# * Thanks Belky # 2024.12.26 - [anonfile / up_anonfile] Add anonfile.de as upload / download host # 2024.12.25 - [dashfile / up_dashfile] Add dashfile.net as upload / download host # 2024.12.25 - [isupload] Change to use tor_curl_request_extended (server response is often slow) # - Accept 200 OK response to continue (do not require filename / filesize) # 2024.12.25 - [fileblade] Add response handling for free file download dissallowed > 100MB. # "The file owner does not allow FREE users to download files which are over 100 MB" # 2024.12.25 - [mad] Add "UploadHiveRandomizeExt" option to config with default=true # 2024.12.25 - [uploadhive / up_uploadhive] Update renaming random ext files to their original names # - Handle multipart 7z & rar (abc.7z.###, abc.part#.rar) # 2024.12.25 - [syspro / up_syspro] Add share.syspro.com.br as upload / download host # 2024.12.24 - [mad] Add EnabledUploadHosts / EnabledDownloadHosts setting to fine-tune which hosts to use # ** Options: recommended, online, all (Default=recommended) # - recommended: loads all hosts verified working with MAD # - online: loads all hosts available online / working (includes captcha / js restricted) # - all: loads all hosts in hosts folder # 2024.12.24 - [up_ateasystems / ateasystems] Add share.ateasystems.com as upload / download host # 2024.12.23 - [up_uploadbay / uploadbay] Add uploadbay.net as upload / download host # 2024.12.23 - [up_herbolistique / herbolistique] Add transfert.herbolistique.com as upload / download host # 2024.12.23 - [uploadhive] Auto-rename random extension downloads # 2024.12.23 - [up_uploadhive] Change upload file extension to random 3 letters (uhive blocks .7z, .zip, .rar now) # 2024.12.23 - [up_offshorecat] Fixed upload. Updated apikey. # 2024.12.23 - [up_fileditch] Fixed upload. Added response handling for Tor Blocked node (retries) # 2024.12.23 - [up_freesocial / freesocial] Add files.freesocial.co as upload / download host # 2024.12.23 - [up_cyssoux / cyssoux] Add partage.cyssoux.fr as upload / download host # 2024.12.22 - [mad] Add jira_Upload function -- used for all jirafeau hosts # 2024.12.22 - [up_*AllJiraHosts*] Consolidated / moved all hosts upload functions to mad.sh # - Minimized jira host code (~6000 lines of duplicates removed) # - Jira hosts: acid, anarchaserver, depotkaz, dictvm, eddowding, familleflender, filesquid, # free4e, harrault, linxx, moocloud, nantes, netlib, skrepr, soyjak # 2024.12.20 - [fileblade / up_fileblade] Add fileblade.com as upload / download host # 2024.12.20 - [isupload / up_isupload] Add isupload.com as upload / download host # 2024.12.15 - [mediafire] Add mediafire download link processing # 2024.12.12 - [dictvm / up_dictvm] Add dictvm.org as upload / download host # 2024.12.12 - [eddowding / up_eddowding] Add eddowding.com as upload / download host # 2024.12.12 - [up_pixeldrain] Modify upload to use PUT # 2024.12.12 - [mad] Update pixeldrain api key # 2024.12.09 - [ranoz] Fix filenames with spaces # 2024.11.29 - [innocent] Update to use tor_curl_request_extended for head/get # 2024.11.29 - [quax] Update 404 Not found response handling
571 lines
