimeout} --compressed --globoff "$@"
./mad.sh:408: curl --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" --connect-timeout ${ConnectTimeout} --speed-limit $UploadSpeedMin --speed-time $UploadTimeoutInterval -H 'User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:109.0) Gecko/20100101 Firefox/115.0' -H 'Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8' -H 'Accept-Language: en-US,en;q=0.5' -H 'Accept-Encoding: gzip, deflate, br' -H 'Origin: null' -H 'Connection: keep-alive' -H 'Upgrade-Insecure-Requests: 1' -H 'Sec-Fetch-Dest: document' -H 'Sec-Fetch-Mode: navigate' -H 'Sec-Fetch-Site: cross-site' -H 'Sec-Fetch-User: ?1' -H 'TE: trailers' --compressed --globoff "$@"
./mad.sh:410: curl --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" --connect-timeout ${ConnectTimeout} -H 'User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:109.0) Gecko/20100101 Firefox/115.0' -H 'Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8' -H 'Accept-Language: en-US,en;q=0.5' -H 'Accept-Encoding: gzip, deflate, br' -H 'Origin: null' -H 'Connection: keep-alive' -H 'Upgrade-Insecure-Requests: 1' -H 'Sec-Fetch-Dest: document' -H 'Sec-Fetch-Mode: navigate' -H 'Sec-Fetch-Site: cross-site' -H 'Sec-Fetch-User: ?1' -H 'TE: trailers' --compressed --globoff "$@"
./mad.sh:1268:install_curl_impersonate() {
./mad.sh:1270: echo -e "${BLUE}lwthiker curl_impersonate${NC} is the original dev, but it is relatively inactive."
./mad.sh:1271: echo -e "- Currently uses curl v8.1.1."
./mad.sh:1275: echo -e "${BLUE}lexiforest curl_impersonate${NC} is an active fork of curl_impersonate."
./mad.sh:1276: echo -e "+ Currently uses curl v8.7.1"
./mad.sh:1280: PS3='Please select which curl_impersonate to install: '
./mad.sh:1288: install_curl_impersonate_lwthiker_orig
./mad.sh:1292: install_curl_impersonate_lexiforest_fork
./mad.sh:1302:install_curl_impersonate_lwthiker_orig() {
./mad.sh:1306: echo -e "${BLUE}lwthiker curl_impersonate${NC} is the original curl_impersonate."
./mad.sh:1307: echo -e "+ Currently uses curl v8.1.1, and has low activity for updates"
./mad.sh:1310: echo -e "${GREEN}| Fetching:${NC} latest ${BLUE}lwthiker curl_impersonate${NC} info from github...${NC}"
./mad.sh:1313: response=$(tor_curl_request --insecure -L -s https://github.com/lwthiker/curl-impersonate/releases/latest)
./mad.sh:1315: debugHtml "github" "lbf_inst_curlimp$j" "$response"
./mad.sh:1318: latestTag=$(grep -oPi -m 1 '(?<=/curl-impersonate/releases/tag/).*?(?=")' <<< "$response")
./mad.sh:1328: yes_or_no "Do you wish to download and extract curl_impersonate $latestTag (using tor+curl)?" && {
./mad.sh:1330: download_url='https://github.com/lwthiker/curl-impersonate/releases/download/'"$latestTag"'/curl-impersonate-'"$latestTag"'.x86_64-linux-gnu.tar.gz'
./mad.sh:1333: file_header=$(tor_curl_request --insecure --head -Ls "$download_url")
./mad.sh:1335: debugHtml "github" "head_inst_curlimp$j" "${file_header}"
./mad.sh:1383: tor_curl_request --insecure -L "$download_url" --continue-at - --output "$file_path"
./mad.sh:1412: echo -e "| Extracting curl_impersonate..."
./mad.sh:1414: rm -f "${ScriptDir}"/curl*
./mad.sh:1415: mv "$extract_location/curl-impersonate-ff" "${ScriptDir}/"
./mad.sh:1416: mv "$extract_location/curl_ff109" "${ScriptDir}/"
./mad.sh:1417: echo -e "${GREEN}| Done.${NC} Update ${BLUE}\"UseTorCurlImpersonate=true\"${NC} in script to use..."
