DateTime: 25.03.08 Files: ./hosts/1fichier.sh ./hosts/9saves.sh ./hosts/acid.sh ./hosts/anarchaserver.sh ./hosts/anonfile.sh ./hosts/anonsharing.sh ./hosts/archived/nekofile.sh ./hosts/ateasystems.sh ./hosts/bedrive.sh ./hosts/biteblob.sh ./hosts/blackcloud_onion.sh ./hosts/bowfile.sh ./hosts/click.sh ./hosts/cyssoux.sh ./hosts/dailyuploads.sh ./hosts/dashfile.sh ./hosts/dataupload.sh ./hosts/dbree.sh ./hosts/depotkaz.sh ./hosts/desiupload.sh ./hosts/dictvm.sh ./hosts/discreetshare.sh ./hosts/dosya.sh ./hosts/downloadgg.sh ./hosts/eddowding.sh ./hosts/eternalhosting.sh ./hosts/euromussels.sh ./hosts/examples/ExampleNewHost.sh ./hosts/examples/up_example.sh ./hosts/familleflender.sh ./hosts/fileblade.sh ./hosts/fileditch.sh ./hosts/filedoge.sh ./hosts/filedot.sh ./hosts/filehaus.sh ./hosts/filesquid.sh ./hosts/firestorage.sh ./hosts/free4e.sh ./hosts/freesocial.sh ./hosts/gagneux.sh ./hosts/gofile.sh ./hosts/harrault.sh ./hosts/herbolistique.sh ./hosts/hexload.sh ./hosts/innocent.sh ./hosts/isupload.sh ./hosts/kraken.sh ./hosts/lainsafe.sh ./hosts/lainsafe_onion.sh ./hosts/linxx.sh ./hosts/mediafire.sh ./hosts/moocloud.sh ./hosts/nantes.sh ./hosts/netlib.sh ./hosts/nippy.sh ./hosts/nofile.sh ./hosts/offshorecat.sh ./hosts/oshi.sh ./hosts/pixeldrain.sh ./hosts/quax.sh ./hosts/ramsgaard.sh ./hosts/ranoz.sh ./hosts/sendnow.sh ./hosts/sendspace.sh ./hosts/shareonline.sh ./hosts/skrepr.sh ./hosts/soyjak.sh ./hosts/syspro.sh ./hosts/tempfileme.sh ./hosts/tempsh.sh ./hosts/torup.sh ./hosts/turboonion.sh ./hosts/up2share.sh ./hosts/uploadbay.sh ./hosts/uploadee.sh ./hosts/uploadev.sh ./hosts/uploadflix.sh ./hosts/uploadhive.sh ./hosts/up_1fichier.sh ./hosts/up_acid.sh ./hosts/up_anarchaserver.sh ./hosts/up_anonfile.sh ./hosts/up_anonsharing.sh ./hosts/up_ateasystems.sh ./hosts/up_axfc.sh ./hosts/up_bedrive.sh ./hosts/up_bowfile.sh ./hosts/up_cyssoux.sh ./hosts/up_dailyuploads.sh ./hosts/up_dashfile.sh ./hosts/up_dataupload.sh ./hosts/up_dbree.sh ./hosts/up_depotkaz.sh ./hosts/up_dictvm.sh ./hosts/up_dosya.sh ./hosts/up_eddowding.sh ./hosts/up_euromussels.sh ./hosts/up_familleflender.sh ./hosts/up_fileblade.sh ./hosts/up_fileditch.sh ./hosts/up_filehaus.sh ./hosts/up_fileland.sh ./hosts/up_filesquid.sh ./hosts/up_fireget.sh ./hosts/up_firestorage.sh ./hosts/up_free4e.sh ./hosts/up_freesocial.sh ./hosts/up_gagneux.sh ./hosts/up_gofile.sh ./hosts/up_harrault.sh ./hosts/up_herbolistique.sh ./hosts/up_hexload.sh ./hosts/up_innocent.sh ./hosts/up_isupload.sh ./hosts/up_kouploader.sh ./hosts/up_kraken.sh ./hosts/up_lainsafe.sh ./hosts/up_linxx.sh ./hosts/up_moocloud.sh ./hosts/up_nantes.sh ./hosts/up_netlib.sh ./hosts/up_nippy.sh ./hosts/up_nofile.sh ./hosts/up_offshorecat.sh ./hosts/up_oshi.sh ./hosts/up_pixeldrain.sh ./hosts/up_quax.sh ./hosts/up_ramsgaard.sh ./hosts/up_ranoz.sh ./hosts/up_sendnow.sh ./hosts/up_sendspace.sh ./hosts/up_shareonline.sh ./hosts/up_skrepr.sh ./hosts/up_soyjak.sh ./hosts/up_syspro.sh ./hosts/up_tempfileme.sh ./hosts/up_tempsh.sh ./hosts/up_torup.sh ./hosts/up_turboonion.sh ./hosts/up_uploadbay.sh ./hosts/up_uploadee.sh ./hosts/up_uploadev.sh ./hosts/up_uploadflix.sh ./hosts/up_uploadhive.sh ./hosts/up_uploadraja.sh ./hosts/up_uwabaki.sh ./hosts/up_yolobit.sh ./hosts/uwabaki.sh ./hosts/yolobit.sh ./hosts/youdbox.sh ./mad.sh ./plugins/AutoResetAndRetryDownloads.sh ./plugins/CatnapCtrlC.sh ./plugins/SkipUrlsInDownloadsCompletedTxt.sh ./plugins/examples/ExampleAddNewFuncAndCallOnSuccessfulDownload.sh ./plugins/examples/ExamplesMainHooks.sh ./plugins/ocr_captcha.sh ./plugins/pjscloud.sh MAD Audit of tor_curl (+10 lines after): (grep "tor_curl") _________________________________________________________________________ ./hosts/1fichier.sh:48: PAGE=$(tor_curl_request --insecure --max-time "$ConnectTimeout" -s "${remote_url}") ./hosts/1fichier.sh:49: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/1fichier.sh:50: debugHtml "${remote_url##*/?}" "prechk$y" "${PAGE}" ./hosts/1fichier.sh:51: fi ./hosts/1fichier.sh:52: file_information=$(grep -oP '(?<=)[^<]*?(?=)' <<< "${PAGE}") ./hosts/1fichier.sh:53: size=$(echo "${file_information}" | tail -n 1) ./hosts/1fichier.sh:54: filename=$(echo "${file_information}" | head -n 1) ./hosts/1fichier.sh:55: if [[ ! "$filename_override" == "" ]] ; then ./hosts/1fichier.sh:56: filename="$filename_override" ./hosts/1fichier.sh:57: fi ./hosts/1fichier.sh:58: filename=$(sanitize_file_or_folder_name "${filename}") -- ./hosts/1fichier.sh:160: cdn_request=$(tor_curl_request --insecure -s -L -b "${fich_cookie_jar}" -c "${fich_cookie_jar}" -F "submit=Download" -F "pass=${fich_user_provided_password}" -F "adz=${fich_adz_parameter}" "${remote_url}") ./hosts/1fichier.sh:161: target_file_link=$(echo "$cdn_request" | grep -A 2 '
' | grep -oP ' /dev/null ; then ./hosts/1fichier.sh:167: if $is_password_protected; then ./hosts/1fichier.sh:168: echo -e "${RED}ERROR: Incorrect password${NC}\nSince this download required a password, you might have copied it incorrectly?" ./hosts/1fichier.sh:169: passwordProtectedDownload "${remote_url}" ./hosts/1fichier.sh:170: exitDownloadError=true -- ./hosts/1fichier.sh:194: file_header=$(tor_curl_request --insecure -sSIL -e "${remote_url}" "${target_file_link}") ./hosts/1fichier.sh:195: file_size_bytes=$(grep -oPi '(?<=content-length: ).*' <<< "$file_header") ./hosts/1fichier.sh:196: file_size_bytes=${file_size_bytes//[$'\t\r\n']} ./hosts/1fichier.sh:197: download_inflight_path="${WorkDir}/.inflight/" ./hosts/1fichier.sh:198: completed_location="${WorkDir}/downloads/" ./hosts/1fichier.sh:199: file_path="${download_inflight_path}${filename}" ./hosts/1fichier.sh:200: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/1fichier.sh:201: debugHtml "${remote_url##*/?}" "fich_savehead${num_attempt}_${j}" "target_file_link: ${target_file_link}"$'\n'"${file_header}" ./hosts/1fichier.sh:202: fi ./hosts/1fichier.sh:203: if [[ -z "$file_header" ]] || [[ -z "$file_size_bytes" ]]; then ./hosts/1fichier.sh:204: continue -- ./hosts/1fichier.sh:261: tor_curl_request --insecure -e "${remote_url}" "${target_file_link}" -C - -o "${file_path}" ./hosts/1fichier.sh:262: rm -f "$flockDownload"; ./hosts/1fichier.sh:263: received_file_size=0 ./hosts/1fichier.sh:264: if [[ -f "$file_path" ]] ; then ./hosts/1fichier.sh:265: received_file_size=$(stat --format="%s" "$file_path" | tr -d '[:space:]') ./hosts/1fichier.sh:266: fi ./hosts/1fichier.sh:267: if [[ "${received_file_size}" -ne "${file_size_bytes}" ]]; then ./hosts/1fichier.sh:268: echo -e "${RED}ERROR: Size mismatch after downloading${NC}\nPerhaps you or 1fichier lost connection for a while?" ./hosts/1fichier.sh:269: if [[ "${finalAttempt}" == "true" ]] ; then ./hosts/1fichier.sh:270: droppedSizeBadDownload "${remote_url}" "${filename}" "${received_file_size}" ./hosts/1fichier.sh:271: fi -- ./hosts/1fichier.sh:354: PAGE=$(tor_curl_request --insecure --max-time "$ConnectTimeout" -c "${fich_cookie_jar}" -s "${remote_url}") ./hosts/1fichier.sh:355: if [[ -z ${PAGE} ]]; then ./hosts/1fichier.sh:356: rm -f "${fich_cookie_jar}" ./hosts/1fichier.sh:357: continue ./hosts/1fichier.sh:358: fi ./hosts/1fichier.sh:359: if grep -Eqi 'Warning !|Attention !' <<< "${PAGE}"; then ./hosts/1fichier.sh:360: rm -f "${fich_cookie_jar}" ./hosts/1fichier.sh:361: continue ./hosts/1fichier.sh:362: else ./hosts/1fichier.sh:363: fich_adz_parameter=$(grep -oPi 'name="adz" value="\K[^"]+' <<< "${PAGE}") ./hosts/1fichier.sh:364: if [[ $fich_adz_parameter ]]; then -- ./hosts/9saves.sh:90: response=$(tor_curl_request --insecure -L -s -b "${ns_cookie_jar}" -c "${ns_cookie_jar}" "$remote_url") ./hosts/9saves.sh:91: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/9saves.sh:92: debugHtml "${remote_url##*/}" "ns_dwnpage$i" "${response}" ./hosts/9saves.sh:93: fi ./hosts/9saves.sh:94: if [[ -z $response ]] ; then ./hosts/9saves.sh:95: if [[ $i == $maxfetchretries ]] ; then ./hosts/9saves.sh:96: rm -f "${ns_cookie_jar}"; ./hosts/9saves.sh:97: printf "\\n" ./hosts/9saves.sh:98: echo -e "${RED}| Failed to extract post link.${NC}" ./hosts/9saves.sh:99: warnAndRetryUnknownError=true ./hosts/9saves.sh:100: if [[ "${finalAttempt}" == "true" ]] ; then -- ./hosts/9saves.sh:139: response=$(tor_curl_request --insecure -L -s -X POST \ ./hosts/9saves.sh:140: -b "${ns_cookie_jar}" -c "${ns_cookie_jar}" \ ./hosts/9saves.sh:141: --data "$form_data" "https://9saves.com/") ./hosts/9saves.sh:142: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/9saves.sh:143: debugHtml "${remote_url##*/}" "ns_post" "form_data: ${form_data}"$'\n'"${response}" ./hosts/9saves.sh:144: fi ./hosts/9saves.sh:145: if [[ -z $response ]] ; then ./hosts/9saves.sh:146: rm -f "${ns_cookie_jar}"; ./hosts/9saves.sh:147: echo -e "${RED}| Failed to extract download link.${NC}" ./hosts/9saves.sh:148: warnAndRetryUnknownError=true ./hosts/9saves.sh:149: if [[ "${finalAttempt}" == "true" ]] ; then -- ./hosts/9saves.sh:188: file_header=$(tor_curl_request --insecure --head -L -s -b "${ns_cookie_jar}" -c "${ns_cookie_jar}" "$download_url") ./hosts/9saves.sh:189: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/9saves.sh:190: debugHtml "${remote_url##*/}" "ns_head$j" "download_url: ${download_url}"$'\n'"${file_header}" ./hosts/9saves.sh:191: fi ./hosts/9saves.sh:192: if [[ -z $file_header ]] ; then ./hosts/9saves.sh:193: if [[ $j == $maxfetchretries ]] ; then ./hosts/9saves.sh:194: rm -f "${ns_cookie_jar}"; ./hosts/9saves.sh:195: printf "\\n" ./hosts/9saves.sh:196: echo -e "${RED}| Failed to extract file info.${NC}" ./hosts/9saves.sh:197: warnAndRetryUnknownError=true ./hosts/9saves.sh:198: if [[ "${finalAttempt}" == "true" ]] ; then -- ./hosts/9saves.sh:292: tor_curl_request --insecure \ ./hosts/9saves.sh:293: -b "${ns_cookie_jar}" --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \ ./hosts/9saves.sh:294: "$download_url" \ ./hosts/9saves.sh:295: --continue-at - --output "$file_path" ./hosts/9saves.sh:296: else ./hosts/9saves.sh:297: tor_curl_request --insecure \ ./hosts/9saves.sh:298: -b "${ns_cookie_jar}" \ ./hosts/9saves.sh:299: "$download_url" \ ./hosts/9saves.sh:300: --continue-at - --output "$file_path" ./hosts/9saves.sh:301: fi ./hosts/9saves.sh:302: else ./hosts/9saves.sh:303: if [[ "${RateMonitorEnabled}" == "true" ]]; then ./hosts/9saves.sh:304: tor_curl_request --insecure \ ./hosts/9saves.sh:305: --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \ ./hosts/9saves.sh:306: -b "${ns_cookie_jar}" \ ./hosts/9saves.sh:307: -H "User-Agent: $RandomUA" \ ./hosts/9saves.sh:308: -H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8" \ ./hosts/9saves.sh:309: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/9saves.sh:310: -H "Accept-Encoding: gzip, deflate, br" \ ./hosts/9saves.sh:311: -H "Connection: keep-alive" \ ./hosts/9saves.sh:312: -H "Cookie: lng=eng" \ ./hosts/9saves.sh:313: -H "Upgrade-Insecure-Requests: 1" \ ./hosts/9saves.sh:314: -H "Sec-Fetch-Dest: document" \ -- ./hosts/9saves.sh:321: tor_curl_request --insecure \ ./hosts/9saves.sh:322: -b "${ns_cookie_jar}" \ ./hosts/9saves.sh:323: -H "User-Agent: $RandomUA" \ ./hosts/9saves.sh:324: -H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8" \ ./hosts/9saves.sh:325: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/9saves.sh:326: -H "Accept-Encoding: gzip, deflate, br" \ ./hosts/9saves.sh:327: -H "Connection: keep-alive" \ ./hosts/9saves.sh:328: -H "Cookie: lng=eng" \ ./hosts/9saves.sh:329: -H "Upgrade-Insecure-Requests: 1" \ ./hosts/9saves.sh:330: -H "Sec-Fetch-Dest: document" \ ./hosts/9saves.sh:331: -H "Sec-Fetch-Mode: navigate" \ -- ./hosts/anonfile.sh:96: response=$(tor_curl_request --insecure -L -s -b "${anon_cookie_jar}" -c "${anon_cookie_jar}" \ ./hosts/anonfile.sh:97: -w "\n\nHTTP_CODE: %{http_code}\nEFFECTIVE_URL: %{url_effective}\n" \ ./hosts/anonfile.sh:98: "$fixed_url") ./hosts/anonfile.sh:99: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/anonfile.sh:100: debugHtml "${remote_url##*/}" "anon_fetch$i" "${response}" ./hosts/anonfile.sh:101: fi ./hosts/anonfile.sh:102: if [[ -z $response ]] ; then ./hosts/anonfile.sh:103: rm -f "${anon_cookie_jar}"; ./hosts/anonfile.sh:104: if [[ $i == $maxfetchretries ]] ; then ./hosts/anonfile.sh:105: printf "\\n" ./hosts/anonfile.sh:106: echo -e "${RED}| Failed to extract download link [1]${NC}" -- ./hosts/anonfile.sh:186: response=$(tor_curl_request --insecure -L -s -X POST \ ./hosts/anonfile.sh:187: -b "${anon_cookie_jar}" -c "${anon_cookie_jar}" \ ./hosts/anonfile.sh:188: -w "\n\nHTTP_CODE: %{http_code}\nEFFECTIVE_URL: %{url_effective}\n" \ ./hosts/anonfile.sh:189: --data "$form_data" "$fixed_url") ./hosts/anonfile.sh:190: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/anonfile.sh:191: debugHtml "${remote_url##*/}" "anon_post1_$i" "${response}" ./hosts/anonfile.sh:192: fi ./hosts/anonfile.sh:193: if [[ -z $response ]] ; then ./hosts/anonfile.sh:194: rm -f "${anon_cookie_jar}"; ./hosts/anonfile.sh:195: if [[ $i == $maxfetchretries ]] ; then ./hosts/anonfile.sh:196: printf "\\n" -- ./hosts/anonfile.sh:240: tor_curl_request --insecure -s "$captcha_img_url" --output "$tmp_captcha_img" ./hosts/anonfile.sh:241: captcha_ocr_output=$(CaptchaOcrImageTesseract "$tmp_captcha_img" "NUMBERONLY" "ContrastStretch_5x90,Brightness_130") ./hosts/anonfile.sh:242: if [[ "${DebugPluginsEnabled}" == "true" ]]; then ./hosts/anonfile.sh:243: printf "\\n" ./hosts/anonfile.sh:244: echo -e "$captcha_ocr_output" ./hosts/anonfile.sh:245: fi ./hosts/anonfile.sh:246: captcha_code=$(grep -oP -m 1 "(?<=\[CAPTCHA_CODE\:).*?(?=\])" <<< "$captcha_ocr_output") ./hosts/anonfile.sh:247: rm -f "$tmp_captcha_img" ./hosts/anonfile.sh:248: rm -f "$captcha_ocr_output" ./hosts/anonfile.sh:249: local caplength=${#captcha_code} ./hosts/anonfile.sh:250: if [[ -z "$captcha_code" ]] || ((caplength != 4)) ; then -- ./hosts/anonfile.sh:340: response=$(tor_curl_request --insecure -L -s -X POST \ ./hosts/anonfile.sh:341: -b "${anon_cookie_jar}" -c "${anon_cookie_jar}" \ ./hosts/anonfile.sh:342: --data "$form_data" "$fixed_url") ./hosts/anonfile.sh:343: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/anonfile.sh:344: debugHtml "${remote_url##*/}" "anon_post2_$i" "url: ${fixed_url}"$'\n'"form_data: ${form_data}"$'\n'"${response}" ./hosts/anonfile.sh:345: fi ./hosts/anonfile.sh:346: if [[ -z $response ]] ; then ./hosts/anonfile.sh:347: if [[ $i == $maxfetchretries ]] ; then ./hosts/anonfile.sh:348: rm -f "${anon_cookie_jar}"; ./hosts/anonfile.sh:349: printf "\\n" ./hosts/anonfile.sh:350: echo -e "${RED}| Failed to extract download link [3].${NC}" -- ./hosts/anonfile.sh:519: tor_curl_request --insecure \ ./hosts/anonfile.sh:520: --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \ ./hosts/anonfile.sh:521: -b "${anon_cookie_jar}" -c "${anon_cookie_jar}" \ ./hosts/anonfile.sh:522: --referer "${fixed_url}" \ ./hosts/anonfile.sh:523: "$download_url" --output "$file_path" ./hosts/anonfile.sh:524: else ./hosts/anonfile.sh:525: tor_curl_request --insecure \ ./hosts/anonfile.sh:526: -b "${anon_cookie_jar}" -c "${anon_cookie_jar}" \ ./hosts/anonfile.sh:527: --referer "${fixed_url}" \ ./hosts/anonfile.sh:528: "$download_url" --output "$file_path" ./hosts/anonfile.sh:529: fi ./hosts/anonfile.sh:530: else ./hosts/anonfile.sh:531: if [[ "${RateMonitorEnabled}" == "true" ]]; then ./hosts/anonfile.sh:532: tor_curl_request --insecure \ ./hosts/anonfile.sh:533: --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \ ./hosts/anonfile.sh:534: -H "User-Agent: $RandomUA" \ ./hosts/anonfile.sh:535: -H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8" \ ./hosts/anonfile.sh:536: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/anonfile.sh:537: -H "Accept-Encoding: gzip, deflate, br" \ ./hosts/anonfile.sh:538: -H "Connection: keep-alive" \ ./hosts/anonfile.sh:539: -H "Cookie: lng=eng" \ ./hosts/anonfile.sh:540: -H "Upgrade-Insecure-Requests: 1" \ ./hosts/anonfile.sh:541: -H "Sec-Fetch-Dest: document" \ ./hosts/anonfile.sh:542: -H "Sec-Fetch-Mode: navigate" \ -- ./hosts/anonfile.sh:549: tor_curl_request --insecure \ ./hosts/anonfile.sh:550: -H "User-Agent: $RandomUA" \ ./hosts/anonfile.sh:551: -H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8" \ ./hosts/anonfile.sh:552: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/anonfile.sh:553: -H "Accept-Encoding: gzip, deflate, br" \ ./hosts/anonfile.sh:554: -H "Connection: keep-alive" \ ./hosts/anonfile.sh:555: -H "Cookie: lng=eng" \ ./hosts/anonfile.sh:556: -H "Upgrade-Insecure-Requests: 1" \ ./hosts/anonfile.sh:557: -H "Sec-Fetch-Dest: document" \ ./hosts/anonfile.sh:558: -H "Sec-Fetch-Mode: navigate" \ ./hosts/anonfile.sh:559: -H "Sec-Fetch-Site: same-origin" \ -- ./hosts/anonsharing.sh:91: response=$(tor_curl_request --insecure -i -s \ ./hosts/anonsharing.sh:92: -b "${ansh_cookie_jar}" -c "${ansh_cookie_jar}" \ ./hosts/anonsharing.sh:93: -F "u=$fileid" \ ./hosts/anonsharing.sh:94: -F "p=true" \ ./hosts/anonsharing.sh:95: "https://anonsharing.com/account/ajax/file_details") ./hosts/anonsharing.sh:96: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/anonsharing.sh:97: debugHtml "${remote_url##*/}" "ansh_postfileinfo$i" "${response}" ./hosts/anonsharing.sh:98: fi ./hosts/anonsharing.sh:99: if [[ -z $response ]] ; then ./hosts/anonsharing.sh:100: rm -f "${ansh_cookie_jar}"; ./hosts/anonsharing.sh:101: if [[ $i == $maxfetchretries ]] ; then -- ./hosts/anonsharing.sh:150: file_header=$(tor_curl_request --insecure --head -L -i -s \ ./hosts/anonsharing.sh:151: -b "${ansh_cookie_jar}" -c "${ansh_cookie_jar}" \ ./hosts/anonsharing.sh:152: "$download_url") ./hosts/anonsharing.sh:153: else ./hosts/anonsharing.sh:154: echo -e "${GREEN}# Fetching file info…${NC}" ./hosts/anonsharing.sh:155: ansh_host="${download_url/https:\/\//}" ./hosts/anonsharing.sh:156: ansh_host="${ansh_host%%\/*}" ./hosts/anonsharing.sh:157: rm -f "${WorkDir}/.temp/directhead" ./hosts/anonsharing.sh:158: file_header=$(tor_curl_request --insecure --head -H "Connection: keep-alive" -s -i \ ./hosts/anonsharing.sh:159: -H "Host: $ansh_host" \ ./hosts/anonsharing.sh:160: "$download_url" | ./hosts/anonsharing.sh:161: tee "${WorkDir}/.temp/directhead" & ./hosts/anonsharing.sh:162: sleep 6 ./hosts/anonsharing.sh:163: [ -s "${WorkDir}/.temp/directhead" ] ./hosts/anonsharing.sh:164: kill $! 2>/dev/null ./hosts/anonsharing.sh:165: ) ./hosts/anonsharing.sh:166: if [[ ! -f "${WorkDir}/.flocks/${remote_url//[^a-zA-Z0-9]/}" ]]; then ./hosts/anonsharing.sh:167: touch "${WorkDir}/.flocks/${remote_url//[^a-zA-Z0-9]/}" ./hosts/anonsharing.sh:168: fi -- ./hosts/anonsharing.sh:273: tor_curl_request --insecure --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval "$download_url" --output "$file_path" ./hosts/anonsharing.sh:274: else ./hosts/anonsharing.sh:275: tor_curl_request --insecure "$download_url" --output "$file_path" ./hosts/anonsharing.sh:276: fi ./hosts/anonsharing.sh:277: received_file_size=0 ./hosts/anonsharing.sh:278: if [[ -f "$file_path" ]] ; then ./hosts/anonsharing.sh:279: received_file_size=$(stat --format="%s" "$file_path" | tr -d '[:space:]') ./hosts/anonsharing.sh:280: fi ./hosts/anonsharing.sh:281: if CheckNoHtml "$remote_url" "$filename" "$file_path" "$((received_file_size - pd_presize))" ; then ./hosts/anonsharing.sh:282: containsHtml=false ./hosts/anonsharing.sh:283: else ./hosts/anonsharing.sh:284: containsHtml=true ./hosts/anonsharing.sh:285: fi -- ./hosts/ateasystems.sh:88: response=$(tor_curl_request --insecure -L -s "$remote_url") ./hosts/ateasystems.sh:89: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/ateasystems.sh:90: debugHtml "${remote_url##*/}" "atea_fetch$i" "${response}" ./hosts/ateasystems.sh:91: fi ./hosts/ateasystems.sh:92: if [[ -z $response ]] ; then ./hosts/ateasystems.sh:93: if [[ $i == $maxfetchretries ]] ; then ./hosts/ateasystems.sh:94: printf "\\n" ./hosts/ateasystems.sh:95: echo -e "${RED}| Failed to extract download link [1]${NC}" ./hosts/ateasystems.sh:96: warnAndRetryUnknownError=true ./hosts/ateasystems.sh:97: if [[ "${finalAttempt}" == "true" ]] ; then ./hosts/ateasystems.sh:98: failedRetryDownload "${remote_url}" "Failed to extract download link [1]" "" -- ./hosts/ateasystems.sh:220: tor_curl_request --insecure \ ./hosts/ateasystems.sh:221: --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \ ./hosts/ateasystems.sh:222: --data "$form_data" "$post_action" \ ./hosts/ateasystems.sh:223: --output "$file_path" --output "$file_path" ./hosts/ateasystems.sh:224: else ./hosts/ateasystems.sh:225: tor_curl_request --insecure \ ./hosts/ateasystems.sh:226: --data "$form_data" "$post_action" \ ./hosts/ateasystems.sh:227: --output "$file_path" --output "$file_path" ./hosts/ateasystems.sh:228: fi ./hosts/ateasystems.sh:229: else ./hosts/ateasystems.sh:230: if [[ "${RateMonitorEnabled}" == "true" ]]; then ./hosts/ateasystems.sh:231: tor_curl_request --insecure \ ./hosts/ateasystems.sh:232: --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \ ./hosts/ateasystems.sh:233: -H "User-Agent: $RandomUA" \ ./hosts/ateasystems.sh:234: --data "$form_data" "$post_action" \ ./hosts/ateasystems.sh:235: --output "$file_path" --output "$file_path" ./hosts/ateasystems.sh:236: else ./hosts/ateasystems.sh:237: tor_curl_request --insecure \ ./hosts/ateasystems.sh:238: -H "User-Agent: $RandomUA" \ ./hosts/ateasystems.sh:239: --data "$form_data" "$post_action" \ ./hosts/ateasystems.sh:240: --output "$file_path" --output "$file_path" ./hosts/ateasystems.sh:241: fi ./hosts/ateasystems.sh:242: fi ./hosts/ateasystems.sh:243: if CheckNoHtml "$remote_url" "$filename" "$file_path" "$((received_file_size - 0))" ; then ./hosts/ateasystems.sh:244: containsHtml=false ./hosts/ateasystems.sh:245: else ./hosts/ateasystems.sh:246: containsHtml=true ./hosts/ateasystems.sh:247: fi -- ./hosts/bedrive.sh:90: response=$(tor_curl_request --insecure -L -s \ ./hosts/bedrive.sh:91: -b "${bd_cookie_jar}" -c "${bd_cookie_jar}" \ ./hosts/bedrive.sh:92: "$remote_url") ./hosts/bedrive.sh:93: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/bedrive.sh:94: debugHtml "${remote_url##*/}" "bd_fetch$i" "${response}" ./hosts/bedrive.sh:95: fi ./hosts/bedrive.sh:96: if [[ -z $response ]] ; then ./hosts/bedrive.sh:97: rm -f "${bd_cookie_jar}"; ./hosts/bedrive.sh:98: if [[ $i == $maxfetchretries ]] ; then ./hosts/bedrive.sh:99: printf "\\n" ./hosts/bedrive.sh:100: echo -e "${RED}| Failed to extract download link.