45 KiB
Text
Executable file
571 lines
45 KiB
Text
Executable file
DateTime: 24.12.26
|
|
|
|
Files:
|
|
./hosts/1fichier.sh
|
|
./hosts/9saves.sh
|
|
./hosts/acid.sh
|
|
./hosts/anarchaserver.sh
|
|
./hosts/anonfile.sh
|
|
./hosts/anonsharing.sh
|
|
./hosts/archived/nekofile.sh
|
|
./hosts/ateasystems.sh
|
|
./hosts/bedrive.sh
|
|
./hosts/biteblob.sh
|
|
./hosts/bowfile.sh
|
|
./hosts/click.sh
|
|
./hosts/cyssoux.sh
|
|
./hosts/dailyuploads.sh
|
|
./hosts/dashfile.sh
|
|
./hosts/dataupload.sh
|
|
./hosts/dbree.sh
|
|
./hosts/depotkaz.sh
|
|
./hosts/dictvm.sh
|
|
./hosts/discreetshare.sh
|
|
./hosts/dosya.sh
|
|
./hosts/downloadgg.sh
|
|
./hosts/eddowding.sh
|
|
./hosts/eternalhosting.sh
|
|
./hosts/examples/ExampleNewHost.sh
|
|
./hosts/examples/up_example.sh
|
|
./hosts/familleflender.sh
|
|
./hosts/fileblade.sh
|
|
./hosts/fileditch.sh
|
|
./hosts/filedoge.sh
|
|
./hosts/filedot.sh
|
|
./hosts/filehaus.sh
|
|
./hosts/filesquid.sh
|
|
./hosts/firestorage.sh
|
|
./hosts/free4e.sh
|
|
./hosts/freesocial.sh
|
|
./hosts/gofile.sh
|
|
./hosts/harrault.sh
|
|
./hosts/herbolistique.sh
|
|
./hosts/hexload.sh
|
|
./hosts/innocent.sh
|
|
./hosts/isupload.sh
|
|
./hosts/kraken.sh
|
|
./hosts/lainsafe.sh
|
|
./hosts/lainsafe_onion.sh
|
|
./hosts/linxx.sh
|
|
./hosts/mediafire.sh
|
|
./hosts/moocloud.sh
|
|
./hosts/nantes.sh
|
|
./hosts/netlib.sh
|
|
./hosts/nippy.sh
|
|
./hosts/nofile.sh
|
|
./hosts/offshorecat.sh
|
|
./hosts/oshi.sh
|
|
./hosts/pixeldrain.sh
|
|
./hosts/quax.sh
|
|
./hosts/ranoz.sh
|
|
./hosts/shareonline.sh
|
|
./hosts/skrepr.sh
|
|
./hosts/soyjak.sh
|
|
./hosts/syspro.sh
|
|
./hosts/tempfileme.sh
|
|
./hosts/tempsh.sh
|
|
./hosts/torup.sh
|
|
./hosts/turboonion.sh
|
|
./hosts/up2share.sh
|
|
./hosts/uploadbay.sh
|
|
./hosts/uploadee.sh
|
|
./hosts/uploadev.sh
|
|
./hosts/uploadflix.sh
|
|
./hosts/uploadhive.sh
|
|
./hosts/up_1fichier.sh
|
|
./hosts/up_acid.sh
|
|
./hosts/up_anarchaserver.sh
|
|
./hosts/up_anonfile.sh
|
|
./hosts/up_anonsharing.sh
|
|
./hosts/up_ateasystems.sh
|
|
./hosts/up_axfc.sh
|
|
./hosts/up_bedrive.sh
|
|
./hosts/up_bowfile.sh
|
|
./hosts/up_cyssoux.sh
|
|
./hosts/up_dailyuploads.sh
|
|
./hosts/up_dashfile.sh
|
|
./hosts/up_dataupload.sh
|
|
./hosts/up_dbree.sh
|
|
./hosts/up_depotkaz.sh
|
|
./hosts/up_dictvm.sh
|
|
./hosts/up_dosya.sh
|
|
./hosts/up_eddowding.sh
|
|
./hosts/up_familleflender.sh
|
|
./hosts/up_fileblade.sh
|
|
./hosts/up_fileditch.sh
|
|
./hosts/up_filehaus.sh
|
|
./hosts/up_filesquid.sh
|
|
./hosts/up_firestorage.sh
|
|
./hosts/up_free4e.sh
|
|
./hosts/up_freesocial.sh
|
|
./hosts/up_gofile.sh
|
|
./hosts/up_harrault.sh
|
|
./hosts/up_herbolistique.sh
|
|
./hosts/up_hexload.sh
|
|
./hosts/up_innocent.sh
|
|
./hosts/up_isupload.sh
|
|
./hosts/up_kouploader.sh