./mad.sh:1425:install_curl_impersonate_lexiforest_fork() {
./mad.sh:1429: echo -e "${BLUE}lexiforest curl_impersonate${NC} is an active fork of curl_impersonate."
./mad.sh:1430: echo -e "+ Currently uses curl v8.7.1, and is patched for latest CVEs"
./mad.sh:1433: echo -e "${GREEN}| Fetching:${NC} latest ${BLUE}lexiforest curl_impersonate fork${NC} info from github...${NC}"
./mad.sh:1436: response=$(tor_curl_request --insecure -L -s https://github.com/lexiforest/curl-impersonate/releases/latest)
./mad.sh:1438: debugHtml "github" "lbf_inst_curlimp$j" "$response"
./mad.sh:1441: latestTag=$(grep -oPi -m 1 '(?<=/curl-impersonate/releases/tag/).*?(?=")' <<< "$response")
./mad.sh:1451: yes_or_no "Do you wish to download and extract curl_impersonate $latestTag (using tor+curl)?" && {
./mad.sh:1453: download_url='https://github.com/lexiforest/curl-impersonate/releases/download/'"$latestTag"'/curl-impersonate-'"$latestTag"'.x86_64-linux-gnu.tar.gz'
./mad.sh:1456: file_header=$(tor_curl_request --insecure --head -Ls "$download_url")
./mad.sh:1458: debugHtml "github" "head_inst_curlimp$j" "${file_header}"
./mad.sh:1506: tor_curl_request --insecure -L "$download_url" --continue-at - --output "$file_path"
./mad.sh:1535: echo -e "| Extracting curl_impersonate..."
./mad.sh:1537: rm -f "${ScriptDir}"/curl*
./mad.sh:1538: mv "$extract_location/curl-impersonate-chrome" "${ScriptDir}/"
./mad.sh:1539: mv "$extract_location/curl_chrome124" "${ScriptDir}/"
./mad.sh:1540: echo -e "${GREEN}| Done.${NC} Update ${BLUE}\"UseTorCurlImpersonate=true\"${NC} in script to use..."
./mad.sh:1702: echo -e ":${NC} ${GREEN}MAD${PINK} Audit${NC} : Reports usage of http & curl in scripts${PINK}${BLD} :"
./mad.sh:1710: maud_curl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep --color='always' -Ei 'curl')
./mad.sh:1711: maud_torcurl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep -A 12 --color='always' -Ei 'tor_curl')
./mad.sh:1720: echo -e "${PINK}MAD Audit of curl:${NC} (${GREEN}grep \"curl\"${NC})"
./mad.sh:1722: echo -e "$maud_curl"
./mad.sh:1724: echo -e "${PINK}MAD Audit of tor_curl (+12 lines after):${NC} (${GREEN}grep \"tor_curl\"${NC})"
./mad.sh:1726: echo -e "$maud_torcurl"
./mad.sh:1738: maud_curl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep --color='always' -Ei 'curl')
./mad.sh:1739: maud_torcurl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep -A 12 --color='always' -Ei 'tor_curl')
./mad.sh:1748: echo -e "${PINK}MAD Audit of curl:${NC} (${GREEN}grep \"curl \"${NC})"
./mad.sh:1750: echo -e "$maud_curl"
./mad.sh:1752: echo -e "${PINK}MAD Audit of tor_curl (+12 lines after):${NC} (${GREEN}grep \"tor_curl\"${NC})"
./mad.sh:1754: echo -e "$maud_torcurl"
./mad.sh:1760: maud_curl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep --color='always' -Ei 'curl')
./mad.sh:1761: maud_torcurl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep -A 12 --color='always' -Ei 'tor_curl')
./mad.sh:1770: echo -e "${PINK}MAD Audit of curl:${NC} (${GREEN}grep \"curl\"${NC})"
./mad.sh:1772: echo -e "$maud_curl"
./mad.sh:1774: echo -e "${PINK}MAD Audit of tor_curl (+12 lines after):${NC} (${GREEN}grep \"tor_curl\"${NC})"
./mad.sh:1776: echo -e "$maud_torcurl"
./mad.sh:2723: if [ "${UseTorCurlImpersonate}" == "true" ]; then
./mad.sh:2724: printf "client: ${GREEN}Tor${NC} + ${BLUE}curl_impersonate${NC}\\n"
./mad.sh:2726: printf "client: ${GREEN}Tor${NC} + ${GREEN}curl${NC}\\n"