${NC}" -- ./hosts/bedrive.sh:149: file_header=$(tor_curl_request --insecure --head -L -i -s \ ./hosts/bedrive.sh:150: -b "${bd_cookie_jar}" -c "${bd_cookie_jar}" \ ./hosts/bedrive.sh:151: "$download_url") ./hosts/bedrive.sh:152: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/bedrive.sh:153: debugHtml "${remote_url##*/}" "bd_head$j" "download_url: ${download_url}"$'\n'"${file_header}" ./hosts/bedrive.sh:154: fi ./hosts/bedrive.sh:155: if [[ -z $file_header ]] ; then ./hosts/bedrive.sh:156: if [[ $j == $maxfetchretries ]] ; then ./hosts/bedrive.sh:157: rm -f "${bd_cookie_jar}"; ./hosts/bedrive.sh:158: printf "\\n" ./hosts/bedrive.sh:159: echo -e "${RED}| Failed to extract file info.${NC}" -- ./hosts/bedrive.sh:272: tor_curl_request --insecure -L -G --no-alpn \ ./hosts/bedrive.sh:273: -b "${bd_cookie_jar}" -c "${bd_cookie_jar}" --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \ ./hosts/bedrive.sh:274: --referer "$remote_url" "$download_url" \ ./hosts/bedrive.sh:275: --continue-at - --output "$file_path" ./hosts/bedrive.sh:276: else ./hosts/bedrive.sh:277: tor_curl_request --insecure -L -G --no-alpn \ ./hosts/bedrive.sh:278: -b "${bd_cookie_jar}" -c "${bd_cookie_jar}" \ ./hosts/bedrive.sh:279: --referer "$remote_url" "$download_url" \ ./hosts/bedrive.sh:280: --continue-at - --output "$file_path" ./hosts/bedrive.sh:281: fi ./hosts/bedrive.sh:282: else ./hosts/bedrive.sh:283: if [[ "${RateMonitorEnabled}" == "true" ]]; then ./hosts/bedrive.sh:284: tor_curl_request --insecure -L -G --no-alpn \ ./hosts/bedrive.sh:285: -b "${bd_cookie_jar}" -c "${bd_cookie_jar}" --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \ ./hosts/bedrive.sh:286: -H "User-Agent: $RandomUA" \ ./hosts/bedrive.sh:287: -H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8" \ ./hosts/bedrive.sh:288: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/bedrive.sh:289: -H "Accept-Encoding: gzip, deflate, br" \ ./hosts/bedrive.sh:290: -H "Connection: keep-alive" \ ./hosts/bedrive.sh:291: -H "Cookie: lng=eng" \ ./hosts/bedrive.sh:292: -H "Upgrade-Insecure-Requests: 1" \ ./hosts/bedrive.sh:293: -H "Sec-Fetch-Dest: document" \ ./hosts/bedrive.sh:294: -H "Sec-Fetch-Mode: navigate" \ -- ./hosts/bedrive.sh:300: tor_curl_request --insecure -L -G --no-alpn \ ./hosts/bedrive.sh:301: -b "${bd_cookie_jar}" -c "${bd_cookie_jar}" \ ./hosts/bedrive.sh:302: -H "User-Agent: $RandomUA" \ ./hosts/bedrive.sh:303: -H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8" \ ./hosts/bedrive.sh:304: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/bedrive.sh:305: -H "Accept-Encoding: gzip, deflate, br" \ ./hosts/bedrive.sh:306: -H "Connection: keep-alive" \ ./hosts/bedrive.sh:307: -H "Cookie: lng=eng" \ ./hosts/bedrive.sh:308: -H "Upgrade-Insecure-Requests: 1" \ ./hosts/bedrive.sh:309: -H "Sec-Fetch-Dest: document" \ ./hosts/bedrive.sh:310: -H "Sec-Fetch-Mode: navigate" \ -- ./hosts/biteblob.sh:96: response=$(tor_curl_request --insecure -L -s "${fixed_url}") ./hosts/biteblob.sh:97: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/biteblob.sh:98: debugHtml "${remote_url##*/}" "bite_dwnpage$j" "url: $fixed_url"$'\n'"${response}" ./hosts/biteblob.sh:99: fi ./hosts/biteblob.sh:100: if [[ -z $response ]] ; then ./hosts/biteblob.sh:101: if [[ $j == $maxfetchretries ]] ; then ./hosts/biteblob.sh:102: printf "\\n" ./hosts/biteblob.sh:103: echo -e "${RED}| Failed to extract download link${NC}" ./hosts/biteblob.sh:104: warnAndRetryUnknownError=true ./hosts/biteblob.sh:105: if [[ "${finalAttempt}" == "true" ]] ; then ./hosts/biteblob.sh:106: failedRetryDownload "${remote_url}" "" "" -- ./hosts/biteblob.sh:144: file_header=$(tor_curl_request --insecure --head -L -s "$download_url") ./hosts/biteblob.sh:145: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/biteblob.sh:146: debugHtml "${remote_url##*/}" "bite_head$j" "download_url: ${download_url}"$'\n'"${file_header}" ./hosts/biteblob.sh:147: fi ./hosts/biteblob.sh:148: if [[ -z $file_header ]] ; then ./hosts/biteblob.sh:149: if [[ $j == $maxfetchretries ]] ; then ./hosts/biteblob.sh:150: printf "\\n" ./hosts/biteblob.sh:151: echo -e "${RED}| Failed to extract file info.${NC}" ./hosts/biteblob.sh:152: warnAndRetryUnknownError=true ./hosts/biteblob.sh:153: if [[ "${finalAttempt}" == "true" ]] ; then ./hosts/biteblob.sh:154: failedRetryDownload "${remote_url}" "" "" -- ./hosts/biteblob.sh:227: tor_curl_request --insecure --referer "$file_url" "$download_url" --output "$file_path" ./hosts/biteblob.sh:228: rc=$? ./hosts/biteblob.sh:229: if ((rc != 0 )) ; then ./hosts/biteblob.sh:230: printf "${RED}Download Failed (bad exit status).${NC}" ./hosts/biteblob.sh:231: if [[ -f ${file_path} ]]; then ./hosts/biteblob.sh:232: printf "${YELLOW} Partial removed...${NC}" ./hosts/biteblob.sh:233: printf "\n\n" ./hosts/biteblob.sh:234: rm -f "${file_path}" ./hosts/biteblob.sh:235: else ./hosts/biteblob.sh:236: printf "\n\n" ./hosts/biteblob.sh:237: fi -- ./hosts/biteblob.sh:284: tor_curl_request --insecure --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval "$download_url" --continue-at - --output "$file_path" ./hosts/biteblob.sh:285: else ./hosts/biteblob.sh:286: tor_curl_request --insecure --referer "$file_url" "$download_url" --continue-at - --output "$file_path" ./hosts/biteblob.sh:287: fi ./hosts/biteblob.sh:288: received_file_size=0 ./hosts/biteblob.sh:289: if [[ -f "$file_path" ]] ; then ./hosts/biteblob.sh:290: received_file_size=$(stat --format="%s" "$file_path" | tr -d '[:space:]') ./hosts/biteblob.sh:291: fi ./hosts/biteblob.sh:292: if CheckNoHtml "$remote_url" "$filename" "$file_path" "$((received_file_size - pd_presize))" ; then ./hosts/biteblob.sh:293: containsHtml=false ./hosts/biteblob.sh:294: else ./hosts/biteblob.sh:295: containsHtml=true ./hosts/biteblob.sh:296: fi -- ./hosts/bowfile.sh:91: response=$(tor_curl_request --insecure -L -s -b "${bow_cookie_jar}" -c "${bow_cookie_jar}" \ ./hosts/bowfile.sh:92: -w "\n\nHTTP_CODE: %{http_code}\nEFFECTIVE_URL: %{url_effective}\n" \ ./hosts/bowfile.sh:93: "$fixed_url") ./hosts/bowfile.sh:94: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/bowfile.sh:95: debugHtml "${remote_url##*/}" "bow_fetch$i" "${response}" ./hosts/bowfile.sh:96: fi ./hosts/bowfile.sh:97: if [[ -z $response ]] ; then ./hosts/bowfile.sh:98: rm -f "${bow_cookie_jar}"; ./hosts/bowfile.sh:99: if [[ $i == $maxfetchretries ]] ; then ./hosts/bowfile.sh:100: printf "\\n" ./hosts/bowfile.sh:101: echo -e "${RED}| Failed to extract token link [1].${NC}" -- ./hosts/bowfile.sh:143: response=$(tor_curl_request --insecure -s --head \ ./hosts/bowfile.sh:144: -b "${bow_cookie_jar}" -c "${bow_cookie_jar}" \ ./hosts/bowfile.sh:145: -H "Host: bowfile.com" \ ./hosts/bowfile.sh:146: -w "\n\nHTTP_CODE: %{http_code}\nEFFECTIVE_URL: %{url_effective}\n" \ ./hosts/bowfile.sh:147: "$download_url") ./hosts/bowfile.sh:148: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/bowfile.sh:149: debugHtml "${remote_url##*/}" "bow_downurl" "download_url: ${download_url}"$'\n'"${response}" ./hosts/bowfile.sh:150: fi ./hosts/bowfile.sh:151: if [[ -z $response ]] ; then ./hosts/bowfile.sh:152: rm -f "${bow_cookie_jar}"; ./hosts/bowfile.sh:153: printf "\\n" -- ./hosts/bowfile.sh:182: file_header=$(tor_curl_request --insecure -L -sS -i --head \ ./hosts/bowfile.sh:183: -H "Host: $fshost" \ ./hosts/bowfile.sh:184: -w "\n\nHTTP_CODE: %{http_code}\nEFFECTIVE_URL: %{url_effective}\n" \ ./hosts/bowfile.sh:185: "$download_url") ./hosts/bowfile.sh:186: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/bowfile.sh:187: debugHtml "${remote_url##*/}" "bow_head$j" "download_url: ${download_url}"$'\n'"download_token: ${dltoken}"$'\n'"${file_header}" ./hosts/bowfile.sh:188: fi ./hosts/bowfile.sh:189: if [[ -z $file_header ]] ; then ./hosts/bowfile.sh:190: if [[ $j == $maxfetchretries ]] ; then ./hosts/bowfile.sh:191: printf "\\n" ./hosts/bowfile.sh:192: echo -e "${RED}| Failed to extract file info${NC}" -- ./hosts/bowfile.sh:299: tor_curl_request --insecure -L \ ./hosts/bowfile.sh:300: --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \ ./hosts/bowfile.sh:301: -H "Host: $fshost" \ ./hosts/bowfile.sh:302: --referer "https://bowfile.com/" \ ./hosts/bowfile.sh:303: "$download_url" --continue-at - --output "$file_path" ./hosts/bowfile.sh:304: else ./hosts/bowfile.sh:305: tor_curl_request --insecure -L \ ./hosts/bowfile.sh:306: -H "Host: $fshost" \ ./hosts/bowfile.sh:307: --referer "https://bowfile.com/" \ ./hosts/bowfile.sh:308: "$download_url" --continue-at - --output "$file_path" ./hosts/bowfile.sh:309: fi ./hosts/bowfile.sh:310: else ./hosts/bowfile.sh:311: if [[ "${RateMonitorEnabled}" == "true" ]]; then ./hosts/bowfile.sh:312: tor_curl_request --insecure -L \ ./hosts/bowfile.sh:313: --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \ ./hosts/bowfile.sh:314: -H "Host: $fshost" \ ./hosts/bowfile.sh:315: -H "User-Agent: $RandomUA" \ ./hosts/bowfile.sh:316: -H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8" \ ./hosts/bowfile.sh:317: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/bowfile.sh:318: -H "Accept-Encoding: gzip, deflate, br" \ ./hosts/bowfile.sh:319: -H "Connection: keep-alive" \ ./hosts/bowfile.sh:320: -H "Cookie: lng=eng" \ ./hosts/bowfile.sh:321: -H "Upgrade-Insecure-Requests: 1" \ ./hosts/bowfile.sh:322: -H "Sec-Fetch-Dest: document" \ -- ./hosts/bowfile.sh:329: tor_curl_request --insecure -L \ ./hosts/bowfile.sh:330: -H "Host: $fshost" \ ./hosts/bowfile.sh:331: -H "User-Agent: $RandomUA" \ ./hosts/bowfile.sh:332: -H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8" \ ./hosts/bowfile.sh:333: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/bowfile.sh:334: -H "Accept-Encoding: gzip, deflate, br" \ ./hosts/bowfile.sh:335: -H "Connection: keep-alive" \ ./hosts/bowfile.sh:336: -H "Cookie: lng=eng" \ ./hosts/bowfile.sh:337: -H "Upgrade-Insecure-Requests: 1" \ ./hosts/bowfile.sh:338: -H "Sec-Fetch-Dest: document" \ ./hosts/bowfile.sh:339: -H "Sec-Fetch-Mode: navigate" \ -- ./hosts/click.sh:143: response=$(tor_curl_request --insecure -L -s -b "${click_cookie_jar}" -c "${click_cookie_jar}" \ ./hosts/click.sh:144: -w "\n\nHTTP_CODE: %{http_code}\nEFFECTIVE_URL: %{url_effective}\n" \ ./hosts/click.sh:145: "$fixed_url") ./hosts/click.sh:146: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/click.sh:147: debugHtml "${remote_url##*/}" "click_fetch$i" "${response}" ./hosts/click.sh:148: fi ./hosts/click.sh:149: if [[ -z $response ]] ; then ./hosts/click.sh:150: rm -f "${click_cookie_jar}"; ./hosts/click.sh:151: if [[ $i == $maxfetchretries ]] ; then ./hosts/click.sh:152: printf "\\n" ./hosts/click.sh:153: echo -e "${RED}| Failed to extract download link [1].${NC}" -- ./hosts/click.sh:226: response=$(tor_curl_request --insecure -L -s -X POST \ ./hosts/click.sh:227: -b "${click_cookie_jar}" -c "${click_cookie_jar}" \ ./hosts/click.sh:228: --data "$form_data" "$fixed_url") ./hosts/click.sh:229: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/click.sh:230: debugHtml "${remote_url##*/}" "click_post1_$i" "url: ${fixed_url}"$'\n'"form_data: ${form_data}"$'\n'"${response}" ./hosts/click.sh:231: fi ./hosts/click.sh:232: if [[ -z $response ]] ; then ./hosts/click.sh:233: if [[ $i == $maxfetchretries ]] ; then ./hosts/click.sh:234: rm -f "${click_cookie_jar}"; ./hosts/click.sh:235: printf "\\n" ./hosts/click.sh:236: echo -e "${RED}| Failed to extract download link [2].${NC}" -- ./hosts/click.sh:345: response=$(tor_curl_request --insecure -L -s -X POST \ ./hosts/click.sh:346: -b "${click_cookie_jar}" -c "${click_cookie_jar}" \ ./hosts/click.sh:347: --data "$form_data" "$fixed_url") ./hosts/click.sh:348: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/click.sh:349: debugHtml "${remote_url##*/}" "click_post2_$i" "url: ${fixed_url}"$'\n'"form_data: ${form_data}"$'\n'"${response}" ./hosts/click.sh:350: fi ./hosts/click.sh:351: if [[ -z $response ]] ; then ./hosts/click.sh:352: if [[ $i == $maxfetchretries ]] ; then ./hosts/click.sh:353: rm -f "${click_cookie_jar}"; ./hosts/click.sh:354: printf "\\n" ./hosts/click.sh:355: echo -e "${RED}| Failed to extract download link [3].${NC}" -- ./hosts/click.sh:434: file_header=$(tor_curl_request --insecure -L --head -s --referer "${fixed_url}" "$download_url") ./hosts/click.sh:435: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/click.sh:436: debugHtml "${remote_url##*/}" "click_head$j" "download_url: ${download_url}"$'\n'"${file_header}" ./hosts/click.sh:437: fi ./hosts/click.sh:438: if [[ -z $file_header ]] ; then ./hosts/click.sh:439: if [[ $j == $maxfetchretries ]] ; then ./hosts/click.sh:440: rm -f "${click_cookie_jar}"; ./hosts/click.sh:441: printf "\\n" ./hosts/click.sh:442: echo -e "${RED}| Failed to extract file info${NC}" ./hosts/click.sh:443: warnAndRetryUnknownError=true ./hosts/click.sh:444: if [[ "${finalAttempt}" == "true" ]] ; then -- ./hosts/click.sh:535: tor_curl_request --insecure \ ./hosts/click.sh:536: --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \ ./hosts/click.sh:537: -b "${click_cookie_jar}" -c "${click_cookie_jar}" \ ./hosts/click.sh:538: -H "Host: $click_host" \ ./hosts/click.sh:539: --referer "$post_referer" \ ./hosts/click.sh:540: "$download_url" --continue-at - --output "$file_path" ./hosts/click.sh:541: else ./hosts/click.sh:542: tor_curl_request --insecure \ ./hosts/click.sh:543: -b "${click_cookie_jar}" -c "${click_cookie_jar}" \ ./hosts/click.sh:544: -H "Host: $click_host" \ ./hosts/click.sh:545: --referer "$post_referer" \ ./hosts/click.sh:546: "$download_url" --continue-at - --output "$file_path" ./hosts/click.sh:547: fi ./hosts/click.sh:548: else ./hosts/click.sh:549: if [[ "${RateMonitorEnabled}" == "true" ]]; then ./hosts/click.sh:550: tor_curl_request --insecure \ ./hosts/click.sh:551: --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \ ./hosts/click.sh:552: -b "${click_cookie_jar}" -c "${click_cookie_jar}" \ ./hosts/click.sh:553: -H "Host: $click_host" \ ./hosts/click.sh:554: -H "User-Agent: $RandomUA" \ ./hosts/click.sh:555: -H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8" \ ./hosts/click.sh:556: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/click.sh:557: -H "Accept-Encoding: gzip, deflate, br" \ ./hosts/click.sh:558: -H "Connection: keep-alive" \ ./hosts/click.sh:559: -H "Cookie: lng=eng" \ ./hosts/click.sh:560: -H "Upgrade-Insecure-Requests: 1" \ -- ./hosts/click.sh:568: tor_curl_request --insecure \ ./hosts/click.sh:569: -b "${click_cookie_jar}" -c "${click_cookie_jar}" \ ./hosts/click.sh:570: -H "Host: $click_host" \ ./hosts/click.sh:571: -H "User-Agent: $RandomUA" \ ./hosts/click.sh:572: -H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8" \ ./hosts/click.sh:573: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/click.sh:574: -H "Accept-Encoding: gzip, deflate, br" \ ./hosts/click.sh:575: -H "Connection: keep-alive" \ ./hosts/click.sh:576: -H "Cookie: lng=eng" \ ./hosts/click.sh:577: -H "Upgrade-Insecure-Requests: 1" \ ./hosts/click.sh:578: -H "Sec-Fetch-Dest: document" \ -- ./hosts/dailyuploads.sh:97: response=$(tor_curl_request --insecure -L -s -b "${daily_cookie_jar}" -c "${daily_cookie_jar}" \ ./hosts/dailyuploads.sh:98: -w "\n\nHTTP_CODE: %{http_code}\nEFFECTIVE_URL: %{url_effective}\n" \ ./hosts/dailyuploads.sh:99: "$fixed_url") ./hosts/dailyuploads.sh:100: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/dailyuploads.sh:101: debugHtml "${remote_url##*/}" "daily_fetch$i" "${response}" ./hosts/dailyuploads.sh:102: fi ./hosts/dailyuploads.sh:103: if [[ -z $response ]] ; then ./hosts/dailyuploads.sh:104: rm -f "${daily_cookie_jar}"; ./hosts/dailyuploads.sh:105: if [[ $i == $maxfetchretries ]] ; then ./hosts/dailyuploads.sh:106: printf "\\n" ./hosts/dailyuploads.sh:107: echo -e "${RED}| Failed to extract download link [1].${NC}" -- ./hosts/dailyuploads.sh:139: tor_curl_request --insecure -s "$captcha_img_url" --output "$tmp_captcha_img" ./hosts/dailyuploads.sh:140: captcha_ocr_output=$(CaptchaOcrImageTesseract "$tmp_captcha_img" "NUMBERONLY" "ContrastStretch_5x90,Brightness_130") ./hosts/dailyuploads.sh:141: if [[ "${DebugPluginsEnabled}" == "true" ]]; then ./hosts/dailyuploads.sh:142: printf "\\n" ./hosts/dailyuploads.sh:143: echo -e "$captcha_ocr_output" ./hosts/dailyuploads.sh:144: fi ./hosts/dailyuploads.sh:145: captcha_code=$(grep -oP -m 1 "(?<=\[CAPTCHA_CODE\:).*?(?=\])" <<< "$captcha_ocr_output") ./hosts/dailyuploads.sh:146: rm -f "$tmp_captcha_img" ./hosts/dailyuploads.sh:147: rm -f "$captcha_ocr_output" ./hosts/dailyuploads.sh:148: local caplength=${#captcha_code} ./hosts/dailyuploads.sh:149: if [[ -z "$captcha_code" ]] || ((caplength != 4)) ; then -- ./hosts/dailyuploads.sh:286: response=$(tor_curl_request --insecure -L -s -X POST \ ./hosts/dailyuploads.sh:287: -b "${daily_cookie_jar}" -c "${daily_cookie_jar}" \ ./hosts/dailyuploads.sh:288: --data "$form_data" "$fixed_url") ./hosts/dailyuploads.sh:289: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/dailyuploads.sh:290: debugHtml "${remote_url##*/}" "daily_post2_$i" "url: ${fixed_url}"$'\n'"form_data: ${form_data}"$'\n'"${response}" ./hosts/dailyuploads.sh:291: fi ./hosts/dailyuploads.sh:292: fi ./hosts/dailyuploads.sh:293: if [[ -z $response ]] ; then ./hosts/dailyuploads.sh:294: if [[ $i == $maxfetchretries ]] ; then ./hosts/dailyuploads.sh:295: rm -f "${daily_cookie_jar}"; ./hosts/dailyuploads.sh:296: printf "\\n" -- ./hosts/dailyuploads.sh:392: file_header=$(tor_curl_request -i -s --head \ ./hosts/dailyuploads.sh:393: -b "${daily_cookie_jar}" -c "${daily_cookie_jar}" \ ./hosts/dailyuploads.sh:394: --referer "${fixed_url}" \ ./hosts/dailyuploads.sh:395: "$download_url") ./hosts/dailyuploads.sh:396: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/dailyuploads.sh:397: debugHtml "${remote_url##*/}" "daily_head$j" "download_url: ${download_url}"$'\n'"${file_header}" ./hosts/dailyuploads.sh:398: fi ./hosts/dailyuploads.sh:399: if [[ -z $file_header ]] ; then ./hosts/dailyuploads.sh:400: if [[ $j == $maxfetchretries ]] ; then ./hosts/dailyuploads.sh:401: rm -f "${daily_cookie_jar}"; ./hosts/dailyuploads.sh:402: printf "\\n" -- ./hosts/dailyuploads.sh:498: tor_curl_request --insecure \ ./hosts/dailyuploads.sh:499: --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \ ./hosts/dailyuploads.sh:500: -b "${daily_cookie_jar}" -c "${daily_cookie_jar}" \ ./hosts/dailyuploads.sh:501: --referer "${fixed_url}" \ ./hosts/dailyuploads.sh:502: "$download_url" --continue-at - --output "$file_path" ./hosts/dailyuploads.sh:503: else ./hosts/dailyuploads.sh:504: tor_curl_request --insecure \ ./hosts/dailyuploads.sh:505: -b "${daily_cookie_jar}" -c "${daily_cookie_jar}" \ ./hosts/dailyuploads.sh:506: --referer "${fixed_url}" \ ./hosts/dailyuploads.sh:507: "$download_url" --continue-at - --output "$file_path" ./hosts/dailyuploads.sh:508: fi ./hosts/dailyuploads.sh:509: else ./hosts/dailyuploads.sh:510: if [[ "${RateMonitorEnabled}" == "true" ]]; then ./hosts/dailyuploads.sh:511: tor_curl_request --insecure \ ./hosts/dailyuploads.sh:512: --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \ ./hosts/dailyuploads.sh:513: -H "User-Agent: $RandomUA" \ ./hosts/dailyuploads.sh:514: -H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8" \ ./hosts/dailyuploads.sh:515: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/dailyuploads.sh:516: -H "Accept-Encoding: gzip, deflate, br" \ ./hosts/dailyuploads.sh:517: -H "Connection: keep-alive" \ ./hosts/dailyuploads.sh:518: -H "Cookie: lng=eng" \ ./hosts/dailyuploads.sh:519: -H "Upgrade-Insecure-Requests: 1" \ ./hosts/dailyuploads.sh:520: -H "Sec-Fetch-Dest: document" \ ./hosts/dailyuploads.sh:521: -H "Sec-Fetch-Mode: navigate" \ -- ./hosts/dailyuploads.sh:528: tor_curl_request --insecure \ ./hosts/dailyuploads.sh:529: -H "User-Agent: $RandomUA" \ ./hosts/dailyuploads.sh:530: -H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8" \ ./hosts/dailyuploads.sh:531: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/dailyuploads.sh:532: -H "Accept-Encoding: gzip, deflate, br" \ ./hosts/dailyuploads.sh:533: -H "Connection: keep-alive" \ ./hosts/dailyuploads.sh:534: -H "Cookie: lng=eng" \ ./hosts/dailyuploads.sh:535: -H "Upgrade-Insecure-Requests: 1" \ ./hosts/dailyuploads.sh:536: -H "Sec-Fetch-Dest: document" \ ./hosts/dailyuploads.sh:537: -H "Sec-Fetch-Mode: navigate" \ ./hosts/dailyuploads.sh:538: -H "Sec-Fetch-Site: same-origin" \ -- ./hosts/dashfile.sh:90: response=$(tor_curl_request --insecure -L -s -b "${dash_cookie_jar}" -c "${dash_cookie_jar}" \ ./hosts/dashfile.sh:91: -w "\n\nHTTP_CODE: %{http_code}\nEFFECTIVE_URL: %{url_effective}\n" \ ./hosts/dashfile.sh:92: "$remote_url") ./hosts/dashfile.sh:93: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/dashfile.sh:94: debugHtml "${remote_url##*/}" "dash_fetch$i" "${response}" ./hosts/dashfile.sh:95: fi ./hosts/dashfile.sh:96: if [[ -z $response ]] ; then ./hosts/dashfile.sh:97: rm -f "${dash_cookie_jar}"; ./hosts/dashfile.sh:98: if [[ $i == $maxfetchretries ]] ; then ./hosts/dashfile.sh:99: printf "\\n" ./hosts/dashfile.sh:100: echo -e "${RED}| Failed to extract download link [1]${NC}" -- ./hosts/dashfile.sh:177: response=$(tor_curl_request --insecure -L -s -X POST \ ./hosts/dashfile.sh:178: -b "${dash_cookie_jar}" -c "${dash_cookie_jar}" \ ./hosts/dashfile.sh:179: --data "$form_data" "$remote_url") ./hosts/dashfile.sh:180: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/dashfile.sh:181: debugHtml "${remote_url##*/}" "dash_post1_$i" "url: ${remote_url}"$'\n'"form_data: ${form_data}"$'\n'"${response}" ./hosts/dashfile.sh:182: fi ./hosts/dashfile.sh:183: if [[ -z $response ]] ; then ./hosts/dashfile.sh:184: if [[ $i == $maxfetchretries ]] ; then ./hosts/dashfile.sh:185: rm -f "${dash_cookie_jar}"; ./hosts/dashfile.sh:186: printf "\\n" ./hosts/dashfile.sh:187: echo -e "${RED}| Failed to extract download link [4]${NC}" -- ./hosts/dashfile.sh:308: response=$(tor_curl_request --insecure -L -s -X POST \ ./hosts/dashfile.sh:309: -b "${dash_cookie_jar}" -c "${dash_cookie_jar}" \ ./hosts/dashfile.sh:310: --data "$form_data" "$remote_url") ./hosts/dashfile.sh:311: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/dashfile.sh:312: debugHtml "${remote_url##*/}" "dash_post2_$i" "url: ${remote_url}"$'\n'"form_data: ${form_data}"$'\n'"${response}" ./hosts/dashfile.sh:313: fi ./hosts/dashfile.sh:314: if [[ -z $response ]] ; then ./hosts/dashfile.sh:315: if [[ $i == $maxfetchretries ]] ; then ./hosts/dashfile.sh:316: rm -f "${dash_cookie_jar}"; ./hosts/dashfile.sh:317: printf "\\n" ./hosts/dashfile.sh:318: echo -e "${RED}| Failed to extract download link [7]${NC}" -- ./hosts/dashfile.sh:397: file_header=$(tor_curl_request --insecure -L --head -s --referer "${fixed_url}" "$download_url") ./hosts/dashfile.sh:398: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/dashfile.sh:399: debugHtml "${remote_url##*/}" "dash_head$j" "download_url: ${download_url}"$'\n'"${file_header}" ./hosts/dashfile.sh:400: fi ./hosts/dashfile.sh:401: if [[ -z $file_header ]] ; then ./hosts/dashfile.sh:402: if [[ $j == $maxfetchretries ]] ; then ./hosts/dashfile.sh:403: rm -f "${dash_cookie_jar}"; ./hosts/dashfile.sh:404: printf "\\n" ./hosts/dashfile.sh:405: echo -e "${RED}| Failed to extract file info${NC}" ./hosts/dashfile.sh:406: warnAndRetryUnknownError=true ./hosts/dashfile.sh:407: if [[ "${finalAttempt}" == "true" ]] ; then -- ./hosts/dashfile.sh:497: tor_curl_request --insecure \ ./hosts/dashfile.sh:498: --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \ ./hosts/dashfile.sh:499: -b "${dash_cookie_jar}" -c "${dash_cookie_jar}" \ ./hosts/dashfile.sh:500: "$download_url" --continue-at - --output "$file_path" ./hosts/dashfile.sh:501: else ./hosts/dashfile.sh:502: tor_curl_request --insecure \ ./hosts/dashfile.sh:503: -b "${dash_cookie_jar}" -c "${dash_cookie_jar}" \ ./hosts/dashfile.sh:504: "$download_url" --continue-at - --output "$file_path" ./hosts/dashfile.sh:505: fi ./hosts/dashfile.sh:506: else ./hosts/dashfile.sh:507: if [[ "${RateMonitorEnabled}" == "true" ]]; then ./hosts/dashfile.sh:508: tor_curl_request --insecure \ ./hosts/dashfile.sh:509: --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \ ./hosts/dashfile.sh:510: -b "${dash_cookie_jar}" -c "${dash_cookie_jar}" \ ./hosts/dashfile.sh:511: -H "User-Agent: $RandomUA" \ ./hosts/dashfile.sh:512: -H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8" \ ./hosts/dashfile.sh:513: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/dashfile.sh:514: -H "Accept-Encoding: gzip, deflate, br" \ ./hosts/dashfile.sh:515: -H "Connection: keep-alive" \ ./hosts/dashfile.sh:516: -H "Cookie: lng=eng" \ ./hosts/dashfile.sh:517: -H "Upgrade-Insecure-Requests: 1" \ ./hosts/dashfile.sh:518: -H "Sec-Fetch-Dest: document" \ -- ./hosts/dashfile.sh:524: tor_curl_request --insecure \ ./hosts/dashfile.sh:525: -b "${dash_cookie_jar}" -c "${dash_cookie_jar}" \ ./hosts/dashfile.sh:526: -H "User-Agent: $RandomUA" \ ./hosts/dashfile.sh:527: -H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8" \ ./hosts/dashfile.sh:528: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/dashfile.sh:529: -H "Accept-Encoding: gzip, deflate, br" \ ./hosts/dashfile.sh:530: -H "Connection: keep-alive" \ ./hosts/dashfile.sh:531: -H "Cookie: lng=eng" \ ./hosts/dashfile.sh:532: -H "Upgrade-Insecure-Requests: 1" \ ./hosts/dashfile.sh:533: -H "Sec-Fetch-Dest: document" \ ./hosts/dashfile.sh:534: -H "Sec-Fetch-Mode: navigate" \ -- ./hosts/dataupload.sh:90: response=$(tor_curl_request --insecure -L -s -b "${dup_cookie_jar}" -c "${dup_cookie_jar}" "$remote_url") ./hosts/dataupload.sh:91: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/dataupload.sh:92: debugHtml "${remote_url##*/}" "dup_dwnpage$i" "${response}" ./hosts/dataupload.sh:93: fi ./hosts/dataupload.sh:94: if [[ -z $response ]] ; then ./hosts/dataupload.sh:95: rm -f "${dup_cookie_jar}"; ./hosts/dataupload.sh:96: if [[ $i == $maxfetchretries ]] ; then ./hosts/dataupload.sh:97: printf "\\n" ./hosts/dataupload.sh:98: echo -e "${RED}| Failed to extract download link.${NC}" ./hosts/dataupload.sh:99: warnAndRetryUnknownError=true ./hosts/dataupload.sh:100: if [[ "${finalAttempt}" == "true" ]] ; then -- ./hosts/dataupload.sh:166: response=$(tor_curl_request --insecure -svo. -X POST \ ./hosts/dataupload.sh:167: -b "${dup_cookie_jar}" -c "${dup_cookie_jar}" \ ./hosts/dataupload.sh:168: --data-raw "$form_data" "$post_action" 2>&1) ./hosts/dataupload.sh:169: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/dataupload.sh:170: debugHtml "${remote_url##*/}" "dup_post" "post_action: ${post_action}"$'\n'"form_data: ${form_data}"$'\n'"${response}" ./hosts/dataupload.sh:171: fi ./hosts/dataupload.sh:172: if [[ -z $response ]] ; then ./hosts/dataupload.sh:173: if [[ $i == $maxfetchretries ]] ; then ./hosts/dataupload.sh:174: rm -f "${dup_cookie_jar}"; ./hosts/dataupload.sh:175: printf "\\n" ./hosts/dataupload.sh:176: echo -e "${RED}| Failed to extract download link [3].${NC}" -- ./hosts/dataupload.sh:234: file_header=$(tor_curl_request --insecure -L --head -s "$download_url") ./hosts/dataupload.sh:235: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/dataupload.sh:236: debugHtml "${remote_url##*/}" "dup_head$j" "download_url: ${download_url}"$'\n'"${file_header}" ./hosts/dataupload.sh:237: fi ./hosts/dataupload.sh:238: if [[ -z $file_header ]] ; then ./hosts/dataupload.sh:239: if [[ $j == $maxfetchretries ]] ; then ./hosts/dataupload.sh:240: rm -f "${dup_cookie_jar}"; ./hosts/dataupload.sh:241: printf "\\n" ./hosts/dataupload.sh:242: echo -e "${RED}| Failed to extract file info [1]${NC}" ./hosts/dataupload.sh:243: warnAndRetryUnknownError=true ./hosts/dataupload.sh:244: if [[ "${finalAttempt}" == "true" ]] ; then -- ./hosts/dataupload.sh:351: tor_curl_request --insecure \ ./hosts/dataupload.sh:352: --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \ ./hosts/dataupload.sh:353: -b "${dup_cookie_jar}" -c "${dup_cookie_jar}" \ ./hosts/dataupload.sh:354: -H "Host: dataupload.net" \ ./hosts/dataupload.sh:355: "$download_url" --continue-at - --output "$file_path" ./hosts/dataupload.sh:356: else ./hosts/dataupload.sh:357: tor_curl_request --insecure \ ./hosts/dataupload.sh:358: -b "${dup_cookie_jar}" -c "${dup_cookie_jar}" \ ./hosts/dataupload.sh:359: -H "Host: dataupload.net" \ ./hosts/dataupload.sh:360: "$download_url" --continue-at - --output "$file_path" ./hosts/dataupload.sh:361: fi ./hosts/dataupload.sh:362: else ./hosts/dataupload.sh:363: if [[ "${RateMonitorEnabled}" == "true" ]]; then ./hosts/dataupload.sh:364: tor_curl_request --insecure \ ./hosts/dataupload.sh:365: --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \ ./hosts/dataupload.sh:366: -b "${dup_cookie_jar}" -c "${dup_cookie_jar}" \ ./hosts/dataupload.sh:367: -H "Host: dataupload.net" \ ./hosts/dataupload.sh:368: -H "User-Agent: $RandomUA" \ ./hosts/dataupload.sh:369: -H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8" \ ./hosts/dataupload.sh:370: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/dataupload.sh:371: -H "Accept-Encoding: gzip, deflate, br" \ ./hosts/dataupload.sh:372: -H "Connection: keep-alive" \ ./hosts/dataupload.sh:373: -H "Cookie: lng=eng" \ ./hosts/dataupload.sh:374: -H "Upgrade-Insecure-Requests: 1" \ -- ./hosts/dataupload.sh:381: tor_curl_request --insecure \ ./hosts/dataupload.sh:382: -b "${dup_cookie_jar}" -c "${dup_cookie_jar}" \ ./hosts/dataupload.sh:383: -H "Host: dataupload.net" \ ./hosts/dataupload.sh:384: -H "User-Agent: $RandomUA" \ ./hosts/dataupload.sh:385: -H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8" \ ./hosts/dataupload.sh:386: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/dataupload.sh:387: -H "Accept-Encoding: gzip, deflate, br" \ ./hosts/dataupload.sh:388: -H "Connection: keep-alive" \ ./hosts/dataupload.sh:389: -H "Cookie: lng=eng" \ ./hosts/dataupload.sh:390: -H "Upgrade-Insecure-Requests: 1" \ ./hosts/dataupload.sh:391: -H "Sec-Fetch-Dest: document" \ -- ./hosts/desiupload.sh:90: response=$(tor_curl_request --insecure -L -s -b "${desi_cookie_jar}" -c "${desi_cookie_jar}" "$remote_url") ./hosts/desiupload.sh:91: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/desiupload.sh:92: debugHtml "${remote_url##*/}" "desi_fetch$i" "${response}" ./hosts/desiupload.sh:93: fi ./hosts/desiupload.sh:94: if [[ -z $response ]] ; then ./hosts/desiupload.sh:95: rm -f "${desi_cookie_jar}"; ./hosts/desiupload.sh:96: if [[ $i == $maxfetchretries ]] ; then ./hosts/desiupload.sh:97: printf "\\n" ./hosts/desiupload.sh:98: echo -e "${RED}| Failed to extract download link [1]${NC}" ./hosts/desiupload.sh:99: warnAndRetryUnknownError=true ./hosts/desiupload.sh:100: if [[ "${finalAttempt}" == "true" ]] ; then -- ./hosts/desiupload.sh:202: response=$(tor_curl_request --insecure -L -s -X POST \ ./hosts/desiupload.sh:203: -b "${desi_cookie_jar}" -c "${desi_cookie_jar}" \ ./hosts/desiupload.sh:204: --data "$form_data" "$remote_url") ./hosts/desiupload.sh:205: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/desiupload.sh:206: debugHtml "${remote_url##*/}" "desi_post_$i" "url: ${remote_url}"$'\n'"form_data: ${form_data}"$'\n'"${response}" ./hosts/desiupload.sh:207: fi ./hosts/desiupload.sh:208: if [[ -z $response ]] ; then ./hosts/desiupload.sh:209: if [[ $i == $maxfetchretries ]] ; then ./hosts/desiupload.sh:210: rm -f "${desi_cookie_jar}"; ./hosts/desiupload.sh:211: printf "\\n" ./hosts/desiupload.sh:212: echo -e "${RED}| Failed to extract download link [7]${NC}" -- ./hosts/desiupload.sh:306: file_header=$(tor_curl_request --insecure -L --head -s --referer "${fixed_url}" "$download_url") ./hosts/desiupload.sh:307: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/desiupload.sh:308: debugHtml "${remote_url##*/}" "desi_head$j" "download_url: ${download_url}"$'\n'"${file_header}" ./hosts/desiupload.sh:309: fi ./hosts/desiupload.sh:310: if [[ -z $file_header ]] ; then ./hosts/desiupload.sh:311: if [[ $j == $maxfetchretries ]] ; then ./hosts/desiupload.sh:312: rm -f "${desi_cookie_jar}"; ./hosts/desiupload.sh:313: printf "\\n" ./hosts/desiupload.sh:314: echo -e "${RED}| Failed to extract file info${NC}" ./hosts/desiupload.sh:315: warnAndRetryUnknownError=true ./hosts/desiupload.sh:316: if [[ "${finalAttempt}" == "true" ]] ; then -- ./hosts/desiupload.sh:406: tor_curl_request --insecure \ ./hosts/desiupload.sh:407: --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \ ./hosts/desiupload.sh:408: -b "${desi_cookie_jar}" -c "${desi_cookie_jar}" \ ./hosts/desiupload.sh:409: "$download_url" --continue-at - --output "$file_path" ./hosts/desiupload.sh:410: else ./hosts/desiupload.sh:411: tor_curl_request --insecure \ ./hosts/desiupload.sh:412: -b "${desi_cookie_jar}" -c "${desi_cookie_jar}" \ ./hosts/desiupload.sh:413: "$download_url" --continue-at - --output "$file_path" ./hosts/desiupload.sh:414: fi ./hosts/desiupload.sh:415: else ./hosts/desiupload.sh:416: if [[ "${RateMonitorEnabled}" == "true" ]]; then ./hosts/desiupload.sh:417: tor_curl_request --insecure \ ./hosts/desiupload.sh:418: --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \ ./hosts/desiupload.sh:419: -b "${desi_cookie_jar}" -c "${desi_cookie_jar}" \ ./hosts/desiupload.sh:420: -H "User-Agent: $RandomUA" \ ./hosts/desiupload.sh:421: -H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8" \ ./hosts/desiupload.sh:422: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/desiupload.sh:423: -H "Accept-Encoding: gzip, deflate, br" \ ./hosts/desiupload.sh:424: -H "Connection: keep-alive" \ ./hosts/desiupload.sh:425: -H "Cookie: lng=eng" \ ./hosts/desiupload.sh:426: -H "Upgrade-Insecure-Requests: 1" \ ./hosts/desiupload.sh:427: -H "Sec-Fetch-Dest: document" \ -- ./hosts/desiupload.sh:433: tor_curl_request --insecure \ ./hosts/desiupload.sh:434: -b "${desi_cookie_jar}" -c "${desi_cookie_jar}" \ ./hosts/desiupload.sh:435: -H "User-Agent: $RandomUA" \ ./hosts/desiupload.sh:436: -H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8" \ ./hosts/desiupload.sh:437: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/desiupload.sh:438: -H "Accept-Encoding: gzip, deflate, br" \ ./hosts/desiupload.sh:439: -H "Connection: keep-alive" \ ./hosts/desiupload.sh:440: -H "Cookie: lng=eng" \ ./hosts/desiupload.sh:441: -H "Upgrade-Insecure-Requests: 1" \ ./hosts/desiupload.sh:442: -H "Sec-Fetch-Dest: document" \ ./hosts/desiupload.sh:443: -H "Sec-Fetch-Mode: navigate" \ -- ./hosts/dosya.sh:109: PAGE=$(tor_curl_request --insecure --max-time "$ConnectTimeout" -L -s \ ./hosts/dosya.sh:110: -c "${dosya_cookie_jar}" \ ./hosts/dosya.sh:111: "${remote_url}") ./hosts/dosya.sh:112: else ./hosts/dosya.sh:113: PAGE=$(tor_curl_request --insecure --max-time "$ConnectTimeout" -L -s \ ./hosts/dosya.sh:114: -H "User-Agent: $RandomUA" \ ./hosts/dosya.sh:115: -H 'Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8' \ ./hosts/dosya.sh:116: -H 'Accept-Language: en-US,en;q=0.5' \ ./hosts/dosya.sh:117: -H 'Accept-Encoding: gzip, deflate, br' -H 'Connection: keep-alive' -H 'Upgrade-Insecure-Requests: 1' \ ./hosts/dosya.sh:118: -H 'Sec-Fetch-Dest: document' -H 'Sec-Fetch-Mode: navigate' -H 'Sec-Fetch-Site: none' -H 'Sec-Fetch-User: ?1' \ ./hosts/dosya.sh:119: -c "${dosya_cookie_jar}" \ ./hosts/dosya.sh:120: "${remote_url}") ./hosts/dosya.sh:121: fi ./hosts/dosya.sh:122: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/dosya.sh:123: debugHtml "${remote_url##*/}" "dos_fetch_$i" "remote_url: ${remote_url}"$'\n'"User-Agent: $RandomUA"$'\n'"${PAGE}" -- ./hosts/dosya.sh:173: file_header=$(tor_curl_request_extended --insecure --head -L -s \ ./hosts/dosya.sh:174: -H "Cookie: filehosting=$cookie_filehosting" \ ./hosts/dosya.sh:175: -H "Host: www.dosyaupload.com" \ ./hosts/dosya.sh:176: -w "\n\nHTTP_CODE: %{http_code}\nEFFECTIVE_URL: %{url_effective}\n" \ ./hosts/dosya.sh:177: -b "${dosya_cookie_jar}" -c "${dosya_cookie_jar}" "$dos_url") ./hosts/dosya.sh:178: else ./hosts/dosya.sh:179: file_header=$(tor_curl_request_extended --insecure --head -L -s \ ./hosts/dosya.sh:180: -w "\n\nHTTP_CODE: %{http_code}\nEFFECTIVE_URL: %{url_effective}\n" \ ./hosts/dosya.sh:181: -H "User-Agent: $RandomUA" \ ./hosts/dosya.sh:182: -H "Cookie: filehosting=$cookie_filehosting" \ ./hosts/dosya.sh:183: -H "Host: www.dosyaupload.com" \ ./hosts/dosya.sh:184: -H 'Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8' \ ./hosts/dosya.sh:185: -H 'Accept-Language: en-US,en;q=0.5' \ ./hosts/dosya.sh:186: -H 'Accept-Encoding: gzip, deflate, br' \ ./hosts/dosya.sh:187: -H 'Connection: keep-alive' -H 'Upgrade-Insecure-Requests: 1' \ ./hosts/dosya.sh:188: -H 'Sec-Fetch-Dest: document' -H 'Sec-Fetch-Mode: navigate' -H 'Sec-Fetch-Site: none' -H 'Sec-Fetch-User: ?1' \ ./hosts/dosya.sh:189: -b "${dosya_cookie_jar}" -c "${dosya_cookie_jar}" "$dos_url") -- ./hosts/dosya.sh:402: tor_curl_request -L -G --insecure \ ./hosts/dosya.sh:403: -H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/jxl,image/webp,*/*;q=0.8" \ ./hosts/dosya.sh:404: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/dosya.sh:405: -H "Accept-Encoding: gzip, deflate, br" \ ./hosts/dosya.sh:406: -H "Connection: keep-alive" \ ./hosts/dosya.sh:407: -H "Upgrade-Insecure-Requests: 1" \ ./hosts/dosya.sh:408: -H "Sec-Fetch-Dest: document" \ ./hosts/dosya.sh:409: -H "Sec-Fetch-Mode: navigate" \ ./hosts/dosya.sh:410: -H "Sec-Fetch-Site: none" \ ./hosts/dosya.sh:411: -H "Sec-Fetch-User: ?1" \ ./hosts/dosya.sh:412: -H "DNT: 1" \ -- ./hosts/dosya.sh:417: tor_curl_request -L -G --insecure \ ./hosts/dosya.sh:418: -H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/jxl,image/webp,*/*;q=0.8" \ ./hosts/dosya.sh:419: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/dosya.sh:420: -H "Accept-Encoding: gzip, deflate, br" \ ./hosts/dosya.sh:421: -H "Connection: keep-alive" \ ./hosts/dosya.sh:422: -H "Upgrade-Insecure-Requests: 1" \ ./hosts/dosya.sh:423: -H "Sec-Fetch-Dest: document" \ ./hosts/dosya.sh:424: -H "Sec-Fetch-Mode: navigate" \ ./hosts/dosya.sh:425: -H "Sec-Fetch-Site: none" \ ./hosts/dosya.sh:426: -H "Sec-Fetch-User: ?1" \ ./hosts/dosya.sh:427: -H "DNT: 1" \ -- ./hosts/downloadgg.sh:90: response=$(tor_curl_request --insecure -L -s -b "${dgg_cookie_jar}" -c "${dgg_cookie_jar}" "$remote_url") ./hosts/downloadgg.sh:91: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/downloadgg.sh:92: debugHtml "${remote_url##*/}" "dgg_dwnpage$i" "${response}" ./hosts/downloadgg.sh:93: fi ./hosts/downloadgg.sh:94: if [[ -z $response ]] ; then ./hosts/downloadgg.sh:95: rm -f "${dgg_cookie_jar}"; ./hosts/downloadgg.sh:96: if [[ $i == $maxfetchretries ]] ; then ./hosts/downloadgg.sh:97: printf "\\n" ./hosts/downloadgg.sh:98: echo -e "${RED}| Failed to extract download link.${NC}" ./hosts/downloadgg.sh:99: warnAndRetryUnknownError=true ./hosts/downloadgg.sh:100: if [[ "${finalAttempt}" == "true" ]] ; then -- ./hosts/downloadgg.sh:169: response=$(tor_curl_request --insecure -svo. -X POST \ ./hosts/downloadgg.sh:170: -b "${dgg_cookie_jar}" -c "${dgg_cookie_jar}" \ ./hosts/downloadgg.sh:171: --data-raw "$form_data" "$post_action" 2>&1) ./hosts/downloadgg.sh:172: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/downloadgg.sh:173: debugHtml "${remote_url##*/}" "dgg_post" "post_action: ${post_action}"$'\n'"form_data: ${form_data}"$'\n'"${response}" ./hosts/downloadgg.sh:174: fi ./hosts/downloadgg.sh:175: if [[ -z $response ]] ; then ./hosts/downloadgg.sh:176: echo -e "${RED}| Failed to extract download link${NC}" ./hosts/downloadgg.sh:177: warnAndRetryUnknownError=true ./hosts/downloadgg.sh:178: if [[ "${finalAttempt}" == "true" ]] ; then ./hosts/downloadgg.sh:179: rm -f "${dgg_cookie_jar}"; -- ./hosts/downloadgg.sh:257: tor_curl_request --insecure -X POST \ ./hosts/downloadgg.sh:258: -b "${dgg_cookie_jar}" -c "${dgg_cookie_jar}" --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \ ./hosts/downloadgg.sh:259: -H "Host: download.gg" \ ./hosts/downloadgg.sh:260: -H "Origin: https://download.gg" \ ./hosts/downloadgg.sh:261: --referer "$remote_url" \ ./hosts/downloadgg.sh:262: --data "$form_data" "$post_action" \ ./hosts/downloadgg.sh:263: --output "$file_path" ./hosts/downloadgg.sh:264: else ./hosts/downloadgg.sh:265: tor_curl_request --insecure -X POST \ ./hosts/downloadgg.sh:266: -b "${dgg_cookie_jar}" -c "${dgg_cookie_jar}" \ ./hosts/downloadgg.sh:267: -H "Host: download.gg" \ ./hosts/downloadgg.sh:268: -H "Origin: https://download.gg" \ ./hosts/downloadgg.sh:269: --referer "$remote_url" \ ./hosts/downloadgg.sh:270: --data "$form_data" "$post_action" \ ./hosts/downloadgg.sh:271: --output "$file_path" ./hosts/downloadgg.sh:272: fi ./hosts/downloadgg.sh:273: else ./hosts/downloadgg.sh:274: if [[ "${RateMonitorEnabled}" == "true" ]]; then ./hosts/downloadgg.sh:275: tor_curl_request --insecure -X POST \ ./hosts/downloadgg.sh:276: -b "${dgg_cookie_jar}" -c "${dgg_cookie_jar}" --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \ ./hosts/downloadgg.sh:277: -H "Host: download.gg" \ ./hosts/downloadgg.sh:278: -H "Origin: https://download.gg" \ ./hosts/downloadgg.sh:279: -H "User-Agent: $RandomUA" \ ./hosts/downloadgg.sh:280: -H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8" \ ./hosts/downloadgg.sh:281: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/downloadgg.sh:282: -H "Accept-Encoding: gzip, deflate, br" \ ./hosts/downloadgg.sh:283: -H "Connection: keep-alive" \ ./hosts/downloadgg.sh:284: -H "Cookie: lng=eng" \ ./hosts/downloadgg.sh:285: -H "Upgrade-Insecure-Requests: 1" \ -- ./hosts/downloadgg.sh:294: tor_curl_request --insecure -X POST \ ./hosts/downloadgg.sh:295: -b "${dgg_cookie_jar}" -c "${dgg_cookie_jar}" \ ./hosts/downloadgg.sh:296: -H "Host: download.gg" \ ./hosts/downloadgg.sh:297: -H "Origin: https://download.gg" \ ./hosts/downloadgg.sh:298: -H "User-Agent: $RandomUA" \ ./hosts/downloadgg.sh:299: -H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8" \ ./hosts/downloadgg.sh:300: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/downloadgg.sh:301: -H "Accept-Encoding: gzip, deflate, br" \ ./hosts/downloadgg.sh:302: -H "Connection: keep-alive" \ ./hosts/downloadgg.sh:303: -H "Cookie: lng=eng" \ ./hosts/downloadgg.sh:304: -H "Upgrade-Insecure-Requests: 1" \ -- ./hosts/examples/ExampleNewHost.sh:102: file_header=$(tor_curl_request --insecure -L --head -s --referer "${remote_url//\.org/\.cc}" "$download_url") ./hosts/examples/ExampleNewHost.sh:103: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/examples/ExampleNewHost.sh:104: debugHtml "${remote_url##*/}" "fh_head$j" "download_url: ${download_url}"$'\n'"${file_header}" ./hosts/examples/ExampleNewHost.sh:105: fi ./hosts/examples/ExampleNewHost.sh:106: if [[ ! -z "$file_header" ]] ; then ./hosts/examples/ExampleNewHost.sh:107: if grep -Eqi '404 Not Found' <<< "${file_header}" ; then ./hosts/examples/ExampleNewHost.sh:108: if [[ $j == $maxfetchretries ]] ; then ./hosts/examples/ExampleNewHost.sh:109: printf "\\n" ./hosts/examples/ExampleNewHost.sh:110: echo -e "${RED}| The file has been removed (404).