|
|
./hosts/up_kraken.sh
|
|
./hosts/up_linxx.sh
|
|
./hosts/up_moocloud.sh
|
|
./hosts/up_nantes.sh
|
|
./hosts/up_netlib.sh
|
|
./hosts/up_nippy.sh
|
|
./hosts/up_nofile.sh
|
|
./hosts/up_offshorecat.sh
|
|
./hosts/up_oshi.sh
|
|
./hosts/up_pixeldrain.sh
|
|
./hosts/up_quax.sh
|
|
./hosts/up_ranoz.sh
|
|
./hosts/up_shareonline.sh
|
|
./hosts/up_skrepr.sh
|
|
./hosts/up_soyjak.sh
|
|
./hosts/up_syspro.sh
|
|
./hosts/up_tempfileme.sh
|
|
./hosts/up_tempsh.sh
|
|
./hosts/up_torup.sh
|
|
./hosts/up_turboonion.sh
|
|
./hosts/up_uploadbay.sh
|
|
./hosts/up_uploadee.sh
|
|
./hosts/up_uploadev.sh
|
|
./hosts/up_uploadflix.sh
|
|
./hosts/up_uploadhive.sh
|
|
./hosts/up_uploadraja.sh
|
|
./hosts/up_yolobit.sh
|
|
./hosts/yolobit.sh
|
|
./hosts/youdbox.sh
|
|
./mad.sh
|
|
./plugins/AutoResetAndRetryDownloads.sh
|
|
./plugins/CatnapCtrlC.sh
|
|
./plugins/SkipUrlsInDownloadsCompletedTxt.sh
|
|
./plugins/examples/ExampleAddNewFuncAndCallOnSuccessfulDownload.sh
|
|
./plugins/examples/ExamplesMainHooks.sh
|
|
./plugins/ocr_captcha.sh
|
|
./plugins/pjscloud.sh
|
|
|
|
|
|
MAD Audit of curl: (grep "curl")
|
|
_________________________________________________________________________
|
|
./hosts/1fichier.sh:48: PAGE=$(tor_curl_request --insecure --max-time "$ConnectTimeout" -s "${remote_url}")
|
|
./hosts/1fichier.sh:160: cdn_request=$(tor_curl_request --insecure -s -L -b "${fich_cookie_jar}" -c "${fich_cookie_jar}" -F "submit=Download" -F "pass=${fich_user_provided_password}" -F "adz=${fich_adz_parameter}" "${remote_url}")
|
|
./hosts/1fichier.sh:194: file_header=$(tor_curl_request --insecure -sSIL -e "${remote_url}" "${target_file_link}")
|
|
./hosts/1fichier.sh:261: tor_curl_request --insecure -e "${remote_url}" "${target_file_link}" -C - -o "${file_path}"
|
|
./hosts/1fichier.sh:354: PAGE=$(tor_curl_request --insecure --max-time "$ConnectTimeout" -c "${fich_cookie_jar}" -s "${remote_url}")
|
|
./hosts/9saves.sh:90: response=$(tor_curl_request --insecure -L -s -b "${ns_cookie_jar}" -c "${ns_cookie_jar}" "$remote_url")
|
|
./hosts/9saves.sh:139: response=$(tor_curl_request --insecure -L -s -X POST \
|
|
./hosts/9saves.sh:188: file_header=$(tor_curl_request --insecure --head -L -s -b "${ns_cookie_jar}" -c "${ns_cookie_jar}" "$download_url")
|
|
./hosts/9saves.sh:290: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
|
./hosts/9saves.sh:292: tor_curl_request --insecure \
|
|
./hosts/9saves.sh:297: tor_curl_request --insecure \
|
|
./hosts/9saves.sh:304: tor_curl_request --insecure \
|
|
./hosts/9saves.sh:321: tor_curl_request --insecure \
|
|
./hosts/anonfile.sh:96: response=$(tor_curl_request --insecure -L -s -b "${anon_cookie_jar}" -c "${anon_cookie_jar}" \
|
|
./hosts/anonfile.sh:186: response=$(tor_curl_request --insecure -L -s -X POST \
|
|
./hosts/anonfile.sh:240: tor_curl_request --insecure -s "$captcha_img_url" --output "$tmp_captcha_img"
|
|
./hosts/anonfile.sh:340: response=$(tor_curl_request --insecure -L -s -X POST \