./mad.sh:2898: if [ "${UseTorCurlImpersonate}" == "true" ]; then
./mad.sh:2899: printf "client: ${GREEN}Tor${NC} + ${BLUE}curl_impersonate${NC}\\n"
./mad.sh:2901: printf "client: ${GREEN}Tor${NC} + ${GREEN}curl${NC}\\n"
./mad.sh:3099: file_header=$(tor_curl_request --insecure -m 8 -s -D - -o /dev/null \
./mad.sh:3106: file_header=$(tor_curl_request --insecure --head -H "Connection: keep-alive" -L -s -i "$download_url" |
./mad.sh:3234: tor_curl_request --insecure -L --referer "$file_url" "$download_url" --output "$file_path"
./mad.sh:3278: tor_curl_request --insecure -L --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval "$download_url" --continue-at - --output "$file_path"
./mad.sh:3280: tor_curl_request --insecure -L --referer "$file_url" "$download_url" --continue-at - --output "$file_path"
./mad.sh:3453:if [ "${UseTorCurlImpersonate}" == "true" ]; then
./mad.sh:3454: curl_impersonate=()
./mad.sh:3455: readarray -d $'' arrFiles < <(find "$ScriptDir" -maxdepth 1 -name "curl_*" -printf '%p\n' | sort -Vk1)
./mad.sh:3456: bFoundCurlHeader=false
./mad.sh:3460: curl_impersonate=($fil)
./mad.sh:3461: bFoundCurlHeader=true
./mad.sh:3465: if [ "$bFoundCurlHeader" == "false" ]; then
./mad.sh:3466: echo -e "${RED}[ERROR] Missing dependency \"curl-impersonate\"!${NC}"
./mad.sh:3469: echo -e "You'll need to download ${GREEN}\"curl-impersonate\"${NC}."
./mad.sh:3472: echo -e "The latest binary can be obtained on GitHub, search for \"curl-impersonate\""
./mad.sh:3474: echo -e " 1. Visit the page of curl-impersonate and add \"/releases/latest/\" at end of URL."
./mad.sh:3478: echo -e " 4. Download archive ${GREEN}\"curl-impersonate-vX.Y.Z.x86_64-linux-gnu.tar.gz\"${YELLOW}."
./mad.sh:3479: echo -e " 5. Extract files ${GREEN}\"curl-impersonate-ff\"${NC} and ${GREEN}\"curl_ff109\"${NC} next to this script."
./mad.sh:3482: echo -e "run $0 install_curl_impersonate\\n"
./mad.sh:3484: yes_or_no "Do you wish to download and extract latest curl_impersonate (using tor+curl)?" && {
./mad.sh:3485: UseTorCurlImpersonate=false
./mad.sh:3486: install_curl_impersonate
./mad.sh:3570: echo -e "[${YELLOW}Install curl_impersonate${NC}]: Downloads the latest binary for curl_impersonate from github repo (3 choices)"
./mad.sh:3571: printf " %s install_curl_impersonate\\n" "$0"
./mad.sh:3649:elif [[ "$arg1" == "install_curl_impersonate" ]]; then
./mad.sh:3650: install_curl_impersonate
./mad.sh:3681:if [ "${UseTorCurlImpersonate}" == "true" ]; then
./mad.sh:3682: printf "client: ${GREEN}Tor${NC} + ${BLUE}curl_impersonate${NC}\\n"
./mad.sh:3684: printf "client: ${GREEN}Tor${NC} + ${GREEN}curl${NC}\\n"
./mad.sh:401: "${curl_impersonate[@]}" --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" --connect-timeout $randomtimeout --compressed --globoff "$@"
./mad.sh:403: curl --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" --connect-timeout $randomtimeout --compressed --globoff "$@"
./mad.sh:406:tor_curl_upload() {
./mad.sh:407: if [ "${UseTorCurlImpersonate}" == "true" ]; then
./mad.sh:409: "${curl_impersonate[@]}" --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" --connect-timeout ${ConnectTimeout} --speed-limit $UploadSpeedMin --speed-time $UploadTimeoutInterval --compressed --globoff "$@"
./mad.sh:411: "${curl_impersonate[@]}" --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" --connect-timeout ${ConnectTimeout} --compressed --globoff "$@"