${NC}" ./hosts/examples/ExampleNewHost.sh:111: removedDownload "${remote_url}" ./hosts/examples/ExampleNewHost.sh:112: exitDownloadNotAvailable=true -- ./hosts/examples/ExampleNewHost.sh:199: tor_curl_request --insecure --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval --referer "$download_url" "$download_url" --continue-at - --output "$file_path" ./hosts/examples/ExampleNewHost.sh:200: else ./hosts/examples/ExampleNewHost.sh:201: tor_curl_request --insecure --referer "$download_url" "$download_url" --continue-at - --output "$file_path" ./hosts/examples/ExampleNewHost.sh:202: fi ./hosts/examples/ExampleNewHost.sh:203: received_file_size=0 ./hosts/examples/ExampleNewHost.sh:204: if [[ -f "$file_path" ]] ; then ./hosts/examples/ExampleNewHost.sh:205: received_file_size=$(stat --format="%s" "$file_path" | tr -d '[:space:]') ./hosts/examples/ExampleNewHost.sh:206: fi ./hosts/examples/ExampleNewHost.sh:207: if CheckNoHtml "$remote_url" "$filename" "$file_path" "$((received_file_size - pd_presize))" ; then ./hosts/examples/ExampleNewHost.sh:208: containsHtml=false ./hosts/examples/ExampleNewHost.sh:209: else ./hosts/examples/ExampleNewHost.sh:210: containsHtml=true ./hosts/examples/ExampleNewHost.sh:211: fi -- ./hosts/examples/up_example.sh:112: response=$(tor_curl_upload --insecure \ ./hosts/examples/up_example.sh:113: -F "files[]=@${arrFiles[@]}" \ ./hosts/examples/up_example.sh:114: -F "expire=129600" \ ./hosts/examples/up_example.sh:115: -F "autodestroy=0" \ ./hosts/examples/up_example.sh:116: -F "randomizefn=0" \ ./hosts/examples/up_example.sh:117: -F "shorturl=0" \ ./hosts/examples/up_example.sh:118: "${PostUrlHost}") ./hosts/examples/up_example.sh:119: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/examples/up_example.sh:120: debugHtml "${remote_url##*/}" "${_hostCode}_dwnpage$j" "post_url: ${PostUrlHost}"$'\n'"${response}" ./hosts/examples/up_example.sh:121: fi ./hosts/examples/up_example.sh:122: successUpload "$pline" "${filepath}" "${_hostCode}" "${filesize}" "${downloadLink}" "{$responseHtml}" -- ./hosts/fileblade.sh:90: response=$(tor_curl_request --insecure -L -s -b "${fb_cookie_jar}" -c "${fb_cookie_jar}" "$remote_url") ./hosts/fileblade.sh:91: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/fileblade.sh:92: debugHtml "${remote_url##*/}" "fb_dwnpage$i" "${response}" ./hosts/fileblade.sh:93: fi ./hosts/fileblade.sh:94: if [[ -z $response ]] ; then ./hosts/fileblade.sh:95: rm -f "${fb_cookie_jar}"; ./hosts/fileblade.sh:96: if [[ $i == $maxfetchretries ]] ; then ./hosts/fileblade.sh:97: printf "\\n" ./hosts/fileblade.sh:98: echo -e "${RED}| Failed to extract download link.${NC}" ./hosts/fileblade.sh:99: warnAndRetryUnknownError=true ./hosts/fileblade.sh:100: if [[ "${finalAttempt}" == "true" ]] ; then -- ./hosts/fileblade.sh:165: response=$(tor_curl_request --insecure -L -s -X POST \ ./hosts/fileblade.sh:166: -b "${fb_cookie_jar}" -c "${fb_cookie_jar}" \ ./hosts/fileblade.sh:167: --data "$form_data" "$post_action") ./hosts/fileblade.sh:168: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/fileblade.sh:169: debugHtml "${remote_url##*/}" "fb_post(1)" "post_action: ${post_action}"$'\n'"form_data: ${form_data}"$'\n'"${response}" ./hosts/fileblade.sh:170: fi ./hosts/fileblade.sh:171: if [[ -z $response ]] ; then ./hosts/fileblade.sh:172: if [[ $i == $maxfetchretries ]] ; then ./hosts/fileblade.sh:173: rm -f "${fb_cookie_jar}"; ./hosts/fileblade.sh:174: printf "\\n" ./hosts/fileblade.sh:175: echo -e "${RED}| Failed to extract download link [3]${NC}" -- ./hosts/fileblade.sh:281: response=$(tor_curl_request --insecure -L -s -X POST \ ./hosts/fileblade.sh:282: -b "${fb_cookie_jar}" -c "${fb_cookie_jar}" \ ./hosts/fileblade.sh:283: --data "$form_data" "$post_action") ./hosts/fileblade.sh:284: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/fileblade.sh:285: debugHtml "${remote_url##*/}" "fb_post(2)" "post_action: ${post_action}"$'\n'"form_data: ${form_data}"$'\n'"${response}" ./hosts/fileblade.sh:286: fi ./hosts/fileblade.sh:287: if [[ -z $response ]] ; then ./hosts/fileblade.sh:288: if [[ $i == $maxfetchretries ]] ; then ./hosts/fileblade.sh:289: rm -f "${fb_cookie_jar}"; ./hosts/fileblade.sh:290: printf "\\n" ./hosts/fileblade.sh:291: echo -e "${RED}| Failed to extract download link [4].${NC}" -- ./hosts/fileblade.sh:335: file_header=$(tor_curl_request --insecure -L --head -s "$download_url") ./hosts/fileblade.sh:336: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/fileblade.sh:337: debugHtml "${remote_url##*/}" "fb_head$j" "download_url: ${download_url}"$'\n'"${file_header}" ./hosts/fileblade.sh:338: fi ./hosts/fileblade.sh:339: if [[ -z $file_header ]] ; then ./hosts/fileblade.sh:340: if [[ $j == $maxfetchretries ]] ; then ./hosts/fileblade.sh:341: rm -f "${fb_cookie_jar}"; ./hosts/fileblade.sh:342: printf "\\n" ./hosts/fileblade.sh:343: echo -e "${RED}| Failed to extract file info [1]${NC}" ./hosts/fileblade.sh:344: warnAndRetryUnknownError=true ./hosts/fileblade.sh:345: if [[ "${finalAttempt}" == "true" ]] ; then -- ./hosts/fileblade.sh:452: tor_curl_request --insecure -L \ ./hosts/fileblade.sh:453: --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \ ./hosts/fileblade.sh:454: "$download_url" --continue-at - --output "$file_path" ./hosts/fileblade.sh:455: else ./hosts/fileblade.sh:456: tor_curl_request --insecure -L \ ./hosts/fileblade.sh:457: "$download_url" --continue-at - --output "$file_path" ./hosts/fileblade.sh:458: fi ./hosts/fileblade.sh:459: else ./hosts/fileblade.sh:460: if [[ "${RateMonitorEnabled}" == "true" ]]; then ./hosts/fileblade.sh:461: tor_curl_request --insecure \ ./hosts/fileblade.sh:462: --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \ ./hosts/fileblade.sh:463: -H "User-Agent: $RandomUA" \ ./hosts/fileblade.sh:464: -H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8" \ ./hosts/fileblade.sh:465: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/fileblade.sh:466: -H "Accept-Encoding: gzip, deflate, br" \ ./hosts/fileblade.sh:467: -H "Connection: keep-alive" \ ./hosts/fileblade.sh:468: -H "Cookie: lng=eng" \ ./hosts/fileblade.sh:469: -H "Upgrade-Insecure-Requests: 1" \ ./hosts/fileblade.sh:470: -H "Sec-Fetch-Dest: document" \ ./hosts/fileblade.sh:471: -H "Sec-Fetch-Mode: navigate" \ -- ./hosts/fileblade.sh:476: tor_curl_request --insecure \ ./hosts/fileblade.sh:477: -H "User-Agent: $RandomUA" \ ./hosts/fileblade.sh:478: -H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8" \ ./hosts/fileblade.sh:479: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/fileblade.sh:480: -H "Accept-Encoding: gzip, deflate, br" \ ./hosts/fileblade.sh:481: -H "Connection: keep-alive" \ ./hosts/fileblade.sh:482: -H "Cookie: lng=eng" \ ./hosts/fileblade.sh:483: -H "Upgrade-Insecure-Requests: 1" \ ./hosts/fileblade.sh:484: -H "Sec-Fetch-Dest: document" \ ./hosts/fileblade.sh:485: -H "Sec-Fetch-Mode: navigate" \ ./hosts/fileblade.sh:486: -H "Sec-Fetch-Site: same-origin" \ -- ./hosts/fileditch.sh:96: file_header=$(tor_curl_request --insecure --head -L -s "$download_url") ./hosts/fileditch.sh:97: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/fileditch.sh:98: debugHtml "${remote_url##*/}" "fd_head$j" "download_url: ${download_url}"$'\n'"${file_header}" ./hosts/fileditch.sh:99: fi ./hosts/fileditch.sh:100: if [[ ! -z "$file_header" ]] ; then ./hosts/fileditch.sh:101: if grep -Eqi '404 Not Found' <<< "${file_header}" ; then ./hosts/fileditch.sh:102: echo -e "${RED}| The file has been removed (404).${NC}" ./hosts/fileditch.sh:103: removedDownload "${remote_url}" ./hosts/fileditch.sh:104: exitDownloadNotAvailable=true ./hosts/fileditch.sh:105: return 1 ./hosts/fileditch.sh:106: fi -- ./hosts/fileditch.sh:187: tor_curl_request --insecure --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval "$download_url" --continue-at - --output "$file_path" ./hosts/fileditch.sh:188: else ./hosts/fileditch.sh:189: tor_curl_request --insecure "$download_url" --continue-at - --output "$file_path" ./hosts/fileditch.sh:190: fi ./hosts/fileditch.sh:191: received_file_size=0 ./hosts/fileditch.sh:192: if [[ -f "$file_path" ]] ; then ./hosts/fileditch.sh:193: received_file_size=$(stat --format="%s" "$file_path" | tr -d '[:space:]') ./hosts/fileditch.sh:194: fi ./hosts/fileditch.sh:195: if CheckNoHtml "$remote_url" "$filename" "$file_path" "$((received_file_size - pd_presize))" ; then ./hosts/fileditch.sh:196: containsHtml=false ./hosts/fileditch.sh:197: else ./hosts/fileditch.sh:198: containsHtml=true ./hosts/fileditch.sh:199: fi -- ./hosts/filedot.sh:112: PAGE=$(tor_curl_request --insecure --max-time "$ConnectTimeout" -L -s \ ./hosts/filedot.sh:113: -H "User-Agent: $RandomUA" \ ./hosts/filedot.sh:114: -H 'Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8' \ ./hosts/filedot.sh:115: -H 'Accept-Language: en-US,en;q=0.5' \ ./hosts/filedot.sh:116: -H 'Accept-Encoding: gzip, deflate, br' -H 'Connection: keep-alive' -H 'Upgrade-Insecure-Requests: 1' \ ./hosts/filedot.sh:117: -H 'Sec-Fetch-Dest: document' -H 'Sec-Fetch-Mode: navigate' -H 'Sec-Fetch-Site: none' -H 'Sec-Fetch-User: ?1' \ ./hosts/filedot.sh:118: -c "${fdot_cookie_jar}" \ ./hosts/filedot.sh:119: "https://filedot.to/login.html") ./hosts/filedot.sh:120: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/filedot.sh:121: debugHtml "${remote_url##*/}" "fdot_login_$a" "${PAGE}" ./hosts/filedot.sh:122: fi -- ./hosts/filedot.sh:153: resp_login=$(tor_curl_request --insecure -L -s \ ./hosts/filedot.sh:154: -H "Host: filedot.to" \ ./hosts/filedot.sh:155: -H "User-Agent: $RandomUA" \ ./hosts/filedot.sh:156: -H "text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8" \ ./hosts/filedot.sh:157: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/filedot.sh:158: -H "Accept-Encoding: gzip, deflate, br" \ ./hosts/filedot.sh:159: -H "Content-Type: application/x-www-form-urlencoded" \ ./hosts/filedot.sh:160: -H "Origin: https://filedot.to" \ ./hosts/filedot.sh:161: -H "Connection: keep-alive" \ ./hosts/filedot.sh:162: -H "Referer: https://filedot.to/login.html" \ ./hosts/filedot.sh:163: -H "DNT: 1" \ -- ./hosts/filedot.sh:241: response=$(tor_curl_request --insecure -L -s \ ./hosts/filedot.sh:242: -H "Host: filedot.to" \ ./hosts/filedot.sh:243: -H "User-Agent: $RandomUA" \ ./hosts/filedot.sh:244: -H "text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8" \ ./hosts/filedot.sh:245: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/filedot.sh:246: -H "Accept-Encoding: gzip, deflate, br" \ ./hosts/filedot.sh:247: -H "Content-Type: application/x-www-form-urlencoded" \ ./hosts/filedot.sh:248: -H "Origin: https://filedot.to" \ ./hosts/filedot.sh:249: -H "Connection: keep-alive" \ ./hosts/filedot.sh:250: -H "Referer: https://filedot.to/login.html" \ ./hosts/filedot.sh:251: -H "DNT: 1" \ -- ./hosts/filedot.sh:321: response=$(tor_curl_request --insecure -L -s \ ./hosts/filedot.sh:322: -H "Host: filedot.to" \ ./hosts/filedot.sh:323: -H "User-Agent: $RandomUA" \ ./hosts/filedot.sh:324: -H "text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8" \ ./hosts/filedot.sh:325: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/filedot.sh:326: -H "Accept-Encoding: gzip, deflate, br" \ ./hosts/filedot.sh:327: -H "Content-Type: application/x-www-form-urlencoded" \ ./hosts/filedot.sh:328: -H "Origin: https://filedot.to" \ ./hosts/filedot.sh:329: -H "Connection: keep-alive" \ ./hosts/filedot.sh:330: -H "Referer: $remote_url" \ ./hosts/filedot.sh:331: -H "DNT: 1" \ -- ./hosts/filedot.sh:407: file_header=$(tor_curl_request --insecure -L --head -s --referer "${fixed_url}" "$download_url") ./hosts/filedot.sh:408: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/filedot.sh:409: debugHtml "${remote_url##*/}" "fdot_head_$j" "download_url: ${download_url}"$'\n'"${file_header}" ./hosts/filedot.sh:410: fi ./hosts/filedot.sh:411: if [[ -z $file_header ]] ; then ./hosts/filedot.sh:412: if [[ $j == $maxfetchretries ]] ; then ./hosts/filedot.sh:413: printf "\\n" ./hosts/filedot.sh:414: echo -e "${RED}| Failed to extract file info [1]${NC}" ./hosts/filedot.sh:415: warnAndRetryUnknownError=true ./hosts/filedot.sh:416: if [[ "${finalAttempt}" == "true" ]] ; then ./hosts/filedot.sh:417: failedRetryDownload "${remote_url}" "Failed to extract file info [1]" "" -- ./hosts/filedot.sh:500: tor_curl_request --insecure -L -G --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval "$download_url" --continue-at - --output "$file_path" ./hosts/filedot.sh:501: else ./hosts/filedot.sh:502: tor_curl_request --insecure -L -G "$download_url" --continue-at - --output "$file_path" ./hosts/filedot.sh:503: fi ./hosts/filedot.sh:504: received_file_size=0 ./hosts/filedot.sh:505: if [[ -f "$file_path" ]] ; then ./hosts/filedot.sh:506: received_file_size=$(stat --format="%s" "$file_path" | tr -d '[:space:]') ./hosts/filedot.sh:507: fi ./hosts/filedot.sh:508: if CheckNoHtml "$remote_url" "$filename" "$file_path" "$((received_file_size - pd_presize))" ; then ./hosts/filedot.sh:509: containsHtml=false ./hosts/filedot.sh:510: else ./hosts/filedot.sh:511: containsHtml=true ./hosts/filedot.sh:512: fi -- ./hosts/filehaus.sh:101: file_header=$(tor_curl_request_extended --insecure -L --head -s --referer "${remote_url//\.org/\.cc}" "$download_url") ./hosts/filehaus.sh:102: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/filehaus.sh:103: debugHtml "${remote_url##*/}" "fh_head$j" "download_url: ${download_url}"$'\n'"${file_header}" ./hosts/filehaus.sh:104: fi ./hosts/filehaus.sh:105: if [[ ! -z "$file_header" ]] ; then ./hosts/filehaus.sh:106: if grep -Eqi '404 Not Found' <<< "${file_header}" ; then ./hosts/filehaus.sh:107: printf "\\n" ./hosts/filehaus.sh:108: echo -e "${RED}| The file has been removed (404).${NC}" ./hosts/filehaus.sh:109: removedDownload "${remote_url}" ./hosts/filehaus.sh:110: exitDownloadNotAvailable=true ./hosts/filehaus.sh:111: return 1 -- ./hosts/filehaus.sh:191: tor_curl_request_extended --insecure --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval --referer "$download_url" "$download_url" --continue-at - --output "$file_path" ./hosts/filehaus.sh:192: else ./hosts/filehaus.sh:193: tor_curl_request_extended --insecure --referer "$download_url" "$download_url" --continue-at - --output "$file_path" ./hosts/filehaus.sh:194: fi ./hosts/filehaus.sh:195: received_file_size=0 ./hosts/filehaus.sh:196: if [[ -f "$file_path" ]] ; then ./hosts/filehaus.sh:197: received_file_size=$(stat --format="%s" "$file_path" | tr -d '[:space:]') ./hosts/filehaus.sh:198: fi ./hosts/filehaus.sh:199: if CheckNoHtml "$remote_url" "$filename" "$file_path" "$((received_file_size - pd_presize))" ; then ./hosts/filehaus.sh:200: containsHtml=false ./hosts/filehaus.sh:201: else ./hosts/filehaus.sh:202: containsHtml=true ./hosts/filehaus.sh:203: fi -- ./hosts/firestorage.sh:98: response=$(tor_curl_request --insecure -L -s "${fixed_url}") ./hosts/firestorage.sh:99: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/firestorage.sh:100: debugHtml "${remote_url##*/}" "fs_${fetchnum}fetch_$j" "fixed_url: ${fixed_url}"$'\n'"${response}" ./hosts/firestorage.sh:101: fi ./hosts/firestorage.sh:102: if [[ -z $response ]] ; then ./hosts/firestorage.sh:103: if [[ $j == $maxfetchretries ]] ; then ./hosts/firestorage.sh:104: printf "\\n" ./hosts/firestorage.sh:105: echo -e "${RED}| Failed to extract link.${NC}" ./hosts/firestorage.sh:106: warnAndRetryUnknownError=true ./hosts/firestorage.sh:107: if [[ "${finalAttempt}" == "true" ]] ; then ./hosts/firestorage.sh:108: failedRetryDownload "${remote_url}" "" "" -- ./hosts/firestorage.sh:226: file_header=$(tor_curl_request --insecure -L --head -s --referer "${fixed_url}" "$download_url") ./hosts/firestorage.sh:227: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/firestorage.sh:228: debugHtml "${remote_url##*/}" "fs_head$j" "download_url: ${download_url}"$'\n'"${file_header}" ./hosts/firestorage.sh:229: fi ./hosts/firestorage.sh:230: if [[ -z $file_header ]] ; then ./hosts/firestorage.sh:231: if [[ $j == $maxfetchretries ]] ; then ./hosts/firestorage.sh:232: printf "\\n" ./hosts/firestorage.sh:233: echo -e "${RED}| Failed to extract file info${NC}" ./hosts/firestorage.sh:234: warnAndRetryUnknownError=true ./hosts/firestorage.sh:235: if [[ "${finalAttempt}" == "true" ]] ; then ./hosts/firestorage.sh:236: failedRetryDownload "${remote_url}" "" "" -- ./hosts/firestorage.sh:335: tor_curl_request --insecure -L -G --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval "$download_url" --continue-at - --output "$file_path" ./hosts/firestorage.sh:336: else ./hosts/firestorage.sh:337: tor_curl_request --insecure -L -G "$download_url" --continue-at - --output "$file_path" ./hosts/firestorage.sh:338: fi ./hosts/firestorage.sh:339: received_file_size=0 ./hosts/firestorage.sh:340: if [[ -f "$file_path" ]] ; then ./hosts/firestorage.sh:341: received_file_size=$(stat --format="%s" "$file_path" | tr -d '[:space:]') ./hosts/firestorage.sh:342: fi ./hosts/firestorage.sh:343: if CheckNoHtml "$remote_url" "$filename" "$file_path" "$((received_file_size - pd_presize))" ; then ./hosts/firestorage.sh:344: containsHtml=false ./hosts/firestorage.sh:345: else ./hosts/firestorage.sh:346: containsHtml=true ./hosts/firestorage.sh:347: fi -- ./hosts/gofile.sh:97: response=$(tor_curl_request --insecure -s -X POST \ ./hosts/gofile.sh:98: -H "User-Agent: $RandomUA" \ ./hosts/gofile.sh:99: -H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8" \ ./hosts/gofile.sh:100: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/gofile.sh:101: -H "Accept-Encoding: gzip, deflate, br" \ ./hosts/gofile.sh:102: -H "Connection: keep-alive" \ ./hosts/gofile.sh:103: -H "Upgrade-Insecure-Requests: 1" \ ./hosts/gofile.sh:104: -H "Sec-Fetch-Dest: document" \ ./hosts/gofile.sh:105: -H "Sec-Fetch-Mode: navigate" \ ./hosts/gofile.sh:106: -H "Sec-Fetch-Site: none" \ ./hosts/gofile.sh:107: -H "Sec-Fetch-User: ?1" \ -- ./hosts/gofile.sh:170: response=$(tor_curl_request --insecure -G -L -s \ ./hosts/gofile.sh:171: -b "${gofile_cookie_jar}" -c "${gofile_cookie_jar}" \ ./hosts/gofile.sh:172: -H "User-Agent: $RandomUA" \ ./hosts/gofile.sh:173: -H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8" \ ./hosts/gofile.sh:174: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/gofile.sh:175: -H "Accept-Encoding: gzip, deflate, br" \ ./hosts/gofile.sh:176: -H "Connection: keep-alive" \ ./hosts/gofile.sh:177: -H "Upgrade-Insecure-Requests: 1" \ ./hosts/gofile.sh:178: -H "Sec-Fetch-Dest: document" \ ./hosts/gofile.sh:179: -H "Sec-Fetch-Mode: navigate" \ ./hosts/gofile.sh:180: -H "Sec-Fetch-Site: none" \ -- ./hosts/gofile.sh:258: file_header=$(tor_curl_request --insecure -L --head -s \ ./hosts/gofile.sh:259: -b "${gofile_cookie_jar}" -c "${gofile_cookie_jar}" \ ./hosts/gofile.sh:260: -H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8" \ ./hosts/gofile.sh:261: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/gofile.sh:262: -H "Accept-Encoding: gzip, deflate, br" \ ./hosts/gofile.sh:263: -H "Connection: keep-alive" \ ./hosts/gofile.sh:264: -H "Upgrade-Insecure-Requests: 1" \ ./hosts/gofile.sh:265: -H "Sec-Fetch-Dest: document" \ ./hosts/gofile.sh:266: -H "Sec-Fetch-Mode: navigate" \ ./hosts/gofile.sh:267: -H "Sec-Fetch-Site: none" \ ./hosts/gofile.sh:268: -H "Sec-Fetch-User: ?1" \ -- ./hosts/gofile.sh:393: tor_curl_request --insecure -G --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \ ./hosts/gofile.sh:394: -b "${gofile_cookie_jar}" -c "${gofile_cookie_jar}" \ ./hosts/gofile.sh:395: -H "User-Agent: $RandomUA" \ ./hosts/gofile.sh:396: -H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8" \ ./hosts/gofile.sh:397: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/gofile.sh:398: -H "Accept-Encoding: gzip, deflate, br" \ ./hosts/gofile.sh:399: -H "Connection: keep-alive" \ ./hosts/gofile.sh:400: -H "Upgrade-Insecure-Requests: 1" \ ./hosts/gofile.sh:401: -H "Sec-Fetch-Dest: document" \ ./hosts/gofile.sh:402: -H "Sec-Fetch-Mode: navigate" \ ./hosts/gofile.sh:403: -H "Sec-Fetch-Site: none" \ -- ./hosts/gofile.sh:407: tor_curl_request --insecure -G \ ./hosts/gofile.sh:408: -b "${gofile_cookie_jar}" -c "${gofile_cookie_jar}" \ ./hosts/gofile.sh:409: -H "User-Agent: $RandomUA" \ ./hosts/gofile.sh:410: -H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8" \ ./hosts/gofile.sh:411: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/gofile.sh:412: -H "Accept-Encoding: gzip, deflate, br" \ ./hosts/gofile.sh:413: -H "Connection: keep-alive" \ ./hosts/gofile.sh:414: -H "Upgrade-Insecure-Requests: 1" \ ./hosts/gofile.sh:415: -H "Sec-Fetch-Dest: document" \ ./hosts/gofile.sh:416: -H "Sec-Fetch-Mode: navigate" \ ./hosts/gofile.sh:417: -H "Sec-Fetch-Site: none" \ -- ./hosts/hexload.sh:108: response=$(tor_curl_request --insecure -s --data "$form_data" "https://hexload.com/download") ./hosts/hexload.sh:109: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/hexload.sh:110: debugHtml "${remote_url##*/}" "hex_dwnpage$j" "form_data: ${form_data}"$'\n'"${response}" ./hosts/hexload.sh:111: fi ./hosts/hexload.sh:112: fi ./hosts/hexload.sh:113: else ./hosts/hexload.sh:114: if [[ "$hexUseDownload" == "download2" ]]; then ./hosts/hexload.sh:115: form_data="op=download1&id=${file_id}&rand=&usr_login=&fname=&ajax=1&method_free=1&dataType=json" ./hosts/hexload.sh:116: response=$(tor_curl_request --insecure -s --data "$form_data" "https://hexload.com/download") ./hosts/hexload.sh:117: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/hexload.sh:118: debugHtml "${remote_url##*/}" "hex_dwnpage$j" "form_data: ${form_data}"$'\n'"${response}" ./hosts/hexload.sh:119: fi ./hosts/hexload.sh:120: else ./hosts/hexload.sh:121: form_data="op=download2&id=${file_id}&rand=&usr_login=&fname=&ajax=1&method_free=1&dataType=json" ./hosts/hexload.sh:122: response=$(tor_curl_request --insecure -s --data "$form_data" "https://hexload.com/download") ./hosts/hexload.sh:123: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/hexload.sh:124: debugHtml "${remote_url##*/}" "hex_dwnpage$j" "form_data: ${form_data}"$'\n'"${response}" ./hosts/hexload.sh:125: fi ./hosts/hexload.sh:126: fi ./hosts/hexload.sh:127: fi ./hosts/hexload.sh:128: filename=$(echo "$response" | grep -oPi '(?