|
|
./hosts/anonfile.sh:446: file_header=$(tor_curl_request -i -s --head \
|
|
./hosts/anonfile.sh:549: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
|
./hosts/anonfile.sh:551: tor_curl_request --insecure \
|
|
./hosts/anonfile.sh:557: tor_curl_request --insecure \
|
|
./hosts/anonfile.sh:564: tor_curl_request --insecure \
|
|
./hosts/anonfile.sh:581: tor_curl_request --insecure \
|
|
./hosts/anonsharing.sh:91: response=$(tor_curl_request --insecure -i -s \
|
|
./hosts/anonsharing.sh:150: file_header=$(tor_curl_request --insecure --head -L -i -s \
|
|
./hosts/anonsharing.sh:158: file_header=$(tor_curl_request --insecure --head -H "Connection: keep-alive" -s -i \
|
|
./hosts/anonsharing.sh:273: tor_curl_request --insecure --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval "$download_url" --output "$file_path"
|
|
./hosts/anonsharing.sh:275: tor_curl_request --insecure "$download_url" --output "$file_path"
|
|
./hosts/ateasystems.sh:88: response=$(tor_curl_request --insecure -L -s "$remote_url")
|
|
./hosts/ateasystems.sh:218: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
|
./hosts/ateasystems.sh:220: tor_curl_request --insecure \
|
|
./hosts/ateasystems.sh:225: tor_curl_request --insecure \
|
|
./hosts/ateasystems.sh:231: tor_curl_request --insecure \
|
|
./hosts/ateasystems.sh:237: tor_curl_request --insecure \
|
|
./hosts/bedrive.sh:90: response=$(tor_curl_request --insecure -L -s \
|
|
./hosts/bedrive.sh:149: file_header=$(tor_curl_request --insecure --head -L -i -s \
|
|
./hosts/bedrive.sh:270: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
|
./hosts/bedrive.sh:272: tor_curl_request --insecure -L -G --no-alpn \
|
|
./hosts/bedrive.sh:277: tor_curl_request --insecure -L -G --no-alpn \
|
|
./hosts/bedrive.sh:284: tor_curl_request --insecure -L -G --no-alpn \
|
|
./hosts/bedrive.sh:300: tor_curl_request --insecure -L -G --no-alpn \
|
|
./hosts/biteblob.sh:96: response=$(tor_curl_request --insecure -L -s "${fixed_url}")
|
|
./hosts/biteblob.sh:144: file_header=$(tor_curl_request --insecure --head -L -s "$download_url")
|
|
./hosts/biteblob.sh:227: tor_curl_request --insecure --referer "$file_url" "$download_url" --output "$file_path"
|
|
./hosts/biteblob.sh:271: tor_curl_request --insecure --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval "$download_url" --continue-at - --output "$file_path"
|
|
./hosts/biteblob.sh:273: tor_curl_request --insecure --referer "$file_url" "$download_url" --continue-at - --output "$file_path"
|
|
./hosts/bowfile.sh:91: response=$(tor_curl_request --insecure -L -s -b "${bow_cookie_jar}" -c "${bow_cookie_jar}" \
|
|
./hosts/bowfile.sh:143: response=$(tor_curl_request --insecure -s --head \
|
|
./hosts/bowfile.sh:182: file_header=$(tor_curl_request --insecure -L -sS -i --head \
|
|
./hosts/bowfile.sh:297: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
|
./hosts/bowfile.sh:299: tor_curl_request --insecure -L \