./mad.sh:415: curl --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" --connect-timeout ${ConnectTimeout} --speed-limit $UploadSpeedMin --speed-time $UploadTimeoutInterval -H 'User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:109.0) Gecko/20100101 Firefox/115.0' -H 'Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8' -H 'Accept-Language: en-US,en;q=0.5' -H 'Accept-Encoding: gzip, deflate, br' -H 'Origin: null' -H 'Connection: keep-alive' -H 'Upgrade-Insecure-Requests: 1' -H 'Sec-Fetch-Dest: document' -H 'Sec-Fetch-Mode: navigate' -H 'Sec-Fetch-Site: cross-site' -H 'Sec-Fetch-User: ?1' -H 'TE: trailers' --compressed --globoff "$@"
./mad.sh:417: curl --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" --connect-timeout ${ConnectTimeout} -H 'User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:109.0) Gecko/20100101 Firefox/115.0' -H 'Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8' -H 'Accept-Language: en-US,en;q=0.5' -H 'Accept-Encoding: gzip, deflate, br' -H 'Origin: null' -H 'Connection: keep-alive' -H 'Upgrade-Insecure-Requests: 1' -H 'Sec-Fetch-Dest: document' -H 'Sec-Fetch-Mode: navigate' -H 'Sec-Fetch-Site: cross-site' -H 'Sec-Fetch-User: ?1' -H 'TE: trailers' --compressed --globoff "$@"
./mad.sh:1361:install_curl_impersonate() {
./mad.sh:1363: echo -e "${BLUE}lwthiker curl_impersonate${NC} is the original dev, but it is relatively inactive."
./mad.sh:1364: echo -e "- Currently uses curl v8.1.1."
./mad.sh:1368: echo -e "${BLUE}lexiforest curl_impersonate${NC} is an active fork of curl_impersonate."
./mad.sh:1369: echo -e "+ Currently uses curl v8.7.1"
./mad.sh:1373: PS3='Please select which curl_impersonate to install: '
./mad.sh:1381: install_curl_impersonate_lwthiker_orig
./mad.sh:1385: install_curl_impersonate_lexiforest_fork
./mad.sh:1395:install_curl_impersonate_lwthiker_orig() {
./mad.sh:1399: echo -e "${BLUE}lwthiker curl_impersonate${NC} is the original curl_impersonate."
./mad.sh:1400: echo -e "+ Currently uses curl v8.1.1, and has low activity for updates"
./mad.sh:1403: echo -e "${GREEN}| Fetching:${NC} latest ${BLUE}lwthiker curl_impersonate${NC} info from github...${NC}"
./mad.sh:1406: response=$(tor_curl_request --insecure -L -s https://github.com/lwthiker/curl-impersonate/releases/latest)
./mad.sh:1408: debugHtml "github" "lbf_inst_curlimp$j" "$response"
./mad.sh:1411: latestTag=$(grep -oPi -m 1 '(?<=/curl-impersonate/releases/tag/).*?(?=")' <<< "$response")
./mad.sh:1421: yes_or_no "Do you wish to download and extract curl_impersonate $latestTag (using tor+curl)?" && {
./mad.sh:1423: download_url='https://github.com/lwthiker/curl-impersonate/releases/download/'"$latestTag"'/curl-impersonate-'"$latestTag"'.x86_64-linux-gnu.tar.gz'
./mad.sh:1426: file_header=$(tor_curl_request --insecure --head -Ls "$download_url")
./mad.sh:1428: debugHtml "github" "head_inst_curlimp$j" "${file_header}"
./mad.sh:1476: tor_curl_request --insecure -L "$download_url" --continue-at - --output "$file_path"
./mad.sh:1505: echo -e "| Extracting curl_impersonate..."
./mad.sh:1507: rm -f "${ScriptDir}"/curl*
./mad.sh:1508: mv "$extract_location/curl-impersonate-ff" "${ScriptDir}/"
./mad.sh:1509: mv "$extract_location/curl_ff109" "${ScriptDir}/"
./mad.sh:1510: echo -e "${GREEN}| Done.${NC} Update ${BLUE}\"UseTorCurlImpersonate=true\"${NC} in script to use..."