<="file_name":")[^"]+(?=")' | base64 --decode) ./hosts/hexload.sh:129: download_url=$(echo "$response" | grep -oPi '(?<="link":")[^"]+(?=")' | base64 --decode) ./hosts/hexload.sh:130: download_url=$(urlencode_spaces "$download_url") ./hosts/hexload.sh:131: if grep -Eqi "Sorry, you have been blocked" <<< "$response"; then ./hosts/hexload.sh:132: if ((j == hexmaxfetchfileretries)) ; then -- ./hosts/hexload.sh:254: file_header=$(tor_curl_request --insecure --head -L -s --referer "$file_url" "$download_url") ./hosts/hexload.sh:255: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/hexload.sh:256: debugHtml "${remote_url##*/}" "hex_head$j" "download_url: ${download_url}"$'\n'"${file_header}" ./hosts/hexload.sh:257: fi ./hosts/hexload.sh:258: if ! grep -Eqi 'HTTP/2 200|HTTP/1.1 200|200 OK' <<< $file_header ; then ./hosts/hexload.sh:259: if ((j < hexmaxfetchfileretries)); then ./hosts/hexload.sh:260: continue ./hosts/hexload.sh:261: else ./hosts/hexload.sh:262: printf "\\n" ./hosts/hexload.sh:263: echo -e "${RED}| Bad header response…${NC}" ./hosts/hexload.sh:264: exitDownloadError=true -- ./hosts/hexload.sh:321: tor_curl_request --insecure --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval --referer "$file_url" "$download_url" --continue-at - --output "$file_path" ./hosts/hexload.sh:322: else ./hosts/hexload.sh:323: tor_curl_request --insecure --referer "$file_url" "$download_url" --continue-at - --output "$file_path" ./hosts/hexload.sh:324: fi ./hosts/hexload.sh:325: received_file_size=0 ./hosts/hexload.sh:326: if [[ -f "$file_path" ]] ; then ./hosts/hexload.sh:327: received_file_size=$(stat --format="%s" "$file_path" | tr -d '[:space:]') ./hosts/hexload.sh:328: fi ./hosts/hexload.sh:329: if CheckNoHtml "$remote_url" "$filename" "$file_path" "$((received_file_size - pd_presize))" ; then ./hosts/hexload.sh:330: containsHtml=false ./hosts/hexload.sh:331: else ./hosts/hexload.sh:332: containsHtml=true ./hosts/hexload.sh:333: fi -- ./hosts/innocent.sh:97: file_header=$(tor_curl_request_extended --insecure --head -L -s "$download_url") ./hosts/innocent.sh:98: elif ((j % 2 == 0)); then ./hosts/innocent.sh:99: printf "| Retrieving Head (Get): attempt #$j" ./hosts/innocent.sh:100: file_header=$(tor_curl_request --insecure -m 16 -s -D - -o /dev/null \ ./hosts/innocent.sh:101: -H "Connection: keep-alive" \ ./hosts/innocent.sh:102: -w 'EffectiveUrl=%{url_effective}' \ ./hosts/innocent.sh:103: "$download_url") ./hosts/innocent.sh:104: elif ((j % 3 == 0)); then ./hosts/innocent.sh:105: printf "| Retrieving Head (hack): attempt #$j" ./hosts/innocent.sh:106: rm -f "${WorkDir}/.temp/directhead" ./hosts/innocent.sh:107: file_header=$(tor_curl_request --insecure --head -H "Connection: keep-alive" -L -s -i "$download_url" | ./hosts/innocent.sh:108: tee "${WorkDir}/.temp/directhead" & ./hosts/innocent.sh:109: sleep 6 ./hosts/innocent.sh:110: [ -s "${WorkDir}/.temp/directhead" ] ./hosts/innocent.sh:111: kill $! 2>/dev/null ./hosts/innocent.sh:112: ) ./hosts/innocent.sh:113: if [[ ! -f "${WorkDir}/.flocks/${remote_url//[^a-zA-Z0-9]/}" ]]; then ./hosts/innocent.sh:114: touch "${WorkDir}/.flocks/${remote_url//[^a-zA-Z0-9]/}" ./hosts/innocent.sh:115: fi ./hosts/innocent.sh:116: rm -f "${WorkDir}/.temp/directhead" ./hosts/innocent.sh:117: else -- ./hosts/innocent.sh:119: file_header=$(tor_curl_request --insecure --head -L -s "$download_url") ./hosts/innocent.sh:120: fi ./hosts/innocent.sh:121: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/innocent.sh:122: debugHtml "${remote_url##*/}" "inno_head$j" "download_url: ${download_url}"$'\n'"${file_header}" ./hosts/innocent.sh:123: fi ./hosts/innocent.sh:124: if [[ ! -z "$file_header" ]] ; then ./hosts/innocent.sh:125: if grep -Eqi '404 Not Found' <<< "${file_header}" ; then ./hosts/innocent.sh:126: printf "\\n" ./hosts/innocent.sh:127: echo -e "${RED}| Not Found (404). The file has been removed.${NC}" ./hosts/innocent.sh:128: removedDownload "${remote_url}" ./hosts/innocent.sh:129: exitDownloadNotAvailable=true -- ./hosts/innocent.sh:211: tor_curl_request_extended --insecure "$download_url" --continue-at - --output "$file_path" ./hosts/innocent.sh:212: else ./hosts/innocent.sh:213: echo -e "${BLUE}| No Resume Fetch${NC}" ./hosts/innocent.sh:214: tor_curl_request_extended --insecure "$download_url" --output "$file_path" ./hosts/innocent.sh:215: fi ./hosts/innocent.sh:216: received_file_size=0 ./hosts/innocent.sh:217: if [[ -f "$file_path" ]] ; then ./hosts/innocent.sh:218: received_file_size=$(stat --format="%s" "$file_path" | tr -d '[:space:]') ./hosts/innocent.sh:219: fi ./hosts/innocent.sh:220: if CheckNoHtml "$remote_url" "$filename" "$file_path" "$((received_file_size - pd_presize))" ; then ./hosts/innocent.sh:221: containsHtml=false ./hosts/innocent.sh:222: else ./hosts/innocent.sh:223: containsHtml=true ./hosts/innocent.sh:224: fi -- ./hosts/isupload.sh:90: response=$(tor_curl_request_extended --insecure -L -s -b "${isup_cookie_jar}" -c "${isup_cookie_jar}" "$remote_url") ./hosts/isupload.sh:91: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/isupload.sh:92: debugHtml "${remote_url##*/}" "isup_dwnpage$i" "${response}" ./hosts/isupload.sh:93: fi ./hosts/isupload.sh:94: if [[ -z $response ]] ; then ./hosts/isupload.sh:95: rm -f "${isup_cookie_jar}"; ./hosts/isupload.sh:96: if [[ $i == $maxfetchretries ]] ; then ./hosts/isupload.sh:97: printf "\\n" ./hosts/isupload.sh:98: echo -e "${RED}| Failed to extract download link.${NC}" ./hosts/isupload.sh:99: warnAndRetryUnknownError=true ./hosts/isupload.sh:100: if [[ "${finalAttempt}" == "true" ]] ; then -- ./hosts/isupload.sh:164: response=$(tor_curl_request_extended --insecure -L -s -X POST \ ./hosts/isupload.sh:165: -b "${isup_cookie_jar}" -c "${isup_cookie_jar}" \ ./hosts/isupload.sh:166: --data "$form_data" "$post_action") ./hosts/isupload.sh:167: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/isupload.sh:168: debugHtml "${remote_url##*/}" "isup_post" "post_action: ${post_action}"$'\n'"form_data: ${form_data}"$'\n'"${response}" ./hosts/isupload.sh:169: fi ./hosts/isupload.sh:170: if [[ -z $response ]] ; then ./hosts/isupload.sh:171: if [[ $i == $maxfetchretries ]] ; then ./hosts/isupload.sh:172: rm -f "${isup_cookie_jar}"; ./hosts/isupload.sh:173: printf "\\n" ./hosts/isupload.sh:174: echo -e "${RED}| Failed to extract download link [3].${NC}" -- ./hosts/isupload.sh:241: file_header=$(tor_curl_request --insecure -m 8 -s -D - -o /dev/null \ ./hosts/isupload.sh:242: -H "Connection: keep-alive" \ ./hosts/isupload.sh:243: -w 'EffectiveUrl=%{url_effective}' \ ./hosts/isupload.sh:244: "$download_url") ./hosts/isupload.sh:245: elif ((j % 2 == 0)); then ./hosts/isupload.sh:246: printf "| Retrieving Head: attempt #$j" ./hosts/isupload.sh:247: file_header=$(tor_curl_request --insecure --head -L -s "$download_url") ./hosts/isupload.sh:248: elif ((j % 3 == 0)); then ./hosts/isupload.sh:249: printf "| Retrieving Head (hack): attempt #$j" ./hosts/isupload.sh:250: rm -f "${WorkDir}/.temp/directhead" ./hosts/isupload.sh:251: file_header=$(tor_curl_request --insecure --head -H "Connection: keep-alive" -L -s -i "$download_url" | ./hosts/isupload.sh:252: tee "${WorkDir}/.temp/directhead" & ./hosts/isupload.sh:253: sleep 6 ./hosts/isupload.sh:254: [ -s "${WorkDir}/.temp/directhead" ] ./hosts/isupload.sh:255: kill $! 2>/dev/null ./hosts/isupload.sh:256: ) ./hosts/isupload.sh:257: if [[ ! -f "${WorkDir}/.flocks/${remote_url//[^a-zA-Z0-9]/}" ]]; then ./hosts/isupload.sh:258: touch "${WorkDir}/.flocks/${remote_url//[^a-zA-Z0-9]/}" ./hosts/isupload.sh:259: fi ./hosts/isupload.sh:260: rm -f "${WorkDir}/.temp/directhead" ./hosts/isupload.sh:261: else -- ./hosts/isupload.sh:263: file_header=$(tor_curl_request_extended --insecure --head -L -s "$download_url") ./hosts/isupload.sh:264: fi ./hosts/isupload.sh:265: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/isupload.sh:266: debugHtml "${remote_url##*/}" "isup_head$j" "download_url: ${download_url}"$'\n'"${file_header}" ./hosts/isupload.sh:267: fi ./hosts/isupload.sh:268: if [[ ! -z "$file_header" ]] ; then ./hosts/isupload.sh:269: if grep -Eqi '404 Not Found|' <<< "${file_header}" ; then ./hosts/isupload.sh:270: printf "\\n" ./hosts/isupload.sh:271: echo -e "${RED}| Not Found (404). The file has been removed.${NC}" ./hosts/isupload.sh:272: removedDownload "${remote_url}" ./hosts/isupload.sh:273: exitDownloadNotAvailable=true -- ./hosts/isupload.sh:355: tor_curl_request_extended --insecure -L "$download_url" --output "$file_path" ./hosts/isupload.sh:356: rc=$? ./hosts/isupload.sh:357: if ((rc != 0 )) ; then ./hosts/isupload.sh:358: printf "${RED}Download Failed (bad exit status).${NC}" ./hosts/isupload.sh:359: if [[ -f ${file_path} ]]; then ./hosts/isupload.sh:360: printf "${YELLOW} Partial removed...${NC}" ./hosts/isupload.sh:361: printf "\n\n" ./hosts/isupload.sh:362: rm -f "${file_path}" ./hosts/isupload.sh:363: else ./hosts/isupload.sh:364: printf "\n\n" ./hosts/isupload.sh:365: fi -- ./hosts/isupload.sh:403: tor_curl_request_extended --insecure -L --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval "$download_url" --continue-at - --output "$file_path" ./hosts/isupload.sh:404: else ./hosts/isupload.sh:405: tor_curl_request_extended --insecure -L "$download_url" --continue-at - --output "$file_path" ./hosts/isupload.sh:406: fi ./hosts/isupload.sh:407: received_file_size=0 ./hosts/isupload.sh:408: if [[ -f "$file_path" ]] ; then ./hosts/isupload.sh:409: received_file_size=$(stat --format="%s" "$file_path" | tr -d '[:space:]') ./hosts/isupload.sh:410: fi ./hosts/isupload.sh:411: if CheckNoHtml "$remote_url" "$filename" "$file_path" "$((received_file_size - pd_presize))" ; then ./hosts/isupload.sh:412: containsHtml=false ./hosts/isupload.sh:413: else ./hosts/isupload.sh:414: containsHtml=true ./hosts/isupload.sh:415: fi -- ./hosts/kraken.sh:104: PAGE=$(tor_curl_request --insecure --max-time "$ConnectTimeout" -s -L -c "${kraken_cookie_jar}" "${fixed_url}") ./hosts/kraken.sh:105: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/kraken.sh:106: debugHtml "${krak_id}" "kraken_token${num_attempt}_$i" "url: ${fixed_url}"$'\n'"krakenid: ${krak_id}"$'\n'"${PAGE}" ./hosts/kraken.sh:107: fi ./hosts/kraken.sh:108: if grep -Eqi 'sendFormCaptcha()' <<< "${PAGE}"; then ./hosts/kraken.sh:109: rm -f "$kraken_cookie_jar"; ./hosts/kraken.sh:110: printf "\n" ./hosts/kraken.sh:111: echo -e "${RED}| Captcha required (Recaptcha)${NC}" ./hosts/kraken.sh:112: exitDownloadError=true ./hosts/kraken.sh:113: failedRetryDownload "${remote_url}" "Captcha required (Recaptcha)" "" ./hosts/kraken.sh:114: return 1 -- ./hosts/kraken.sh:169: down_request=$(tor_curl_request --insecure -L -s -b "${kraken_cookie_jar}" -c "${kraken_cookie_jar}" -F "token=${kraken_token}" "${kraken_action}") ./hosts/kraken.sh:170: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/kraken.sh:171: debugHtml "${krak_id}" "kraken_url${num_attempt}_1" "action: ${kraken_action}, token: ${kraken_token}"$'\n'"${down_request}" ./hosts/kraken.sh:172: fi ./hosts/kraken.sh:173: if ! grep -Eqi '"status":"ok"' <<< "${down_request}"; then ./hosts/kraken.sh:174: echo -e "${RED}| Failed to get download url${NC}" ./hosts/kraken.sh:175: rm -f "$kraken_cookie_jar"; ./hosts/kraken.sh:176: return 1 ./hosts/kraken.sh:177: else ./hosts/kraken.sh:178: kraken_url=$(grep -oP '"url":"\K[^"]+' <<< "${down_request}") ./hosts/kraken.sh:179: download_url=${kraken_url//\\/} -- ./hosts/kraken.sh:186: file_header=$(tor_curl_request --insecure --head -L -s -b "${kraken_cookie_jar}" -c "${kraken_cookie_jar}" --referer "$kraken_action" "$download_url") ./hosts/kraken.sh:187: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/kraken.sh:188: debugHtml "${krak_id}" "kraken_head$j" "download_url: ${download_url}"$'\n'"${file_header}" ./hosts/kraken.sh:189: fi ./hosts/kraken.sh:190: rm -f "$kraken_cookie_jar"; ./hosts/kraken.sh:191: if [[ ! -z "$file_header" ]] ; then ./hosts/kraken.sh:192: if grep -Eqi '404 Not Found' <<< "${file_header}" ; then ./hosts/kraken.sh:193: echo -e "${RED}| The file has been removed (404).${NC}" ./hosts/kraken.sh:194: removedDownload "${remote_url}" ./hosts/kraken.sh:195: exitDownloadNotAvailable=true ./hosts/kraken.sh:196: return 1 -- ./hosts/kraken.sh:286: tor_curl_request --insecure --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval --referer "$kraken_action" "$download_url" --continue-at - --output "$file_path" ./hosts/kraken.sh:287: else ./hosts/kraken.sh:288: tor_curl_request --insecure --referer "$kraken_action" "$download_url" --continue-at - --output "$file_path" ./hosts/kraken.sh:289: fi ./hosts/kraken.sh:290: received_file_size=0 ./hosts/kraken.sh:291: if [[ -f "$file_path" ]] ; then ./hosts/kraken.sh:292: received_file_size=$(stat --format="%s" "$file_path" | tr -d '[:space:]') ./hosts/kraken.sh:293: fi ./hosts/kraken.sh:294: if CheckNoHtml "$remote_url" "$filename" "$file_path" "$((received_file_size - pd_presize))" ; then ./hosts/kraken.sh:295: containsHtml=false ./hosts/kraken.sh:296: else ./hosts/kraken.sh:297: containsHtml=true ./hosts/kraken.sh:298: fi -- ./hosts/mediafire.sh:94: response=$(tor_curl_request --insecure -L -s \ ./hosts/mediafire.sh:95: -H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8" \ ./hosts/mediafire.sh:96: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/mediafire.sh:97: -H "Accept-Encoding: gzip, deflate, br" \ ./hosts/mediafire.sh:98: -H "Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7" \ ./hosts/mediafire.sh:99: -H "Connection: keep-alive" \ ./hosts/mediafire.sh:100: -H "Upgrade-Insecure-Requests: 1" \ ./hosts/mediafire.sh:101: -H "Sec-Fetch-Dest: document" \ ./hosts/mediafire.sh:102: -H "Sec-Fetch-Mode: navigate" \ ./hosts/mediafire.sh:103: -H "Sec-Fetch-Site: none" \ ./hosts/mediafire.sh:104: -H "Sec-Fetch-User: ?1" \ -- ./hosts/mediafire.sh:157: file_header=$(tor_curl_request --insecure -L --head -s \ ./hosts/mediafire.sh:158: -H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8" \ ./hosts/mediafire.sh:159: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/mediafire.sh:160: -H "Accept-Encoding: gzip, deflate, br" \ ./hosts/mediafire.sh:161: -H "Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7" \ ./hosts/mediafire.sh:162: -H "Connection: keep-alive" \ ./hosts/mediafire.sh:163: -H "Upgrade-Insecure-Requests: 1" \ ./hosts/mediafire.sh:164: -H "Sec-Fetch-Dest: document" \ ./hosts/mediafire.sh:165: -H "Sec-Fetch-Mode: navigate" \ ./hosts/mediafire.sh:166: -H "Sec-Fetch-Site: none" \ ./hosts/mediafire.sh:167: -H "Sec-Fetch-User: ?1" \ -- ./hosts/mediafire.sh:276: tor_curl_request_extended --insecure "$download_url" --continue-at - --output "$file_path" ./hosts/mediafire.sh:277: else ./hosts/mediafire.sh:278: echo -e "${BLUE}| No Resume Fetch${NC}" ./hosts/mediafire.sh:279: tor_curl_request_extended --insecure "$download_url" --output "$file_path" ./hosts/mediafire.sh:280: fi ./hosts/mediafire.sh:281: received_file_size=0 ./hosts/mediafire.sh:282: if [[ -f "$file_path" ]] ; then ./hosts/mediafire.sh:283: received_file_size=$(stat --format="%s" "$file_path" | tr -d '[:space:]') ./hosts/mediafire.sh:284: fi ./hosts/mediafire.sh:285: if CheckNoHtml "$remote_url" "$filename" "$file_path" "$((received_file_size - pd_presize))" ; then ./hosts/mediafire.sh:286: containsHtml=false ./hosts/mediafire.sh:287: else ./hosts/mediafire.sh:288: containsHtml=true ./hosts/mediafire.sh:289: fi -- ./hosts/nippy.sh:119: response=$(tor_curl_request --insecure -L -s -b "${nippy_cookie_jar}" -c "${nippy_cookie_jar}" "$fixed_url") ./hosts/nippy.sh:120: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/nippy.sh:121: debugHtml "${remote_url##*/}" "nippy_dwnpage$i" "fixed_url: ${fixed_url}"$'\n'"${response}" ./hosts/nippy.sh:122: fi ./hosts/nippy.sh:123: if [[ -z $response ]] ; then ./hosts/nippy.sh:124: rm -f "${nippy_cookie_jar}"; ./hosts/nippy.sh:125: if [[ $i == $maxfetchretries ]] ; then ./hosts/nippy.sh:126: printf "\\n" ./hosts/nippy.sh:127: echo -e "${RED}| Failed to extract download link.${NC}" ./hosts/nippy.sh:128: warnAndRetryUnknownError=true ./hosts/nippy.sh:129: if [[ "${finalAttempt}" == "true" ]] ; then -- ./hosts/nippy.sh:188: file_header=$(tor_curl_request --insecure -L --head -s \ ./hosts/nippy.sh:189: -b "${nippy_cookie_jar}" -c "${nippy_cookie_jar}" \ ./hosts/nippy.sh:190: "$download_url") ./hosts/nippy.sh:191: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/nippy.sh:192: debugHtml "${remote_url##*/}" "nippy_head$j" "FileInfoUrl: ${download_url}"$'\n'"${file_header}" ./hosts/nippy.sh:193: fi ./hosts/nippy.sh:194: if [[ -z $file_header ]] ; then ./hosts/nippy.sh:195: if [[ $j == $maxfetchretries ]] ; then ./hosts/nippy.sh:196: rm -f "${nippy_cookie_jar}"; ./hosts/nippy.sh:197: printf "\\n" ./hosts/nippy.sh:198: echo -e "${RED}| Failed to extract file info${NC}" -- ./hosts/nippy.sh:299: tor_curl_request --insecure -L --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \ ./hosts/nippy.sh:300: "$download_url" --continue-at - --output "$file_path" ./hosts/nippy.sh:301: else ./hosts/nippy.sh:302: tor_curl_request --insecure -L "$download_url" --continue-at - --output "$file_path" ./hosts/nippy.sh:303: fi ./hosts/nippy.sh:304: received_file_size=0 ./hosts/nippy.sh:305: if [[ -f "$file_path" ]] ; then ./hosts/nippy.sh:306: received_file_size=$(stat --format="%s" "$file_path" | tr -d '[:space:]') ./hosts/nippy.sh:307: fi ./hosts/nippy.sh:308: if CheckNoHtml "$remote_url" "$filename" "$file_path" "$((received_file_size - pd_presize))" ; then ./hosts/nippy.sh:309: containsHtml=false ./hosts/nippy.sh:310: else ./hosts/nippy.sh:311: containsHtml=true ./hosts/nippy.sh:312: fi -- ./hosts/oshi.sh:107: file_header=$(tor_curl_request --insecure --head -L -s --referer "$remote_url" "$download_url") ./hosts/oshi.sh:108: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/oshi.sh:109: debugHtml "${remote_url##*/}" "oshi_head$j" "download_url: ${download_url}"$'\n'"${file_header}" ./hosts/oshi.sh:110: fi ./hosts/oshi.sh:111: if [[ ! -z "$file_header" ]] ; then ./hosts/oshi.sh:112: if grep -Eqi '404 Not Found' <<< "${file_header}" ; then ./hosts/oshi.sh:113: echo -e "${RED}| O shi-, (404). The file has been removed.${NC}" ./hosts/oshi.sh:114: removedDownload "${remote_url}" ./hosts/oshi.sh:115: exitDownloadNotAvailable=true ./hosts/oshi.sh:116: return 1 ./hosts/oshi.sh:117: fi -- ./hosts/oshi.sh:201: tor_curl_request --insecure -L --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval --referer "$file_url" "$download_url" --continue-at - --output "$file_path" ./hosts/oshi.sh:202: else ./hosts/oshi.sh:203: tor_curl_request --insecure -L --referer "$file_url" "$download_url" --continue-at - --output "$file_path" ./hosts/oshi.sh:204: fi ./hosts/oshi.sh:205: received_file_size=0 ./hosts/oshi.sh:206: if [[ -f "$file_path" ]] ; then ./hosts/oshi.sh:207: received_file_size=$(stat --format="%s" "$file_path" | tr -d '[:space:]') ./hosts/oshi.sh:208: fi ./hosts/oshi.sh:209: if CheckNoHtml "$remote_url" "$filename" "$file_path" "$((received_file_size - pd_presize))" ; then ./hosts/oshi.sh:210: containsHtml=false ./hosts/oshi.sh:211: else ./hosts/oshi.sh:212: containsHtml=true ./hosts/oshi.sh:213: fi -- ./hosts/pixeldrain.sh:94: response=$(tor_curl_request --insecure -L -s "https://pixeldrain.com/u/$fileid") ./hosts/pixeldrain.sh:95: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/pixeldrain.sh:96: debugHtml "${remote_url##*/}" "pd_fetch$i" "$response" ./hosts/pixeldrain.sh:97: fi ./hosts/pixeldrain.sh:98: if [[ ! -z "$response" ]] ; then ./hosts/pixeldrain.sh:99: if grep -q -Eq '"views":' <<< "$response"; then ./hosts/pixeldrain.sh:100: pdpreviews=$(grep -o -P '(?<="views":).+?(?=,")' <<< "$response") ./hosts/pixeldrain.sh:101: fi ./hosts/pixeldrain.sh:102: if grep -i -Eq "You have reached the maximum number of open download connections" <<< "$response"; then ./hosts/pixeldrain.sh:103: if ((i >= 5)) ; then ./hosts/pixeldrain.sh:104: printf "\\n" -- ./hosts/pixeldrain.sh:259: file_header=$(tor_curl_request --insecure --head -L -s --referer "$file_url" "$pdheadurl") ./hosts/pixeldrain.sh:260: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/pixeldrain.sh:261: debugHtml "${remote_url##*/}" "pd_head$i" "url: ${pdheadurl}"$'\n'"${file_header}" ./hosts/pixeldrain.sh:262: fi ./hosts/pixeldrain.sh:263: if ! grep -Eqi 'HTTP/2 200|HTTP/1.1 200|200 OK' <<< $file_header ; then ./hosts/pixeldrain.sh:264: if ((i < 6)); then ./hosts/pixeldrain.sh:265: continue ./hosts/pixeldrain.sh:266: else ./hosts/pixeldrain.sh:267: echo -e "${YELLOW}| Filesize not found.${NC}" ./hosts/pixeldrain.sh:268: return 1 ./hosts/pixeldrain.sh:269: fi -- ./hosts/pixeldrain.sh:327: tor_curl_request --insecure \ ./hosts/pixeldrain.sh:328: --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \ ./hosts/pixeldrain.sh:329: --referer "$file_url" "$download_url" --continue-at - --output "$file_path" ./hosts/pixeldrain.sh:330: else ./hosts/pixeldrain.sh:331: tor_curl_request --insecure \ ./hosts/pixeldrain.sh:332: --referer "$file_url" "$download_url" --continue-at - --output "$file_path" ./hosts/pixeldrain.sh:333: fi ./hosts/pixeldrain.sh:334: else ./hosts/pixeldrain.sh:335: if [[ "${RateMonitorEnabled}" == "true" ]]; then ./hosts/pixeldrain.sh:336: tor_curl_request --insecure \ ./hosts/pixeldrain.sh:337: -H "User-Agent: $RandomUA" \ ./hosts/pixeldrain.sh:338: -H 'Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8' \ ./hosts/pixeldrain.sh:339: -H 'Accept-Language: en-US,en;q=0.5' -H 'Accept-Encoding: gzip, deflate, br' \ ./hosts/pixeldrain.sh:340: -H 'Connection: keep-alive' -H 'Upgrade-Insecure-Requests: 1' -H 'Sec-Fetch-Dest: document' \ ./hosts/pixeldrain.sh:341: -H 'Sec-Fetch-Mode: navigate' -H 'Sec-Fetch-Site: none' -H 'Sec-Fetch-User: ?1' \ ./hosts/pixeldrain.sh:342: --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \ ./hosts/pixeldrain.sh:343: --referer "$file_url" "$download_url" --continue-at - --output "$file_path" ./hosts/pixeldrain.sh:344: else ./hosts/pixeldrain.sh:345: tor_curl_request --insecure \ ./hosts/pixeldrain.sh:346: -H "User-Agent: $RandomUA" \ ./hosts/pixeldrain.sh:347: -H 'Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8' \ ./hosts/pixeldrain.sh:348: -H 'Accept-Language: en-US,en;q=0.5' -H 'Accept-Encoding: gzip, deflate, br' \ ./hosts/pixeldrain.sh:349: -H 'Connection: keep-alive' -H 'Upgrade-Insecure-Requests: 1' -H 'Sec-Fetch-Dest: document' \ ./hosts/pixeldrain.sh:350: -H 'Sec-Fetch-Mode: navigate' -H 'Sec-Fetch-Site: none' -H 'Sec-Fetch-User: ?1' \ ./hosts/pixeldrain.sh:351: --referer "$file_url" "$download_url" --continue-at - --output "$file_path" ./hosts/pixeldrain.sh:352: fi ./hosts/pixeldrain.sh:353: fi ./hosts/pixeldrain.sh:354: received_file_size=0 ./hosts/pixeldrain.sh:355: if [[ -f "$file_path" ]] ; then -- ./hosts/quax.sh:85: file_header=$(tor_curl_request --insecure --head -L -s "$download_url") ./hosts/quax.sh:86: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/quax.sh:87: debugHtml "${remote_url##*/}" "qx_head$j" "download_url: ${download_url}"$'\n'"${file_header}" ./hosts/quax.sh:88: fi ./hosts/quax.sh:89: if [[ ! -z "$file_header" ]] ; then ./hosts/quax.sh:90: if grep -Eqi '404 Not Found|HTTP.* 404' <<< "${file_header}" ; then ./hosts/quax.sh:91: echo -e "${RED}| The file has been removed (404).${NC}" ./hosts/quax.sh:92: removedDownload "${remote_url}" ./hosts/quax.sh:93: exitDownloadNotAvailable=true ./hosts/quax.sh:94: return 1 ./hosts/quax.sh:95: fi -- ./hosts/quax.sh:176: tor_curl_request --insecure --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval "$download_url" --continue-at - --output "$file_path" ./hosts/quax.sh:177: else ./hosts/quax.sh:178: tor_curl_request --insecure "$download_url" --continue-at - --output "$file_path" ./hosts/quax.sh:179: fi ./hosts/quax.sh:180: received_file_size=0 ./hosts/quax.sh:181: if [[ -f "$file_path" ]] ; then ./hosts/quax.sh:182: received_file_size=$(stat --format="%s" "$file_path" | tr -d '[:space:]') ./hosts/quax.sh:183: fi ./hosts/quax.sh:184: if CheckNoHtml "$remote_url" "$filename" "$file_path" "$((received_file_size - pd_presize))" ; then ./hosts/quax.sh:185: containsHtml=false ./hosts/quax.sh:186: else ./hosts/quax.sh:187: containsHtml=true ./hosts/quax.sh:188: fi -- ./hosts/ranoz.sh:90: response=$(tor_curl_request --insecure -L -s "$remote_url") ./hosts/ranoz.sh:91: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/ranoz.sh:92: debugHtml "${remote_url##*/}" "rz_fetch$i" "${response}" ./hosts/ranoz.sh:93: fi ./hosts/ranoz.sh:94: if [[ -z $response ]] ; then ./hosts/ranoz.sh:95: if [[ $i == $maxfetchretries ]] ; then ./hosts/ranoz.sh:96: printf "\\n" ./hosts/ranoz.sh:97: echo -e "${RED}| Failed to extract download url [1]${NC}" ./hosts/ranoz.sh:98: warnAndRetryUnknownError=true ./hosts/ranoz.sh:99: if [[ "${finalAttempt}" == "true" ]] ; then ./hosts/ranoz.sh:100: failedRetryDownload "${remote_url}" "Failed to extract download url [1]" "" -- ./hosts/ranoz.sh:160: file_header=$(tor_curl_request --insecure --head -L -i -s "$download_url") ./hosts/ranoz.sh:161: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/ranoz.sh:162: debugHtml "${remote_url##*/}" "rz_head$j" "download_url: ${download_url}"$'\n'"${file_header}" ./hosts/ranoz.sh:163: fi ./hosts/ranoz.sh:164: if [[ -z $file_header ]] ; then ./hosts/ranoz.sh:165: if [[ $j == $maxfetchretries ]] ; then ./hosts/ranoz.sh:166: rm -f "${rz_cookie_jar}"; ./hosts/ranoz.sh:167: printf "\\n" ./hosts/ranoz.sh:168: echo -e "${RED}| Failed to extract file info${NC}" ./hosts/ranoz.sh:169: warnAndRetryUnknownError=true ./hosts/ranoz.sh:170: if [[ "${finalAttempt}" == "true" ]] ; then -- ./hosts/ranoz.sh:272: tor_curl_request --insecure -L -G --no-alpn \ ./hosts/ranoz.sh:273: --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \ ./hosts/ranoz.sh:274: "$download_url" --continue-at - --output "$file_path" ./hosts/ranoz.sh:275: else ./hosts/ranoz.sh:276: tor_curl_request --insecure -L -G --no-alpn \ ./hosts/ranoz.sh:277: "$download_url" --continue-at - --output "$file_path" ./hosts/ranoz.sh:278: fi ./hosts/ranoz.sh:279: else ./hosts/ranoz.sh:280: if [[ "${RateMonitorEnabled}" == "true" ]]; then ./hosts/ranoz.sh:281: tor_curl_request --insecure -L -G --no-alpn \ ./hosts/ranoz.sh:282: --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \ ./hosts/ranoz.sh:283: -H "User-Agent: $RandomUA" \ ./hosts/ranoz.sh:284: -H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8" \ ./hosts/ranoz.sh:285: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/ranoz.sh:286: -H "Accept-Encoding: gzip, deflate, br" \ ./hosts/ranoz.sh:287: -H "Connection: keep-alive" \ ./hosts/ranoz.sh:288: -H "Cookie: lng=eng" \ ./hosts/ranoz.sh:289: -H "Upgrade-Insecure-Requests: 1" \ ./hosts/ranoz.sh:290: -H "Sec-Fetch-Dest: document" \ ./hosts/ranoz.sh:291: -H "Sec-Fetch-Mode: navigate" \ -- ./hosts/ranoz.sh:296: tor_curl_request --insecure -L -G --no-alpn \ ./hosts/ranoz.sh:297: -H "User-Agent: $RandomUA" \ ./hosts/ranoz.sh:298: -H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8" \ ./hosts/ranoz.sh:299: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/ranoz.sh:300: -H "Accept-Encoding: gzip, deflate, br" \ ./hosts/ranoz.sh:301: -H "Connection: keep-alive" \ ./hosts/ranoz.sh:302: -H "Cookie: lng=eng" \ ./hosts/ranoz.sh:303: -H "Upgrade-Insecure-Requests: 1" \ ./hosts/ranoz.sh:304: -H "Sec-Fetch-Dest: document" \ ./hosts/ranoz.sh:305: -H "Sec-Fetch-Mode: navigate" \ ./hosts/ranoz.sh:306: -H "Sec-Fetch-Site: same-origin" \ -- ./hosts/sendnow.sh:89: response=$(tor_curl_request --insecure -L -s -b "${snow_cookie_jar}" -c "${snow_cookie_jar}" "$remote_url") ./hosts/sendnow.sh:90: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/sendnow.sh:91: debugHtml "${remote_url##*/}" "snow_dwnpage$i" "${response}" ./hosts/sendnow.sh:92: fi ./hosts/sendnow.sh:93: if [[ -z $response ]] ; then ./hosts/sendnow.sh:94: printf " ." ./hosts/sendnow.sh:95: rm -f "${snow_cookie_jar}"; ./hosts/sendnow.sh:96: if [[ $i == $maxfetchretries ]] ; then ./hosts/sendnow.sh:97: printf "\\n" ./hosts/sendnow.sh:98: echo -e "${RED}| Failed to extract download link.${NC}" ./hosts/sendnow.sh:99: warnAndRetryUnknownError=true -- ./hosts/sendnow.sh:162: response=$(tor_curl_request --insecure -L -svo. -X POST \ ./hosts/sendnow.sh:163: -b "${snow_cookie_jar}" -c "${snow_cookie_jar}" \ ./hosts/sendnow.sh:164: --data-raw "$form_data" "$remote_url" 2>&1) ./hosts/sendnow.sh:165: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/sendnow.sh:166: debugHtml "${remote_url##*/}" "snow_post" "post_action: ${post_action}"$'\n'"form_data: ${form_data}"$'\n'"${response}" ./hosts/sendnow.sh:167: fi ./hosts/sendnow.sh:168: if [[ -z $response ]] ; then ./hosts/sendnow.sh:169: echo -e "${RED}| Failed to extract download link [2]${NC}" ./hosts/sendnow.sh:170: warnAndRetryUnknownError=true ./hosts/sendnow.sh:171: if [[ "${finalAttempt}" == "true" ]] ; then ./hosts/sendnow.sh:172: rm -f "${snow_cookie_jar}"; -- ./hosts/sendnow.sh:206: file_header=$(tor_curl_request_extended --insecure --head -Lis \ ./hosts/sendnow.sh:207: -H "Host: $fshost" \ ./hosts/sendnow.sh:208: -H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8" \ ./hosts/sendnow.sh:209: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/sendnow.sh:210: -H "Accept-Encoding: gzip, deflate, br, zstd" \ ./hosts/sendnow.sh:211: -H "Referer: https://send.now/" \ ./hosts/sendnow.sh:212: -H "Sec-GPC: 1" \ ./hosts/sendnow.sh:213: -H "Connection: keep-alive" \ ./hosts/sendnow.sh:214: -H "Upgrade-Insecure-Requests: 1" \ ./hosts/sendnow.sh:215: -H "Sec-Fetch-Dest: document" \ ./hosts/sendnow.sh:216: -H "Sec-Fetch-Mode: navigate" \ -- ./hosts/sendnow.sh:329: tor_curl_request_extended --insecure -L --no-alpn \ ./hosts/sendnow.sh:330: --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \ ./hosts/sendnow.sh:331: -H "Host: $fshost" \ ./hosts/sendnow.sh:332: -H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8" \ ./hosts/sendnow.sh:333: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/sendnow.sh:334: -H "Accept-Encoding: gzip, deflate, br, zstd" \ ./hosts/sendnow.sh:335: -H "Referer: https://send.now/" \ ./hosts/sendnow.sh:336: -H "Sec-GPC: 1" \ ./hosts/sendnow.sh:337: -H "Connection: keep-alive" \ ./hosts/sendnow.sh:338: -H "Upgrade-Insecure-Requests: 1" \ ./hosts/sendnow.sh:339: -H "Sec-Fetch-Dest: document" \ -- ./hosts/sendnow.sh:347: tor_curl_request --insecure -L --no-alpn \ ./hosts/sendnow.sh:348: -H "Host: $fshost" \ ./hosts/sendnow.sh:349: -H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8" \ ./hosts/sendnow.sh:350: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/sendnow.sh:351: -H "Accept-Encoding: gzip, deflate, br, zstd" \ ./hosts/sendnow.sh:352: -H "Referer: https://send.now/" \ ./hosts/sendnow.sh:353: -H "Sec-GPC: 1" \ ./hosts/sendnow.sh:354: -H "Connection: keep-alive" \ ./hosts/sendnow.sh:355: -H "Upgrade-Insecure-Requests: 1" \ ./hosts/sendnow.sh:356: -H "Sec-Fetch-Dest: document" \ ./hosts/sendnow.sh:357: -H "Sec-Fetch-Mode: navigate" \ -- ./hosts/sendnow.sh:366: tor_curl_request --insecure -L --no-alpn \ ./hosts/sendnow.sh:367: --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \ ./hosts/sendnow.sh:368: -H "User-Agent: $RandomUA" \ ./hosts/sendnow.sh:369: -H "Host: $fshost" \ ./hosts/sendnow.sh:370: -H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8" \ ./hosts/sendnow.sh:371: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/sendnow.sh:372: -H "Accept-Encoding: gzip, deflate, br, zstd" \ ./hosts/sendnow.sh:373: -H "Referer: https://send.now/" \ ./hosts/sendnow.sh:374: -H "Sec-GPC: 1" \ ./hosts/sendnow.sh:375: -H "Connection: keep-alive" \ ./hosts/sendnow.sh:376: -H "Upgrade-Insecure-Requests: 1" \ -- ./hosts/sendnow.sh:385: tor_curl_request --insecure -L --no-alpn \ ./hosts/sendnow.sh:386: -H "User-Agent: $RandomUA" \ ./hosts/sendnow.sh:387: -H "Host: $fshost" \ ./hosts/sendnow.sh:388: -H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8" \ ./hosts/sendnow.sh:389: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/sendnow.sh:390: -H "Accept-Encoding: gzip, deflate, br, zstd" \ ./hosts/sendnow.sh:391: -H "Referer: https://send.now/" \ ./hosts/sendnow.sh:392: -H "Sec-GPC: 1" \ ./hosts/sendnow.sh:393: -H "Connection: keep-alive" \ ./hosts/sendnow.sh:394: -H "Upgrade-Insecure-Requests: 1" \ ./hosts/sendnow.sh:395: -H "Sec-Fetch-Dest: document" \ -- ./hosts/sendspace.sh:90: response=$(tor_curl_request --insecure -L -s -b "${ss_cookie_jar}" -c "${ss_cookie_jar}" "$remote_url") ./hosts/sendspace.sh:91: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/sendspace.sh:92: debugHtml "${remote_url##*/}" "ss_dwnpage$i" "${response}" ./hosts/sendspace.sh:93: fi ./hosts/sendspace.sh:94: if [[ -z $response ]] ; then ./hosts/sendspace.sh:95: rm -f "${ss_cookie_jar}"; ./hosts/sendspace.sh:96: if [[ $i == $maxfetchretries ]] ; then ./hosts/sendspace.sh:97: printf "\\n" ./hosts/sendspace.sh:98: echo -e "${RED}| Failed to extract download link.${NC}" ./hosts/sendspace.sh:99: warnAndRetryUnknownError=true ./hosts/sendspace.sh:100: if [[ "${finalAttempt}" == "true" ]] ; then -- ./hosts/sendspace.sh:157: file_header=$(tor_curl_request --insecure -L --head -s \ ./hosts/sendspace.sh:158: -b "${ss_cookie_jar}" -c "${ss_cookie_jar}" \ ./hosts/sendspace.sh:159: "$download_url" | tr -d '\0') ./hosts/sendspace.sh:160: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/sendspace.sh:161: debugHtml "${remote_url##*/}" "ss_head$j" "FileInfoUrl: ${download_url}"$'\n'"${file_header}" ./hosts/sendspace.sh:162: fi ./hosts/sendspace.sh:163: if [[ -z $file_header ]] ; then ./hosts/sendspace.sh:164: if ((j == maxfetchretries)) ; then ./hosts/sendspace.sh:165: rm -f "${ss_cookie_jar}"; ./hosts/sendspace.sh:166: printf "\\n" ./hosts/sendspace.sh:167: echo -e "${RED}| Failed to extract file info [1]${NC}" -- ./hosts/sendspace.sh:275: tor_curl_request --insecure --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval "$download_url" --continue-at - --output "$file_path" ./hosts/sendspace.sh:276: else ./hosts/sendspace.sh:277: tor_curl_request --insecure "$download_url" --continue-at - --output "$file_path" ./hosts/sendspace.sh:278: fi ./hosts/sendspace.sh:279: else ./hosts/sendspace.sh:280: if [[ "${RateMonitorEnabled}" == "true" ]]; then ./hosts/sendspace.sh:281: tor_curl_request --insecure --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \ ./hosts/sendspace.sh:282: -H "User-Agent: $RandomUA" \ ./hosts/sendspace.sh:283: -H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8" \ ./hosts/sendspace.sh:284: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/sendspace.sh:285: -H "Accept-Encoding: gzip, deflate, br" \ ./hosts/sendspace.sh:286: -H "Connection: keep-alive" \ ./hosts/sendspace.sh:287: -H "Cookie: lng=eng" \ ./hosts/sendspace.sh:288: -H "Upgrade-Insecure-Requests: 1" \ ./hosts/sendspace.sh:289: -H "Sec-Fetch-Dest: document" \ ./hosts/sendspace.sh:290: -H "Sec-Fetch-Mode: navigate" \ ./hosts/sendspace.sh:291: -H "Sec-Fetch-Site: same-origin" \ -- ./hosts/sendspace.sh:296: tor_curl_request --insecure \ ./hosts/sendspace.sh:297: -H "User-Agent: $RandomUA" \ ./hosts/sendspace.sh:298: -H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8" \ ./hosts/sendspace.sh:299: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/sendspace.sh:300: -H "Accept-Encoding: gzip, deflate, br" \ ./hosts/sendspace.sh:301: -H "Connection: keep-alive" \ ./hosts/sendspace.sh:302: -H "Cookie: lng=eng" \ ./hosts/sendspace.sh:303: -H "Upgrade-Insecure-Requests: 1" \ ./hosts/sendspace.sh:304: -H "Sec-Fetch-Dest: document" \ ./hosts/sendspace.sh:305: -H "Sec-Fetch-Mode: navigate" \ ./hosts/sendspace.sh:306: -H "Sec-Fetch-Site: same-origin" \ -- ./hosts/syspro.sh:88: response=$(tor_curl_request --insecure -L -s "$remote_url") ./hosts/syspro.sh:89: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/syspro.sh:90: debugHtml "${remote_url##*/}" "sysp_fetch$i" "${response}" ./hosts/syspro.sh:91: fi ./hosts/syspro.sh:92: if [[ -z $response ]] ; then ./hosts/syspro.sh:93: if [[ $i == $maxfetchretries ]] ; then ./hosts/syspro.sh:94: printf "\\n" ./hosts/syspro.sh:95: echo -e "${RED}| Failed to extract download link [1]${NC}" ./hosts/syspro.sh:96: warnAndRetryUnknownError=true ./hosts/syspro.sh:97: if [[ "${finalAttempt}" == "true" ]] ; then ./hosts/syspro.sh:98: failedRetryDownload "${remote_url}" "Failed to extract download link [1]" "" -- ./hosts/syspro.sh:188: tor_curl_request --insecure -L \ ./hosts/syspro.sh:189: --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \ ./hosts/syspro.sh:190: --data "$form_data" "$post_action" \ ./hosts/syspro.sh:191: --output "$file_path" --output "$file_path" ./hosts/syspro.sh:192: else ./hosts/syspro.sh:193: tor_curl_request --insecure \ ./hosts/syspro.sh:194: --data "$form_data" "$post_action" \ ./hosts/syspro.sh:195: --output "$file_path" --output "$file_path" ./hosts/syspro.sh:196: fi ./hosts/syspro.sh:197: else ./hosts/syspro.sh:198: if [[ "${RateMonitorEnabled}" == "true" ]]; then ./hosts/syspro.sh:199: tor_curl_request --insecure -L \ ./hosts/syspro.sh:200: --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \ ./hosts/syspro.sh:201: -H "User-Agent: $RandomUA" \ ./hosts/syspro.sh:202: --data "$form_data" "$post_action" \ ./hosts/syspro.sh:203: --output "$file_path" --output "$file_path" ./hosts/syspro.sh:204: else ./hosts/syspro.sh:205: tor_curl_request --insecure -L \ ./hosts/syspro.sh:206: -H "User-Agent: $RandomUA" \ ./hosts/syspro.sh:207: --data "$form_data" "$post_action" \ ./hosts/syspro.sh:208: --output "$file_path" --output "$file_path" ./hosts/syspro.sh:209: fi ./hosts/syspro.sh:210: fi ./hosts/syspro.sh:211: if CheckNoHtml "$remote_url" "$filename" "$file_path" "$((received_file_size - pd_presize))" ; then ./hosts/syspro.sh:212: containsHtml=false ./hosts/syspro.sh:213: else ./hosts/syspro.sh:214: containsHtml=true ./hosts/syspro.sh:215: fi -- ./hosts/tempfileme.sh:89: response=$(tor_curl_request --insecure -L -s "$remote_url") ./hosts/tempfileme.sh:90: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/tempfileme.sh:91: debugHtml "${remote_url##*/}" "tmpme_fetch$j" "${response}" ./hosts/tempfileme.sh:92: fi ./hosts/tempfileme.sh:93: if [[ -z $response ]] ; then ./hosts/tempfileme.sh:94: if [[ $j == $maxfetchretries ]] ; then ./hosts/tempfileme.sh:95: printf "\\n" ./hosts/tempfileme.sh:96: echo -e "${RED}| Failed to extract download link${NC}" ./hosts/tempfileme.sh:97: warnAndRetryUnknownError=true ./hosts/tempfileme.sh:98: if [[ "${finalAttempt}" == "true" ]] ; then ./hosts/tempfileme.sh:99: failedRetryDownload "${remote_url}" "Failed to extract download link" "" -- ./hosts/tempfileme.sh:170: file_header=$(tor_curl_request --insecure -L --head -s --referer "${remote_url}" "$download_url") ./hosts/tempfileme.sh:171: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/tempfileme.sh:172: debugHtml "${remote_url##*/}" "tmpme_head$j" "download_url: ${download_url}"$'\n'"${file_header}" ./hosts/tempfileme.sh:173: fi ./hosts/tempfileme.sh:174: if [[ ! -z "$file_header" ]] ; then ./hosts/tempfileme.sh:175: if grep -Eqi 'HTTP.* 404|Not Found' <<< "${file_header}" ; then ./hosts/tempfileme.sh:176: if [[ $j == $maxfetchretries ]] ; then ./hosts/tempfileme.sh:177: printf "\\n" ./hosts/tempfileme.sh:178: echo -e "${RED}| The file has been removed (404).