./mad.sh:1518:install_curl_impersonate_lexiforest_fork() {
./mad.sh:1522: echo -e "${BLUE}lexiforest curl_impersonate${NC} is an active fork of curl_impersonate."
./mad.sh:1523: echo -e "+ Currently uses curl v8.7.1, and is patched for latest CVEs"
./mad.sh:1526: echo -e "${GREEN}| Fetching:${NC} latest ${BLUE}lexiforest curl_impersonate fork${NC} info from github...${NC}"
./mad.sh:1529: response=$(tor_curl_request --insecure -L -s https://github.com/lexiforest/curl-impersonate/releases/latest)
./mad.sh:1531: debugHtml "github" "lbf_inst_curlimp$j" "$response"
./mad.sh:1534: latestTag=$(grep -oPi -m 1 '(?<=/curl-impersonate/releases/tag/).*?(?=")' <<< "$response")
./mad.sh:1544: yes_or_no "Do you wish to download and extract curl_impersonate $latestTag (using tor+curl)?" && {
./mad.sh:1546: download_url='https://github.com/lexiforest/curl-impersonate/releases/download/'"$latestTag"'/curl-impersonate-'"$latestTag"'.x86_64-linux-gnu.tar.gz'
./mad.sh:1549: file_header=$(tor_curl_request --insecure --head -Ls "$download_url")
./mad.sh:1551: debugHtml "github" "head_inst_curlimp$j" "${file_header}"
./mad.sh:1599: tor_curl_request --insecure -L "$download_url" --continue-at - --output "$file_path"
./mad.sh:1628: echo -e "| Extracting curl_impersonate..."
./mad.sh:1630: rm -f "${ScriptDir}"/curl*
./mad.sh:1631: mv "$extract_location/curl-impersonate-chrome" "${ScriptDir}/"
./mad.sh:1632: mv "$extract_location/curl_chrome131" "${ScriptDir}/"
./mad.sh:1633: echo -e "${GREEN}| Done.${NC} Update ${BLUE}\"UseTorCurlImpersonate=true\"${NC} in script to use..."
./mad.sh:1795: echo -e ":${NC} ${GREEN}MAD${PINK} Audit${NC} : Reports usage of http & curl in scripts${PINK}${BLD} :"
./mad.sh:1803: maud_curl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep --color='always' -Ei 'curl')
./mad.sh:1804: maud_torcurl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep -A 12 --color='always' -Ei 'tor_curl')
./mad.sh:1813: echo -e "${PINK}MAD Audit of curl:${NC} (${GREEN}grep \"curl\"${NC})"
./mad.sh:1815: echo -e "$maud_curl"
./mad.sh:1817: echo -e "${PINK}MAD Audit of tor_curl (+12 lines after):${NC} (${GREEN}grep \"tor_curl\"${NC})"
./mad.sh:1819: echo -e "$maud_torcurl"
./mad.sh:1831: maud_curl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep --color='always' -Ei 'curl')
./mad.sh:1832: maud_torcurl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep -A 12 --color='always' -Ei 'tor_curl')
./mad.sh:1841: echo -e "${PINK}MAD Audit of curl:${NC} (${GREEN}grep \"curl \"${NC})"
./mad.sh:1843: echo -e "$maud_curl"
./mad.sh:1845: echo -e "${PINK}MAD Audit of tor_curl (+12 lines after):${NC} (${GREEN}grep \"tor_curl\"${NC})"
./mad.sh:1847: echo -e "$maud_torcurl"
./mad.sh:1853: maud_curl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep --color='always' -Ei 'curl')
./mad.sh:1854: maud_torcurl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep -A 12 --color='always' -Ei 'tor_curl')
./mad.sh:1863: echo -e "${PINK}MAD Audit of curl:${NC} (${GREEN}grep \"curl\"${NC})"
./mad.sh:1865: echo -e "$maud_curl"
./mad.sh:1867: echo -e "${PINK}MAD Audit of tor_curl (+12 lines after):${NC} (${GREEN}grep \"tor_curl\"${NC})"
./mad.sh:1869: echo -e "$maud_torcurl"