${NC}" ./hosts/tempfileme.sh:179: removedDownload "${remote_url}" ./hosts/tempfileme.sh:180: exitDownloadNotAvailable=true -- ./hosts/tempfileme.sh:300: tor_curl_request --insecure -L \ ./hosts/tempfileme.sh:301: --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \ ./hosts/tempfileme.sh:302: --referer "${remote_url}" \ ./hosts/tempfileme.sh:303: "$download_url" --continue-at - --output "$file_path" ./hosts/tempfileme.sh:304: else ./hosts/tempfileme.sh:305: tor_curl_request --insecure -L \ ./hosts/tempfileme.sh:306: --referer "${remote_url}" \ ./hosts/tempfileme.sh:307: "$download_url" --continue-at - --output "$file_path" ./hosts/tempfileme.sh:308: fi ./hosts/tempfileme.sh:309: else ./hosts/tempfileme.sh:310: if [[ "${RateMonitorEnabled}" == "true" ]]; then ./hosts/tempfileme.sh:311: tor_curl_request --insecure -L \ ./hosts/tempfileme.sh:312: --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \ ./hosts/tempfileme.sh:313: -H "User-Agent: $RandomUA" \ ./hosts/tempfileme.sh:314: -H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8" \ ./hosts/tempfileme.sh:315: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/tempfileme.sh:316: -H "Accept-Encoding: gzip, deflate, br" \ ./hosts/tempfileme.sh:317: -H "Connection: keep-alive" \ ./hosts/tempfileme.sh:318: -H "Upgrade-Insecure-Requests: 1" \ ./hosts/tempfileme.sh:319: -H "Sec-Fetch-Dest: document" \ ./hosts/tempfileme.sh:320: -H "Sec-Fetch-Mode: navigate" \ ./hosts/tempfileme.sh:321: -H "Sec-Fetch-Site: same-origin" \ -- ./hosts/tempfileme.sh:326: tor_curl_request --insecure -L \ ./hosts/tempfileme.sh:327: -H "User-Agent: $RandomUA" \ ./hosts/tempfileme.sh:328: -H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8" \ ./hosts/tempfileme.sh:329: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/tempfileme.sh:330: -H "Accept-Encoding: gzip, deflate, br" \ ./hosts/tempfileme.sh:331: -H "Connection: keep-alive" \ ./hosts/tempfileme.sh:332: -H "Upgrade-Insecure-Requests: 1" \ ./hosts/tempfileme.sh:333: -H "Sec-Fetch-Dest: document" \ ./hosts/tempfileme.sh:334: -H "Sec-Fetch-Mode: navigate" \ ./hosts/tempfileme.sh:335: -H "Sec-Fetch-Site: same-origin" \ ./hosts/tempfileme.sh:336: -H "Sec-Fetch-User: ?1" \ -- ./hosts/tempsh.sh:88: file_header=$(tor_curl_request --insecure -s -D - -o /dev/null -X POST \ ./hosts/tempsh.sh:89: -H "Connection: keep-alive" \ ./hosts/tempsh.sh:90: -w 'EffectiveUrl=%{url_effective}' \ ./hosts/tempsh.sh:91: "$download_url") ./hosts/tempsh.sh:92: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/tempsh.sh:93: debugHtml "${remote_url##*/}" "tmpsh_posthead" "download_url: ${download_url}"$'\n'"${file_header}" ./hosts/tempsh.sh:94: fi ./hosts/tempsh.sh:95: if [[ -z $file_header ]] ; then ./hosts/tempsh.sh:96: if [[ $j == $maxfetchretries ]] ; then ./hosts/tempsh.sh:97: printf "\\n" ./hosts/tempsh.sh:98: echo -e "${RED}| Failed to extract file info [1]${NC}" -- ./hosts/tempsh.sh:227: tor_curl_request --insecure -X POST \ ./hosts/tempsh.sh:228: --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \ ./hosts/tempsh.sh:229: "$download_url" --continue-at - --output "$file_path" ./hosts/tempsh.sh:230: else ./hosts/tempsh.sh:231: tor_curl_request --insecure -X POST \ ./hosts/tempsh.sh:232: "$download_url" --continue-at - --output "$file_path" ./hosts/tempsh.sh:233: fi ./hosts/tempsh.sh:234: else ./hosts/tempsh.sh:235: if [[ "${RateMonitorEnabled}" == "true" ]]; then ./hosts/tempsh.sh:236: tor_curl_request --insecure -X POST \ ./hosts/tempsh.sh:237: --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \ ./hosts/tempsh.sh:238: -H "User-Agent: $RandomUA" \ ./hosts/tempsh.sh:239: -H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8" \ ./hosts/tempsh.sh:240: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/tempsh.sh:241: -H "Accept-Encoding: gzip, deflate, br" \ ./hosts/tempsh.sh:242: -H "Connection: keep-alive" \ ./hosts/tempsh.sh:243: -H "Upgrade-Insecure-Requests: 1" \ ./hosts/tempsh.sh:244: -H "Sec-Fetch-Dest: document" \ ./hosts/tempsh.sh:245: -H "Sec-Fetch-Mode: navigate" \ ./hosts/tempsh.sh:246: -H "Sec-Fetch-Site: same-origin" \ -- ./hosts/tempsh.sh:250: tor_curl_request --insecure -X POST \ ./hosts/tempsh.sh:251: -H "User-Agent: $RandomUA" \ ./hosts/tempsh.sh:252: -H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8" \ ./hosts/tempsh.sh:253: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/tempsh.sh:254: -H "Accept-Encoding: gzip, deflate, br" \ ./hosts/tempsh.sh:255: -H "Connection: keep-alive" \ ./hosts/tempsh.sh:256: -H "Upgrade-Insecure-Requests: 1" \ ./hosts/tempsh.sh:257: -H "Sec-Fetch-Dest: document" \ ./hosts/tempsh.sh:258: -H "Sec-Fetch-Mode: navigate" \ ./hosts/tempsh.sh:259: -H "Sec-Fetch-Site: same-origin" \ ./hosts/tempsh.sh:260: -H "Sec-Fetch-User: ?1" \ -- ./hosts/torup.sh:92: response=$(tor_curl_request --insecure -L -s \ ./hosts/torup.sh:93: -c "${fdot_cookie_jar}" \ ./hosts/torup.sh:94: "$fixed_url") ./hosts/torup.sh:95: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/torup.sh:96: debugHtml "${remote_url##*/}" "torp_fetch$i" "${response}" ./hosts/torup.sh:97: fi ./hosts/torup.sh:98: if [[ -z $response ]] ; then ./hosts/torup.sh:99: rm -f "${torp_cookie_jar}"; ./hosts/torup.sh:100: if [[ $i == $maxfetchretries ]] ; then ./hosts/torup.sh:101: printf "\\n" ./hosts/torup.sh:102: echo -e "${RED}| Failed to extract download url [1]${NC}" -- ./hosts/torup.sh:193: tor_curl_request --insecure -L -G --no-alpn \ ./hosts/torup.sh:194: --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \ ./hosts/torup.sh:195: -b "${torp_cookie_jar}" -c "${torp_cookie_jar}" \ ./hosts/torup.sh:196: -H "Referer: $fixed_url" \ ./hosts/torup.sh:197: "$download_url" --output "$file_path" ./hosts/torup.sh:198: else ./hosts/torup.sh:199: tor_curl_request --insecure -L -G --no-alpn \ ./hosts/torup.sh:200: -b "${torp_cookie_jar}" -c "${torp_cookie_jar}" \ ./hosts/torup.sh:201: -H "Referer: $fixed_url" \ ./hosts/torup.sh:202: "$download_url" --output "$file_path" ./hosts/torup.sh:203: fi ./hosts/torup.sh:204: else ./hosts/torup.sh:205: if [[ "${RateMonitorEnabled}" == "true" ]]; then ./hosts/torup.sh:206: tor_curl_request --insecure -L -G --no-alpn \ ./hosts/torup.sh:207: --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \ ./hosts/torup.sh:208: -H "User-Agent: $RandomUA" \ ./hosts/torup.sh:209: -H "Referer: $fixed_url" \ ./hosts/torup.sh:210: -H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8" \ ./hosts/torup.sh:211: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/torup.sh:212: -H "Accept-Encoding: gzip, deflate, br" \ ./hosts/torup.sh:213: -H "Connection: keep-alive" \ ./hosts/torup.sh:214: -H "Upgrade-Insecure-Requests: 1" \ ./hosts/torup.sh:215: -H "Sec-Fetch-Dest: document" \ ./hosts/torup.sh:216: -H "Sec-Fetch-Mode: navigate" \ -- ./hosts/torup.sh:222: tor_curl_request --insecure -L -G --no-alpn \ ./hosts/torup.sh:223: -H "User-Agent: $RandomUA" \ ./hosts/torup.sh:224: -H "Referer: $fixed_url" \ ./hosts/torup.sh:225: -H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8" \ ./hosts/torup.sh:226: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/torup.sh:227: -H "Accept-Encoding: gzip, deflate, br" \ ./hosts/torup.sh:228: -H "Connection: keep-alive" \ ./hosts/torup.sh:229: -H "Upgrade-Insecure-Requests: 1" \ ./hosts/torup.sh:230: -H "Sec-Fetch-Dest: document" \ ./hosts/torup.sh:231: -H "Sec-Fetch-Mode: navigate" \ ./hosts/torup.sh:232: -H "Sec-Fetch-Site: same-origin" \ -- ./hosts/up2share.sh:91: response=$(tor_curl_request --insecure -L -s -b "${up2share_cookie_jar}" -c "${up2share_cookie_jar}" \ ./hosts/up2share.sh:92: -w "\n\nHTTP_CODE: %{http_code}\nEFFECTIVE_URL: %{url_effective}\n" \ ./hosts/up2share.sh:93: "$fixed_url") ./hosts/up2share.sh:94: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/up2share.sh:95: debugHtml "${remote_url##*/}" "up2share_fetch$i" "${response}" ./hosts/up2share.sh:96: fi ./hosts/up2share.sh:97: if [[ -z $response ]] ; then ./hosts/up2share.sh:98: rm -f "${up2share_cookie_jar}"; ./hosts/up2share.sh:99: if [[ $i == $maxfetchretries ]] ; then ./hosts/up2share.sh:100: printf "\\n" ./hosts/up2share.sh:101: echo -e "${RED}| Failed to extract token link [1].${NC}" -- ./hosts/up2share.sh:144: response=$(tor_curl_request --insecure -L -s -b "${up2share_cookie_jar}" -c "${up2share_cookie_jar}" \ ./hosts/up2share.sh:145: -w "\n\nHTTP_CODE: %{http_code}\nEFFECTIVE_URL: %{url_effective}\n" \ ./hosts/up2share.sh:146: "$download_url") ./hosts/up2share.sh:147: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/up2share.sh:148: debugHtml "${remote_url##*/}" "up2share_down$i" "${response}" ./hosts/up2share.sh:149: fi ./hosts/up2share.sh:150: if [[ -z $response ]] ; then ./hosts/up2share.sh:151: rm -f "${up2share_cookie_jar}"; ./hosts/up2share.sh:152: if [[ $i == $maxfetchretries ]] ; then ./hosts/up2share.sh:153: printf "\\n" ./hosts/up2share.sh:154: echo -e "${RED}| Failed to extract download link [1].${NC}" -- ./hosts/up2share.sh:195: file_header=$(tor_curl_request --insecure -L -s --head \ ./hosts/up2share.sh:196: -b "${up2share_cookie_jar}" -c "${up2share_cookie_jar}" \ ./hosts/up2share.sh:197: --referer "https://up2sha.re/" "$download_url") ./hosts/up2share.sh:198: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/up2share.sh:199: debugHtml "${remote_url##*/}" "up2share_head$j" "download_url: ${download_url}"$'\n'"${file_header}" ./hosts/up2share.sh:200: fi ./hosts/up2share.sh:201: if [[ -z $file_header ]] ; then ./hosts/up2share.sh:202: if [[ $j == $maxfetchretries ]] ; then ./hosts/up2share.sh:203: rm -f "${up2share_cookie_jar}"; ./hosts/up2share.sh:204: printf "\\n" ./hosts/up2share.sh:205: echo -e "${RED}| Failed to extract file info${NC}" -- ./hosts/up2share.sh:314: tor_curl_request --insecure -L \ ./hosts/up2share.sh:315: --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \ ./hosts/up2share.sh:316: -b "${up2share_cookie_jar}" -c "${up2share_cookie_jar}" \ ./hosts/up2share.sh:317: -H "Host: up2sha.re" \ ./hosts/up2share.sh:318: --referer "https://up2sha.re/" \ ./hosts/up2share.sh:319: "$download_url" --continue-at - --output "$file_path" ./hosts/up2share.sh:320: else ./hosts/up2share.sh:321: tor_curl_request --insecure -L \ ./hosts/up2share.sh:322: -b "${up2share_cookie_jar}" -c "${up2share_cookie_jar}" \ ./hosts/up2share.sh:323: -H "Host: up2sha.re" \ ./hosts/up2share.sh:324: --referer "https://up2sha.re/" \ ./hosts/up2share.sh:325: "$download_url" --continue-at - --output "$file_path" ./hosts/up2share.sh:326: fi ./hosts/up2share.sh:327: else ./hosts/up2share.sh:328: if [[ "${RateMonitorEnabled}" == "true" ]]; then ./hosts/up2share.sh:329: tor_curl_request --insecure -L \ ./hosts/up2share.sh:330: --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \ ./hosts/up2share.sh:331: -b "${up2share_cookie_jar}" -c "${up2share_cookie_jar}" \ ./hosts/up2share.sh:332: -H "Host: up2sha.re" \ ./hosts/up2share.sh:333: -H "User-Agent: $RandomUA" \ ./hosts/up2share.sh:334: -H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8" \ ./hosts/up2share.sh:335: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/up2share.sh:336: -H "Accept-Encoding: gzip, deflate, br" \ ./hosts/up2share.sh:337: -H "Connection: keep-alive" \ ./hosts/up2share.sh:338: -H "Cookie: lng=eng" \ ./hosts/up2share.sh:339: -H "Upgrade-Insecure-Requests: 1" \ -- ./hosts/up2share.sh:347: tor_curl_request --insecure -L \ ./hosts/up2share.sh:348: -b "${up2share_cookie_jar}" -c "${up2share_cookie_jar}" \ ./hosts/up2share.sh:349: -H "Host: up2sha.re" \ ./hosts/up2share.sh:350: -H "User-Agent: $RandomUA" \ ./hosts/up2share.sh:351: -H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8" \ ./hosts/up2share.sh:352: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/up2share.sh:353: -H "Accept-Encoding: gzip, deflate, br" \ ./hosts/up2share.sh:354: -H "Connection: keep-alive" \ ./hosts/up2share.sh:355: -H "Cookie: lng=eng" \ ./hosts/up2share.sh:356: -H "Upgrade-Insecure-Requests: 1" \ ./hosts/up2share.sh:357: -H "Sec-Fetch-Dest: document" \ -- ./hosts/uploadee.sh:90: response=$(tor_curl_request --insecure -L -s "$remote_url") ./hosts/uploadee.sh:91: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/uploadee.sh:92: debugHtml "${remote_url##*/}" "upee_dwnpage$i" "${response}" ./hosts/uploadee.sh:93: fi ./hosts/uploadee.sh:94: if [[ -z $response ]] ; then ./hosts/uploadee.sh:95: rm -f "${upee_cookie_jar}"; ./hosts/uploadee.sh:96: if [[ $i == $maxfetchretries ]] ; then ./hosts/uploadee.sh:97: printf "\\n" ./hosts/uploadee.sh:98: echo -e "${RED}| Failed to extract download link.${NC}" ./hosts/uploadee.sh:99: warnAndRetryUnknownError=true ./hosts/uploadee.sh:100: if [[ "${finalAttempt}" == "true" ]] ; then -- ./hosts/uploadee.sh:143: file_header=$(tor_curl_request --insecure --head -L -s -b "${upee_cookie_jar}" -c "${upee_cookie_jar}" --referer "$remote_url" "$download_url") ./hosts/uploadee.sh:144: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/uploadee.sh:145: debugHtml "${remote_url##*/}" "upee_head$j" "download_url: ${download_url}"$'\n'"${file_header}" ./hosts/uploadee.sh:146: fi ./hosts/uploadee.sh:147: if [[ -z $file_header ]] ; then ./hosts/uploadee.sh:148: if [[ $j == $maxfetchretries ]] ; then ./hosts/uploadee.sh:149: rm -f "${upee_cookie_jar}"; ./hosts/uploadee.sh:150: printf "\\n" ./hosts/uploadee.sh:151: echo -e "${RED}| Failed to extract file info.${NC}" ./hosts/uploadee.sh:152: warnAndRetryUnknownError=true ./hosts/uploadee.sh:153: if [[ "${finalAttempt}" == "true" ]] ; then -- ./hosts/uploadee.sh:251: tor_curl_request --insecure -L -G --no-alpn \ ./hosts/uploadee.sh:252: -b "${upee_cookie_jar}" -c "${upee_cookie_jar}" --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \ ./hosts/uploadee.sh:253: -H "Host: www.upload.ee" \ ./hosts/uploadee.sh:254: --referer "$remote_url" "$download_url" \ ./hosts/uploadee.sh:255: --continue-at - --output "$file_path" ./hosts/uploadee.sh:256: else ./hosts/uploadee.sh:257: tor_curl_request --insecure -L -G --no-alpn \ ./hosts/uploadee.sh:258: -b "${upee_cookie_jar}" -c "${upee_cookie_jar}" \ ./hosts/uploadee.sh:259: -H "Host: www.upload.ee" \ ./hosts/uploadee.sh:260: --referer "$remote_url" "$download_url" \ ./hosts/uploadee.sh:261: --continue-at - --output "$file_path" ./hosts/uploadee.sh:262: fi ./hosts/uploadee.sh:263: else ./hosts/uploadee.sh:264: if [[ "${RateMonitorEnabled}" == "true" ]]; then ./hosts/uploadee.sh:265: tor_curl_request --insecure -L -G --no-alpn \ ./hosts/uploadee.sh:266: -b "${upee_cookie_jar}" -c "${upee_cookie_jar}" --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \ ./hosts/uploadee.sh:267: -H "Host: www.upload.ee" \ ./hosts/uploadee.sh:268: -H "User-Agent: $RandomUA" \ ./hosts/uploadee.sh:269: -H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8" \ ./hosts/uploadee.sh:270: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/uploadee.sh:271: -H "Accept-Encoding: gzip, deflate, br" \ ./hosts/uploadee.sh:272: -H "Connection: keep-alive" \ ./hosts/uploadee.sh:273: -H "Cookie: lng=eng" \ ./hosts/uploadee.sh:274: -H "Upgrade-Insecure-Requests: 1" \ ./hosts/uploadee.sh:275: -H "Sec-Fetch-Dest: document" \ -- ./hosts/uploadee.sh:282: tor_curl_request --insecure -L -G --no-alpn \ ./hosts/uploadee.sh:283: -b "${upee_cookie_jar}" -c "${upee_cookie_jar}" \ ./hosts/uploadee.sh:284: -H "Host: www.upload.ee" \ ./hosts/uploadee.sh:285: -H "User-Agent: $RandomUA" \ ./hosts/uploadee.sh:286: -H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8" \ ./hosts/uploadee.sh:287: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/uploadee.sh:288: -H "Accept-Encoding: gzip, deflate, br" \ ./hosts/uploadee.sh:289: -H "Connection: keep-alive" \ ./hosts/uploadee.sh:290: -H "Cookie: lng=eng" \ ./hosts/uploadee.sh:291: -H "Upgrade-Insecure-Requests: 1" \ ./hosts/uploadee.sh:292: -H "Sec-Fetch-Dest: document" \ -- ./hosts/uploadev.sh:91: response=$(tor_curl_request --insecure -L -s -b "${upev_cookie_jar}" -c "${upev_cookie_jar}" \ ./hosts/uploadev.sh:92: -w "\n\nHTTP_CODE: %{http_code}\nEFFECTIVE_URL: %{url_effective}\n" \ ./hosts/uploadev.sh:93: "$fixed_url") ./hosts/uploadev.sh:94: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/uploadev.sh:95: debugHtml "${remote_url##*/}" "upev_fetch$i" "${response}" ./hosts/uploadev.sh:96: fi ./hosts/uploadev.sh:97: if [[ -z $response ]] ; then ./hosts/uploadev.sh:98: rm -f "${upev_cookie_jar}"; ./hosts/uploadev.sh:99: if [[ $i == $maxfetchretries ]] ; then ./hosts/uploadev.sh:100: printf "\\n" ./hosts/uploadev.sh:101: echo -e "${RED}| Failed to extract download link [1]${NC}" -- ./hosts/uploadev.sh:181: response=$(tor_curl_request --insecure -L -s -X POST \ ./hosts/uploadev.sh:182: -b "${upev_cookie_jar}" -c "${upev_cookie_jar}" \ ./hosts/uploadev.sh:183: --data "$form_data" "$fixed_url") ./hosts/uploadev.sh:184: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/uploadev.sh:185: debugHtml "${remote_url##*/}" "upev_post2_$i" "url: ${fixed_url}"$'\n'"form_data: ${form_data}"$'\n'"${response}" ./hosts/uploadev.sh:186: fi ./hosts/uploadev.sh:187: if [[ -z $response ]] ; then ./hosts/uploadev.sh:188: if [[ $i == $maxfetchretries ]] ; then ./hosts/uploadev.sh:189: rm -f "${upev_cookie_jar}"; ./hosts/uploadev.sh:190: printf "\\n" ./hosts/uploadev.sh:191: echo -e "${RED}| Failed to extract download link [4]${NC}" -- ./hosts/uploadev.sh:268: file_header=$(tor_curl_request --insecure -L --head -s "$download_url") ./hosts/uploadev.sh:269: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/uploadev.sh:270: debugHtml "${remote_url##*/}" "upev_head$j" "download_url: ${download_url}"$'\n'"${file_header}" ./hosts/uploadev.sh:271: fi ./hosts/uploadev.sh:272: if [[ -z $file_header ]] ; then ./hosts/uploadev.sh:273: if [[ $j == $maxfetchretries ]] ; then ./hosts/uploadev.sh:274: rm -f "${upev_cookie_jar}"; ./hosts/uploadev.sh:275: printf "\\n" ./hosts/uploadev.sh:276: echo -e "${RED}| Failed to extract file info [1]${NC}" ./hosts/uploadev.sh:277: warnAndRetryUnknownError=true ./hosts/uploadev.sh:278: if [[ "${finalAttempt}" == "true" ]] ; then -- ./hosts/uploadev.sh:369: tor_curl_request --insecure -L \ ./hosts/uploadev.sh:370: --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \ ./hosts/uploadev.sh:371: -b "${upev_cookie_jar}" -c "${upev_cookie_jar}" \ ./hosts/uploadev.sh:372: "$download_url" --continue-at - --output "$file_path" ./hosts/uploadev.sh:373: else ./hosts/uploadev.sh:374: tor_curl_request --insecure -L \ ./hosts/uploadev.sh:375: -b "${upev_cookie_jar}" -c "${upev_cookie_jar}" \ ./hosts/uploadev.sh:376: "$download_url" --continue-at - --output "$file_path" ./hosts/uploadev.sh:377: fi ./hosts/uploadev.sh:378: else ./hosts/uploadev.sh:379: if [[ "${RateMonitorEnabled}" == "true" ]]; then ./hosts/uploadev.sh:380: tor_curl_request --insecure -L \ ./hosts/uploadev.sh:381: --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \ ./hosts/uploadev.sh:382: -b "${upev_cookie_jar}" -c "${upev_cookie_jar}" \ ./hosts/uploadev.sh:383: -H "User-Agent: $RandomUA" \ ./hosts/uploadev.sh:384: -H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8" \ ./hosts/uploadev.sh:385: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/uploadev.sh:386: -H "Accept-Encoding: gzip, deflate, br" \ ./hosts/uploadev.sh:387: -H "Connection: keep-alive" \ ./hosts/uploadev.sh:388: -H "Cookie: lng=eng" \ ./hosts/uploadev.sh:389: -H "Upgrade-Insecure-Requests: 1" \ ./hosts/uploadev.sh:390: -H "Sec-Fetch-Dest: document" \ -- ./hosts/uploadev.sh:396: tor_curl_request --insecure -L \ ./hosts/uploadev.sh:397: -b "${upev_cookie_jar}" -c "${upev_cookie_jar}" \ ./hosts/uploadev.sh:398: -H "User-Agent: $RandomUA" \ ./hosts/uploadev.sh:399: -H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8" \ ./hosts/uploadev.sh:400: -H "Accept-Language: en-US,en;q=0.5" \ ./hosts/uploadev.sh:401: -H "Accept-Encoding: gzip, deflate, br" \ ./hosts/uploadev.sh:402: -H "Connection: keep-alive" \ ./hosts/uploadev.sh:403: -H "Cookie: lng=eng" \ ./hosts/uploadev.sh:404: -H "Upgrade-Insecure-Requests: 1" \ ./hosts/uploadev.sh:405: -H "Sec-Fetch-Dest: document" \ ./hosts/uploadev.sh:406: -H "Sec-Fetch-Mode: navigate" \ -- ./hosts/uploadflix.sh:97: response=$(tor_curl_request --insecure -L -s "${fixed_url}") ./hosts/uploadflix.sh:98: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/uploadflix.sh:99: debugHtml "${remote_url##*/}" "uflix_dwnpage$j" "${response}" ./hosts/uploadflix.sh:100: fi ./hosts/uploadflix.sh:101: if [[ -z $response ]] ; then ./hosts/uploadflix.sh:102: if [[ $j == $maxfetchretries ]] ; then ./hosts/uploadflix.sh:103: printf "\\n" ./hosts/uploadflix.sh:104: echo -e "${RED}| Failed to extract post link.${NC}" ./hosts/uploadflix.sh:105: warnAndRetryUnknownError=true ./hosts/uploadflix.sh:106: if [[ "${finalAttempt}" == "true" ]] ; then ./hosts/uploadflix.sh:107: failedRetryDownload "${remote_url}" "" "" -- ./hosts/uploadflix.sh:150: response=$(tor_curl_request --insecure -L -s -X POST --data "$form_data" "${fixed_url}") ./hosts/uploadflix.sh:151: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/uploadflix.sh:152: debugHtml "${remote_url##*/}" "uflix_post" "form_data: ${form_data}"$'\n'"${response}" ./hosts/uploadflix.sh:153: fi ./hosts/uploadflix.sh:154: if [[ -z $response ]] ; then ./hosts/uploadflix.sh:155: echo -e "${RED}| Failed to extract download link.${NC}" ./hosts/uploadflix.sh:156: warnAndRetryUnknownError=true ./hosts/uploadflix.sh:157: if [[ "${finalAttempt}" == "true" ]] ; then ./hosts/uploadflix.sh:158: failedRetryDownload "${remote_url}" "" "" ./hosts/uploadflix.sh:159: fi ./hosts/uploadflix.sh:160: return 1 -- ./hosts/uploadflix.sh:192: file_header=$(tor_curl_request --insecure -L --head -s --referer "${fixed_url}" "${download_url}") ./hosts/uploadflix.sh:193: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/uploadflix.sh:194: debugHtml "${remote_url##*/}" "uflix_head$j" "download_url: ${download_url}"$'\n'"${file_header}" ./hosts/uploadflix.sh:195: fi ./hosts/uploadflix.sh:196: if [[ -z $file_header ]] ; then ./hosts/uploadflix.sh:197: if [[ $j == $maxfetchretries ]] ; then ./hosts/uploadflix.sh:198: printf "\\n" ./hosts/uploadflix.sh:199: echo -e "${RED}| Failed to extract file info.${NC}" ./hosts/uploadflix.sh:200: warnAndRetryUnknownError=true ./hosts/uploadflix.sh:201: if [[ "${finalAttempt}" == "true" ]] ; then ./hosts/uploadflix.sh:202: failedRetryDownload "${remote_url}" "" "" -- ./hosts/uploadflix.sh:286: tor_curl_request --insecure -L -G --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval "$download_url" --continue-at - --output "$file_path" ./hosts/uploadflix.sh:287: else ./hosts/uploadflix.sh:288: tor_curl_request --insecure -L -G "$download_url" --continue-at - --output "$file_path" ./hosts/uploadflix.sh:289: fi ./hosts/uploadflix.sh:290: received_file_size=0 ./hosts/uploadflix.sh:291: if [[ -f "$file_path" ]] ; then ./hosts/uploadflix.sh:292: received_file_size=$(stat --format="%s" "$file_path" | tr -d '[:space:]') ./hosts/uploadflix.sh:293: fi ./hosts/uploadflix.sh:294: if CheckNoHtml "$remote_url" "$filename" "$file_path" "$((received_file_size - pd_presize))" ; then ./hosts/uploadflix.sh:295: containsHtml=false ./hosts/uploadflix.sh:296: else ./hosts/uploadflix.sh:297: containsHtml=true ./hosts/uploadflix.sh:298: fi -- ./hosts/uploadhive.sh:88: response=$(tor_curl_request --insecure -L -s "$remote_url") ./hosts/uploadhive.sh:89: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/uploadhive.sh:90: debugHtml "${remote_url##*/}" "uhive_dwnpage$j" "${response}" ./hosts/uploadhive.sh:91: fi ./hosts/uploadhive.sh:92: if [[ -z $response ]] ; then ./hosts/uploadhive.sh:93: if [[ $j == $maxfetchretries ]] ; then ./hosts/uploadhive.sh:94: printf "\\n" ./hosts/uploadhive.sh:95: echo -e "${RED}| Failed to extract post link.${NC}" ./hosts/uploadhive.sh:96: warnAndRetryUnknownError=true ./hosts/uploadhive.sh:97: if [[ "${finalAttempt}" == "true" ]] ; then ./hosts/uploadhive.sh:98: failedRetryDownload "${remote_url}" "" "" -- ./hosts/uploadhive.sh:135: response=$(tor_curl_request --insecure -L -s -X POST --data "$form_data" "$remote_url" --connect-to uploadhive.com::172.67.130.243) ./hosts/uploadhive.sh:136: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/uploadhive.sh:137: debugHtml "${remote_url##*/}" "uhive_post" "${response}" ./hosts/uploadhive.sh:138: fi ./hosts/uploadhive.sh:139: if [[ -z $response ]] ; then ./hosts/uploadhive.sh:140: echo -e "${RED}| Failed to extract download link [1]${NC}" ./hosts/uploadhive.sh:141: warnAndRetryUnknownError=true ./hosts/uploadhive.sh:142: if [[ "${finalAttempt}" == "true" ]] ; then ./hosts/uploadhive.sh:143: failedRetryDownload "${remote_url}" "Failed to extract download link [1]" "" ./hosts/uploadhive.sh:144: fi ./hosts/uploadhive.sh:145: return 1 -- ./hosts/uploadhive.sh:249: tor_curl_request --insecure -L -G --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval "$download_url" --continue-at - --output "$file_path" ./hosts/uploadhive.sh:250: else ./hosts/uploadhive.sh:251: tor_curl_request --insecure -L -G "$download_url" --continue-at - --output "$file_path" ./hosts/uploadhive.sh:252: fi ./hosts/uploadhive.sh:253: received_file_size=0 ./hosts/uploadhive.sh:254: if [[ -f "$file_path" ]] ; then ./hosts/uploadhive.sh:255: received_file_size=$(stat --format="%s" "$file_path" | tr -d '[:space:]') ./hosts/uploadhive.sh:256: fi ./hosts/uploadhive.sh:257: if CheckNoHtml "$remote_url" "$filename" "$file_path" "$((received_file_size - pd_presize))" ; then ./hosts/uploadhive.sh:258: containsHtml=false ./hosts/uploadhive.sh:259: else ./hosts/uploadhive.sh:260: containsHtml=true ./hosts/uploadhive.sh:261: fi -- ./hosts/up_1fichier.sh:107: response=$(tor_curl_request --insecure -L -s "https://1fichier.com/") ./hosts/up_1fichier.sh:108: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/up_1fichier.sh:109: debugHtml "${filepath##*/}" "${_hostCode}_up_getid_$i" "url: https://1fichier.com/"$'\n'"${response}" ./hosts/up_1fichier.sh:110: fi ./hosts/up_1fichier.sh:111: if [[ -z $response ]] ; then ./hosts/up_1fichier.sh:112: if [[ $i == $maxfetchretries ]] ; then ./hosts/up_1fichier.sh:113: if [[ "${finalAttempt}" == "true" ]] ; then ./hosts/up_1fichier.sh:114: printf "\\n" ./hosts/up_1fichier.sh:115: echo -e "${RED}| Upload failed. (GetId [1])${NC}" ./hosts/up_1fichier.sh:116: failedUpload "$pline" "${filepath}" "${_hostCode}" "Failed to upload file" "No Response (GetId [1])" ./hosts/up_1fichier.sh:117: exitUploadError=true -- ./hosts/up_1fichier.sh:180: response=$(tor_curl_upload --insecure -L \ ./hosts/up_1fichier.sh:181: -F "file[]=@${arrFiles[@]}" \ ./hosts/up_1fichier.sh:182: -F "send_ssl=on" \ ./hosts/up_1fichier.sh:183: -F "domain=0" \ ./hosts/up_1fichier.sh:184: -F "mail=" \ ./hosts/up_1fichier.sh:185: -F "dpass=" \ ./hosts/up_1fichier.sh:186: -F "user=" \ ./hosts/up_1fichier.sh:187: -F "mails=" \ ./hosts/up_1fichier.sh:188: -F "message=" \ ./hosts/up_1fichier.sh:189: "${PostUrlHost}") ./hosts/up_1fichier.sh:190: if [[ "${DebugAllEnabled}" == "true" ]] ; then -- ./hosts/up_anonfile.sh:102: response=$(tor_curl_upload --insecure -i \ ./hosts/up_anonfile.sh:103: -H "Content-Type: multipart/form-data" \ ./hosts/up_anonfile.sh:104: -F "sess_id=" \ ./hosts/up_anonfile.sh:105: -F "utype=anon" \ ./hosts/up_anonfile.sh:106: -F "file_descr=" \ ./hosts/up_anonfile.sh:107: -F "file_public=1" \ ./hosts/up_anonfile.sh:108: -F "link_rcpt=" \ ./hosts/up_anonfile.sh:109: -F "link_pass=" \ ./hosts/up_anonfile.sh:110: -F "to_folder=" \ ./hosts/up_anonfile.sh:111: -F "upload=Start upload" \ ./hosts/up_anonfile.sh:112: -F "keepalive=1" \ -- ./hosts/up_anonsharing.sh:102: response=$(tor_curl_upload --insecure -i \ ./hosts/up_anonsharing.sh:103: -H "Content-Type: multipart/form-data" \ ./hosts/up_anonsharing.sh:104: -F "files[]=@${arrFiles[@]}" \ ./hosts/up_anonsharing.sh:105: "${PostUrlHost}") ./hosts/up_anonsharing.sh:106: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/up_anonsharing.sh:107: debugHtml "${filepath##*/}" "${_hostCode}_upload" "post_url: ${PostUrlHost}"$'\n'"${response}" ./hosts/up_anonsharing.sh:108: fi ./hosts/up_anonsharing.sh:109: if grep -Eqi '"error":null,"url":"https:\\/\\/anonsharing.com\\/' <<< "${response}" ; then ./hosts/up_anonsharing.sh:110: fileid=$(grep -oPi '(?<=","file_id":").*?(?=".*$)' <<< "$response") ./hosts/up_anonsharing.sh:111: filesize=$(GetFileSize "$filepath" "false") ./hosts/up_anonsharing.sh:112: downloadLink="https://anonsharing.com/fileid=${fileid}" -- ./hosts/up_ateasystems.sh:102: response=$(tor_curl_upload --insecure -i \ ./hosts/up_ateasystems.sh:103: -H "Content-Type: multipart/form-data" \ ./hosts/up_ateasystems.sh:104: -F "tos=" \ ./hosts/up_ateasystems.sh:105: -F "file_0_descr=" \ ./hosts/up_ateasystems.sh:106: -F "link_pass=" \ ./hosts/up_ateasystems.sh:107: -F "file_0=@${filepath}" \ ./hosts/up_ateasystems.sh:108: "${PostUrlHost}") ./hosts/up_ateasystems.sh:109: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/up_ateasystems.sh:110: debugHtml "${filepath##*/}" "${_hostCode}_upload" "post_url: ${PostUrlHost}"$'\n'"${response}" ./hosts/up_ateasystems.sh:111: fi ./hosts/up_ateasystems.sh:112: if grep -Eqi "Location: https://share\.ateasystems\.com/share/\?\&filename\=" <<< "${response}" ; then -- ./hosts/up_axfc.sh:109: response=$(tor_curl_request --insecure -L -s -b "${axfc_cookie_jar}" -c "${axfc_cookie_jar}" "$fixed_url") ./hosts/up_axfc.sh:110: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/up_axfc.sh:111: debugHtml "${filepath##*/}" "axfc_fetch$i" "${response}" ./hosts/up_axfc.sh:112: fi ./hosts/up_axfc.sh:113: if [[ -z $response ]] ; then ./hosts/up_axfc.sh:114: rm -f "${axfc_cookie_jar}"; ./hosts/up_axfc.sh:115: if [[ $i == $maxfetchretries ]] ; then ./hosts/up_axfc.sh:116: printf "\\n" ./hosts/up_axfc.sh:117: echo -e "${RED}| Failed to start an upload [1]${NC}" ./hosts/up_axfc.sh:118: warnAndRetryUnknownError=true ./hosts/up_axfc.sh:119: if [[ "${finalAttempt}" == "true" ]] ; then -- ./hosts/up_axfc.sh:136: response=$(tor_curl_upload --insecure -L -s -X POST \ ./hosts/up_axfc.sh:137: -H 'Referer: https://www.axfc.net/u/post_m.pl' \ ./hosts/up_axfc.sh:138: -H 'Content-Type: application/x-www-form-urlencoded' \ ./hosts/up_axfc.sh:139: -H 'Origin: https://www.axfc.net' \ ./hosts/up_axfc.sh:140: -H 'Connection: keep-alive' \ ./hosts/up_axfc.sh:141: -b "${axfc_cookie_jar}" -c "${axfc_cookie_jar}" \ ./hosts/up_axfc.sh:142: --data-raw "method=upload&ext=ext&filename=1&comment=&address=&delpass=$randelkey&keyword=1234&count=&term=0&term_y=2024&term_mon=10&term_d=1&term_h=15&term_min=0&term_s=0&term_ps=&term_mp=3600" \ ./hosts/up_axfc.sh:143: -w "\n\nHTTP_CODE: %{http_code}\nEFFECTIVE_URL: %{url_effective}\n" \ ./hosts/up_axfc.sh:144: "$fixed_url") ./hosts/up_axfc.sh:145: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/up_axfc.sh:146: debugHtml "${filepath##*/}" "axfc_ticket$i" "${response}" -- ./hosts/up_axfc.sh:184: response=$(tor_curl_upload --insecure -L -i -X POST \ ./hosts/up_axfc.sh:185: -H "Content-Type: multipart/form-data" \ ./hosts/up_axfc.sh:186: -H 'Connection: keep-alive' \ ./hosts/up_axfc.sh:187: -F "filedata=@$filepath" \ ./hosts/up_axfc.sh:188: -b "${axfc_cookie_jar}" -c "${axfc_cookie_jar}" \ ./hosts/up_axfc.sh:189: "$PostUrlHost") ./hosts/up_axfc.sh:190: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/up_axfc.sh:191: debugHtml "${filepath##*/}" "${_hostCode}_upload" "post_url: ${PostUrlHost}"$'\n'"${response}" ./hosts/up_axfc.sh:192: fi ./hosts/up_axfc.sh:193: response_ascii=$(mconvert_utf8_to_ascii "$response") ./hosts/up_axfc.sh:194: if [[ "${DebugAllEnabled}" == "true" ]] ; then -- ./hosts/up_bedrive.sh:102: response=$(tor_curl_upload --insecure -i \ ./hosts/up_bedrive.sh:103: -H "Content-Type: multipart/form-data" \ ./hosts/up_bedrive.sh:104: -F "time=month" \ ./hosts/up_bedrive.sh:105: -F "files[]=@${arrFiles[@]}" \ ./hosts/up_bedrive.sh:106: "${PostUrlHost}") ./hosts/up_bedrive.sh:107: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/up_bedrive.sh:108: debugHtml "${filepath##*/}" "${_hostCode}_upload" "post_url: ${PostUrlHost}"$'\n'"${response}" ./hosts/up_bedrive.sh:109: fi ./hosts/up_bedrive.sh:110: if grep -Eqi '"error":null,"url":"https:\\/\\/bedrive.ru\\/' <<< "${response}" ; then ./hosts/up_bedrive.sh:111: hash=$(grep -oPi '(?<="url":"https:\\/\\/bedrive.ru\\/).*?(?=".*$)' <<< "$response") ./hosts/up_bedrive.sh:112: filesize=$(GetFileSize "$filepath" "false") -- ./hosts/up_bowfile.sh:108: response=$(tor_curl_request --insecure -L -i \ ./hosts/up_bowfile.sh:109: -H "Content-Type: multipart/form-data" \ ./hosts/up_bowfile.sh:110: -F "files[]=@$filepath" \ ./hosts/up_bowfile.sh:111: "${PostUrlHost}") ./hosts/up_bowfile.sh:112: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/up_bowfile.sh:113: debugHtml "${filepath##*/}" "${_hostCode}_upload" "post_url: ${PostUrlHost}"$'\n'"${response}" ./hosts/up_bowfile.sh:114: fi ./hosts/up_bowfile.sh:115: if grep -Eqi '"error":null,"url":"https:\\/\\/bowfile.com\\/' <<< "${response}" ; then ./hosts/up_bowfile.sh:116: url=$(grep -oPi '(?<="url":"https:\\/\\/bowfile.com\\/).*?(?=")' <<< "$response") ./hosts/up_bowfile.sh:117: hash=$(grep -oPi '(?<="short_url":").*?(?=")' <<< "$response") ./hosts/up_bowfile.sh:118: filesize=$(GetFileSize "$filepath" "false") -- ./hosts/up_dailyuploads.sh:109: response=$(tor_curl_upload --insecure -i \ ./hosts/up_dailyuploads.sh:110: -H "Content-Type: multipart/form-data" \ ./hosts/up_dailyuploads.sh:111: -F "sess_id=" \ ./hosts/up_dailyuploads.sh:112: -F "utype=anon" \ ./hosts/up_dailyuploads.sh:113: -F "link_rcpt=" \ ./hosts/up_dailyuploads.sh:114: -F "link_pass=" \ ./hosts/up_dailyuploads.sh:115: -F "to_folder=" \ ./hosts/up_dailyuploads.sh:116: -F "file_descr=" \ ./hosts/up_dailyuploads.sh:117: -F "file_public=1" \ ./hosts/up_dailyuploads.sh:118: -F "file_0=@$filepath" \ ./hosts/up_dailyuploads.sh:119: "${PostUrlHost}") -- ./hosts/up_dashfile.sh:102: response=$(tor_curl_upload --insecure -i \ ./hosts/up_dashfile.sh:103: -H "Content-Type: multipart/form-data" \ ./hosts/up_dashfile.sh:104: -F "sess_id=" \ ./hosts/up_dashfile.sh:105: -F "utype=anon" \ ./hosts/up_dashfile.sh:106: -F "file_descr=" \ ./hosts/up_dashfile.sh:107: -F "file_public=1" \ ./hosts/up_dashfile.sh:108: -F "link_rcpt=" \ ./hosts/up_dashfile.sh:109: -F "link_pass=" \ ./hosts/up_dashfile.sh:110: -F "to_folder=" \ ./hosts/up_dashfile.sh:111: -F "upload=Start upload" \ ./hosts/up_dashfile.sh:112: -F "keepalive=1" \ -- ./hosts/up_dataupload.sh:102: response=$(tor_curl_upload --insecure -i \ ./hosts/up_dataupload.sh:103: -H "Content-Type: multipart/form-data" \ ./hosts/up_dataupload.sh:104: -F "sess_id=" \ ./hosts/up_dataupload.sh:105: -F "file_descr=" \ ./hosts/up_dataupload.sh:106: -F "file_public=" \ ./hosts/up_dataupload.sh:107: -F "link_rcpt=" \ ./hosts/up_dataupload.sh:108: -F "link_pass=" \ ./hosts/up_dataupload.sh:109: -F "to_folder=" \ ./hosts/up_dataupload.sh:110: -F "keepalive=1" \ ./hosts/up_dataupload.sh:111: -F "file_0=@${filepath}" \ ./hosts/up_dataupload.sh:112: "${PostUrlHost}") -- ./hosts/up_dbree.sh:102: response=$(tor_curl_upload --insecure -i \ ./hosts/up_dbree.sh:103: -H "Content-Type: multipart/form-data" \ ./hosts/up_dbree.sh:104: -F "file[]=@${arrFiles[@]}" \ ./hosts/up_dbree.sh:105: -F "upload=Upload" \ ./hosts/up_dbree.sh:106: "${PostUrlHost}") ./hosts/up_dbree.sh:107: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/up_dbree.sh:108: debugHtml "${filepath##*/}" "${_hostCode}_upload" "post_url: ${PostUrlHost}"$'\n'"${response}" ./hosts/up_dbree.sh:109: fi ./hosts/up_dbree.sh:110: if grep -Eqi 'URL: Why we block tor' <<< "${response}" ; then ./hosts/up_fileditch.sh:115: if ((j >= 20)); then ./hosts/up_fileditch.sh:116: if [[ "${finalAttempt}" == "true" ]] ; then ./hosts/up_fileditch.sh:117: printf "\\n" -- ./hosts/up_filehaus.sh:106: response=$(tor_curl_upload --insecure -i \ ./hosts/up_filehaus.sh:107: -H "Content-Type: multipart/form-data" \ ./hosts/up_filehaus.sh:108: -F "file=@$filepath" \ ./hosts/up_filehaus.sh:109: -F "submit=Upload" \ ./hosts/up_filehaus.sh:110: "${PostUrlHost}") ./hosts/up_filehaus.sh:111: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/up_filehaus.sh:112: debugHtml "${filepath##*/}" "${_hostCode}_upload" "post_url: ${PostUrlHost}"$'\n'"${response}" ./hosts/up_filehaus.sh:113: fi ./hosts/up_filehaus.sh:114: if grep -Eqi 'HTTP/.* 200|https://cdn' <<< "${response}" ; then ./hosts/up_filehaus.sh:115: url=$(grep -oPi '(?<=https://).*(?=\.filehaus\.su).*?(?=$)' <<< "$response") ./hosts/up_filehaus.sh:116: filesize=$(GetFileSize "$filepath" "false") -- ./hosts/up_fileland.sh:102: response=$(tor_curl_upload --insecure -i \ ./hosts/up_fileland.sh:103: -H "Content-Type: multipart/form-data" \ ./hosts/up_fileland.sh:104: -F "sess_id=" \ ./hosts/up_fileland.sh:105: -F "utype=anon" \ ./hosts/up_fileland.sh:106: -F "file_descr=" \ ./hosts/up_fileland.sh:107: -F "file_public=1" \ ./hosts/up_fileland.sh:108: -F "link_rcpt=" \ ./hosts/up_fileland.sh:109: -F "link_pass=" \ ./hosts/up_fileland.sh:110: -F "to_folder=" \ ./hosts/up_fileland.sh:111: -F "upload=Start upload" \ ./hosts/up_fileland.sh:112: -F "keepalive=1" \ -- ./hosts/up_fireget.sh:102: response=$(tor_curl_upload --insecure -i \ ./hosts/up_fireget.sh:103: -H "Content-Type: multipart/form-data" \ ./hosts/up_fireget.sh:104: -H "Host: fireget.com" \ ./hosts/up_fireget.sh:105: -F "sess_id=" \ ./hosts/up_fireget.sh:106: -F "srv_tmp_url=" \ ./hosts/up_fireget.sh:107: -F "link_rcpt=" \ ./hosts/up_fireget.sh:108: -F "link_pass=" \ ./hosts/up_fireget.sh:109: -F "tos=1" \ ./hosts/up_fireget.sh:110: -F "submit_btn=Upload!" \ ./hosts/up_fireget.sh:111: -F "upload_type=file" \ ./hosts/up_fireget.sh:112: -F "file_1=@${filepath}" \ -- ./hosts/up_firestorage.sh:113: response=$(tor_curl_upload --insecure -i \ ./hosts/up_firestorage.sh:114: -H "Content-Type: multipart/form-data" \ ./hosts/up_firestorage.sh:115: -F "jqueryupload=1" \ ./hosts/up_firestorage.sh:116: -F "exp=0" \ ./hosts/up_firestorage.sh:117: -F "Filename=@$filepath" \ ./hosts/up_firestorage.sh:118: "${PostUrlHost}") ./hosts/up_firestorage.sh:119: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/up_firestorage.sh:120: debugHtml "${filepath##*/}" "${_hostCode}_upload" "post_url: ${PostUrlHost}"$'\n'"${response}" ./hosts/up_firestorage.sh:121: fi ./hosts/up_firestorage.sh:122: dec_response=$(urldecode "$response") ./hosts/up_firestorage.sh:123: if grep -Eqi '\.*$)' <<< "$response") -- ./hosts/up_yolobit.sh:102: response=$(tor_curl_upload --insecure -i \ ./hosts/up_yolobit.sh:103: -H "Content-Type: multipart/form-data" \ ./hosts/up_yolobit.sh:104: -F "file[]=@${arrFiles[@]}" \ ./hosts/up_yolobit.sh:105: -F "upload=Upload" \ ./hosts/up_yolobit.sh:106: "${PostUrlHost}") ./hosts/up_yolobit.sh:107: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./hosts/up_yolobit.sh:108: debugHtml "${filepath##*/}" "${_hostCode}(${index})_upload" "post_url: ${PostUrlHost}"$'\n'"${response}" ./hosts/up_yolobit.sh:109: fi ./hosts/up_yolobit.sh:110: if grep -Eqi 'URL: = MaxDownloadRetries)) ; then ./mad.sh:1549: echo -e "${RED}| FAILED: Size mismatch after downloading${NC}" ./mad.sh:1550: exit 1 -- ./mad.sh:1593: response=$(tor_curl_request --insecure -L -s https://github.com/lexiforest/curl-impersonate/releases/latest) ./mad.sh:1594: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./mad.sh:1595: debugHtml "github" "lbf_inst_curlimp$j" "$response" ./mad.sh:1596: fi ./mad.sh:1597: if [[ ! -z "$response" ]]; then ./mad.sh:1598: latestTag=$(grep -oPi -m 1 '(?<=/curl-impersonate/releases/tag/).*?(?=")' <<< "$response") ./mad.sh:1599: latestBinaryDate=$(grep -oPi -m 1 '(?<== MaxDownloadRetries)) ; then ./mad.sh:1672: echo -e "${RED}| FAILED: Size mismatch after downloading${NC}" ./mad.sh:1673: exit 1 -- ./mad.sh:1868: maud_torcurl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep -A 12 --color='always' -Ei 'tor_curl') ./mad.sh:1869: echo -e "Files:" ./mad.sh:1870: echo -e "${BLUE}${fil}${NC}" ./mad.sh:1871: echo -e "" ./mad.sh:1872: echo -e "" ./mad.sh:1873: echo -e "${PINK}MAD Audit of http lines:${NC} (${GREEN}grep \"http:\" or \"https:\"${NC})" ./mad.sh:1874: echo -e "_________________________________________________________________________" ./mad.sh:1875: echo -e "$maud_http" ./mad.sh:1876: echo -e "" ./mad.sh:1877: echo -e "${PINK}MAD Audit of curl:${NC} (${GREEN}grep \"curl\"${NC})" ./mad.sh:1878: echo -e "_________________________________________________________________________" -- ./mad.sh:1881: echo -e "${PINK}MAD Audit of tor_curl (+12 lines after):${NC} (${GREEN}grep \"tor_curl\"${NC})" ./mad.sh:1882: echo -e "_________________________________________________________________________" ./mad.sh:1883: echo -e "$maud_torcurl" ./mad.sh:1884: echo -e "" ./mad.sh:1885: echo -e "" ./mad.sh:1886: done ./mad.sh:1887: else ./mad.sh:1888: cd "$ScriptDir" ./mad.sh:1889: readarray -d $'' arrFiles < <(find . -name "*.sh" -printf '%p\n' | sort -Vk1) ./mad.sh:1890: cd "$WorkDir" ./mad.sh:1891: readarray -d $'' arrFiles2 < <(find . -name "*.sh" -printf '%p\n' | sort -Vk1) -- ./mad.sh:1896: maud_torcurl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep -A 12 --color='always' -Ei 'tor_curl') ./mad.sh:1897: echo -e "Files:" ./mad.sh:1898: echo -e "${BLUE}${fil}${NC}" ./mad.sh:1899: echo -e "" ./mad.sh:1900: echo -e "" ./mad.sh:1901: echo -e "${PINK}MAD Audit of http lines:${NC} (${GREEN}grep \"http:\" or \"https:\"${NC})" ./mad.sh:1902: echo -e "_________________________________________________________________________" ./mad.sh:1903: echo -e "$maud_http" ./mad.sh:1904: echo -e "" ./mad.sh:1905: echo -e "${PINK}MAD Audit of curl:${NC} (${GREEN}grep \"curl \"${NC})" ./mad.sh:1906: echo -e "_________________________________________________________________________" -- ./mad.sh:1909: echo -e "${PINK}MAD Audit of tor_curl (+12 lines after):${NC} (${GREEN}grep \"tor_curl\"${NC})" ./mad.sh:1910: echo -e "_________________________________________________________________________" ./mad.sh:1911: echo -e "$maud_torcurl" ./mad.sh:1912: echo -e "" ./mad.sh:1913: done ./mad.sh:1914: for fil in "${arrFiles2[@]}"; ./mad.sh:1915: do ./mad.sh:1916: maud_http=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep --color='always' -Ei '(http|https):') ./mad.sh:1917: maud_curl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep --color='always' -Ei 'curl') ./mad.sh:1918: maud_torcurl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep -A 12 --color='always' -Ei 'tor_curl') ./mad.sh:1919: echo -e "Files:" ./mad.sh:1920: echo -e "${BLUE}${fil}${NC}" ./mad.sh:1921: echo -e "" ./mad.sh:1922: echo -e "" ./mad.sh:1923: echo -e "${PINK}MAD Audit of http lines:${NC} (${GREEN}grep \"http:\" or \"https:\"${NC})" ./mad.sh:1924: echo -e "_________________________________________________________________________" ./mad.sh:1925: echo -e "$maud_http" ./mad.sh:1926: echo -e "" ./mad.sh:1927: echo -e "${PINK}MAD Audit of curl:${NC} (${GREEN}grep \"curl\"${NC})" ./mad.sh:1928: echo -e "_________________________________________________________________________" -- ./mad.sh:1931: echo -e "${PINK}MAD Audit of tor_curl (+12 lines after):${NC} (${GREEN}grep \"tor_curl\"${NC})" ./mad.sh:1932: echo -e "_________________________________________________________________________" ./mad.sh:1933: echo -e "$maud_torcurl" ./mad.sh:1934: echo -e "" ./mad.sh:1935: done ./mad.sh:1936: fi ./mad.sh:1937:} ./mad.sh:1938:madStatus() { ./mad.sh:1939: local InputFile="$1" ./mad.sh:1940: if [[ "$arg1" == "status" ]] ; then ./mad.sh:1941: clear -- ./mad.sh:3264: file_header=$(tor_curl_request --insecure -m 8 -s -D - -o /dev/null \ ./mad.sh:3265: -H "Connection: keep-alive" \ ./mad.sh:3266: -w 'EffectiveUrl=%{url_effective}' \ ./mad.sh:3267: "$download_url") ./mad.sh:3268: else ./mad.sh:3269: printf "| Retrieving Head: attempt #$j" ./mad.sh:3270: rm -f "${WorkDir}/.temp/directhead" ./mad.sh:3271: file_header=$(tor_curl_request --insecure --head -H "Connection: keep-alive" -L -s -i "$download_url" | ./mad.sh:3272: tee "${WorkDir}/.temp/directhead" & ./mad.sh:3273: sleep 6 ./mad.sh:3274: [ -s "${WorkDir}/.temp/directhead" ] ./mad.sh:3275: kill $! 2>/dev/null ./mad.sh:3276: ) ./mad.sh:3277: if [[ ! -f "${WorkDir}/.flocks/${remote_url//[^a-zA-Z0-9]/}" ]]; then ./mad.sh:3278: touch "${WorkDir}/.flocks/${remote_url//[^a-zA-Z0-9]/}" ./mad.sh:3279: fi ./mad.sh:3280: rm -f "${WorkDir}/.temp/directhead" ./mad.sh:3281: fi -- ./mad.sh:3408: tor_curl_request --insecure -L --referer "$file_url" "$download_url" --output "$file_path" ./mad.sh:3409: rc=$? ./mad.sh:3410: if ((rc != 0 )) ; then ./mad.sh:3411: printf "${RED}Download Failed (bad exit status).${NC}" ./mad.sh:3412: if [[ -f ${file_path} ]]; then ./mad.sh:3413: printf "${YELLOW} Partial removed...${NC}" ./mad.sh:3414: printf "\n\n" ./mad.sh:3415: rm -f "${file_path}" ./mad.sh:3416: else ./mad.sh:3417: printf "\n\n" ./mad.sh:3418: fi -- ./mad.sh:3465: tor_curl_request --insecure -L --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval "$download_url" --continue-at - --output "$file_path" ./mad.sh:3466: else ./mad.sh:3467: tor_curl_request --insecure -L --referer "$file_url" "$download_url" --continue-at - --output "$file_path" ./mad.sh:3468: fi ./mad.sh:3469: received_file_size=0 ./mad.sh:3470: if [[ -f "$file_path" ]] ; then ./mad.sh:3471: received_file_size=$(stat --format="%s" "$file_path" | tr -d '[:space:]') ./mad.sh:3472: fi ./mad.sh:3473: if CheckNoHtml "$remote_url" "$filename" "$file_path" "$((received_file_size - pd_presize))" ; then ./mad.sh:3474: containsHtml=false ./mad.sh:3475: else ./mad.sh:3476: containsHtml=true ./mad.sh:3477: fi -- ./mad.sh:3665: response=$(tor_curl_upload --insecure -i \ ./mad.sh:3666: -H "Content-Type: multipart/form-data" \ ./mad.sh:3667: -F "key=" \ ./mad.sh:3668: -F "time=$jira_timeval" \ ./mad.sh:3669: -F "file=@${filepath}" \ ./mad.sh:3670: "${jira_PostUrlHost}") ./mad.sh:3671: else ./mad.sh:3672: response=$(tor_curl_upload --insecure -i \ ./mad.sh:3673: -H "Content-Type: multipart/form-data" \ ./mad.sh:3674: -F "key=" \ ./mad.sh:3675: -F "time=$jira_timeval" \ ./mad.sh:3676: -F "files[]=@${arrFiles[@]}" \ ./mad.sh:3677: "${jira_PostUrlHost}") ./mad.sh:3678: fi ./mad.sh:3679: if [[ "${DebugAllEnabled}" == "true" ]] ; then ./mad.sh:3680: debugHtml "${filepath##*/}" "${_hostCode}_upload" "post_url: ${jira_PostUrlHost}"$'\n'"${response}" ./mad.sh:3681: fi ./mad.sh:3682: if grep -Eqi ' 200 ' <<< "${response}" ; then