./mad.sh:2816: if [ "${UseTorCurlImpersonate}" == "true" ]; then
./mad.sh:2817: printf "client: ${GREEN}Tor${NC} + ${BLUE}curl_impersonate${NC}\\n"
./mad.sh:2819: printf "client: ${GREEN}Tor${NC} + ${GREEN}curl${NC}\\n"
./mad.sh:2991: if [ "${UseTorCurlImpersonate}" == "true" ]; then
./mad.sh:2992: printf "client: ${GREEN}Tor${NC} + ${BLUE}curl_impersonate${NC}\\n"
./mad.sh:2994: printf "client: ${GREEN}Tor${NC} + ${GREEN}curl${NC}\\n"
./mad.sh:3192: file_header=$(tor_curl_request --insecure -m 8 -s -D - -o /dev/null \
./mad.sh:3199: file_header=$(tor_curl_request --insecure --head -H "Connection: keep-alive" -L -s -i "$download_url" |
./mad.sh:3327: tor_curl_request --insecure -L --referer "$file_url" "$download_url" --output "$file_path"
./mad.sh:3371: tor_curl_request --insecure -L --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval "$download_url" --continue-at - --output "$file_path"
./mad.sh:3373: tor_curl_request --insecure -L --referer "$file_url" "$download_url" --continue-at - --output "$file_path"
./mad.sh:3571: response=$(tor_curl_upload --insecure -i \
./mad.sh:3578: response=$(tor_curl_upload --insecure -i \
./mad.sh:3649:if [ "${UseTorCurlImpersonate}" == "true" ]; then
./mad.sh:3650: curl_impersonate=()
./mad.sh:3651: readarray -d $'' arrFiles < <(find "$ScriptDir" -maxdepth 1 -name "curl_*" -printf '%p\n' | sort -Vk1)
./mad.sh:3652: bFoundCurlHeader=false
./mad.sh:3656: curl_impersonate=($fil)
./mad.sh:3657: bFoundCurlHeader=true
./mad.sh:3661: if [ "$bFoundCurlHeader" == "false" ]; then
./mad.sh:3662: echo -e "${RED}[ERROR] Missing dependency \"curl-impersonate\"!${NC}"
./mad.sh:3665: echo -e "You'll need to download ${GREEN}\"curl-impersonate\"${NC}."
./mad.sh:3668: echo -e "The latest binary can be obtained on GitHub, search for \"curl-impersonate\""
./mad.sh:3670: echo -e " 1. Visit the page of curl-impersonate and add \"/releases/latest/\" at end of URL."
./mad.sh:3674: echo -e " 4. Download archive ${GREEN}\"curl-impersonate-vX.Y.Z.x86_64-linux-gnu.tar.gz\"${YELLOW}."
./mad.sh:3675: echo -e " 5. Extract files ${GREEN}\"curl-impersonate-ff\"${NC} and ${GREEN}\"curl_ff109\"${NC} next to this script."
./mad.sh:3678: echo -e "run $0 install_curl_impersonate\\n"
./mad.sh:3680: yes_or_no "Do you wish to download and extract latest curl_impersonate (using tor+curl)?" && {
./mad.sh:3681: UseTorCurlImpersonate=false
./mad.sh:3682: install_curl_impersonate
./mad.sh:3766: echo -e "[${YELLOW}Install curl_impersonate${NC}]: Downloads the latest binary for curl_impersonate from github repo (3 choices)"
./mad.sh:3767: printf " %s install_curl_impersonate\\n" "$0"
./mad.sh:3845:elif [[ "$arg1" == "install_curl_impersonate" ]]; then
./mad.sh:3846: install_curl_impersonate
./mad.sh:3877:if [ "${UseTorCurlImpersonate}" == "true" ]; then
./mad.sh:3878: printf "client: ${GREEN}Tor${NC} + ${BLUE}curl_impersonate${NC}\\n"
./mad.sh:3880: printf "client: ${GREEN}Tor${NC} + ${GREEN}curl${NC}\\n"
./plugins/pjscloud.sh:44: if [ "${UseTorCurlImpersonate}" == "true" ]; then
./plugins/pjscloud.sh:45: response=$("${curl_impersonate[@]}" --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" \
./plugins/pjscloud.sh:53: response=$(curl --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" \