|
|
./hosts/bowfile.sh:305: tor_curl_request --insecure -L \
|
|
./hosts/bowfile.sh:312: tor_curl_request --insecure -L \
|
|
./hosts/bowfile.sh:329: tor_curl_request --insecure -L \
|
|
./hosts/click.sh:143: response=$(tor_curl_request --insecure -L -s -b "${click_cookie_jar}" -c "${click_cookie_jar}" \
|
|
./hosts/click.sh:226: response=$(tor_curl_request --insecure -L -s -X POST \
|
|
./hosts/click.sh:345: response=$(tor_curl_request --insecure -L -s -X POST \
|
|
./hosts/click.sh:434: file_header=$(tor_curl_request --insecure -L --head -s --referer "${fixed_url}" "$download_url")
|
|
./hosts/click.sh:533: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
|
./hosts/click.sh:535: tor_curl_request --insecure \
|
|
./hosts/click.sh:542: tor_curl_request --insecure \
|
|
./hosts/click.sh:550: tor_curl_request --insecure \
|
|
./hosts/click.sh:568: tor_curl_request --insecure \
|
|
./hosts/dailyuploads.sh:97: response=$(tor_curl_request --insecure -L -s -b "${daily_cookie_jar}" -c "${daily_cookie_jar}" \
|
|
./hosts/dailyuploads.sh:139: tor_curl_request --insecure -s "$captcha_img_url" --output "$tmp_captcha_img"
|
|
./hosts/dailyuploads.sh:286: response=$(tor_curl_request --insecure -L -s -X POST \
|
|
./hosts/dailyuploads.sh:392: file_header=$(tor_curl_request -i -s --head \
|
|
./hosts/dailyuploads.sh:496: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
|
./hosts/dailyuploads.sh:498: tor_curl_request --insecure \
|
|
./hosts/dailyuploads.sh:504: tor_curl_request --insecure \
|
|
./hosts/dailyuploads.sh:511: tor_curl_request --insecure \
|
|
./hosts/dailyuploads.sh:528: tor_curl_request --insecure \
|
|
./hosts/dashfile.sh:90: response=$(tor_curl_request --insecure -L -s -b "${dash_cookie_jar}" -c "${dash_cookie_jar}" \
|
|
./hosts/dashfile.sh:169: response=$(tor_curl_request --insecure -L -s -X POST \
|
|
./hosts/dashfile.sh:297: response=$(tor_curl_request --insecure -L -s -X POST \
|
|
./hosts/dashfile.sh:386: file_header=$(tor_curl_request --insecure -L --head -s --referer "${fixed_url}" "$download_url")
|
|
./hosts/dashfile.sh:484: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
|
./hosts/dashfile.sh:486: tor_curl_request --insecure \
|
|
./hosts/dashfile.sh:491: tor_curl_request --insecure \
|
|
./hosts/dashfile.sh:497: tor_curl_request --insecure \
|
|
./hosts/dashfile.sh:513: tor_curl_request --insecure \
|
|
./hosts/dataupload.sh:90: response=$(tor_curl_request --insecure -L -s -b "${dup_cookie_jar}" -c "${dup_cookie_jar}" "$remote_url")
|
|
./hosts/dataupload.sh:166: response=$(tor_curl_request --insecure -svo. -X POST \
|
|
./hosts/dataupload.sh:234: file_header=$(tor_curl_request --insecure -L --head -s "$download_url")
|
|
./hosts/dataupload.sh:349: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
|
./hosts/dataupload.sh:351: tor_curl_request --insecure \
|
|
./hosts/dataupload.sh:357: tor_curl_request --insecure \
|
|
./hosts/dataupload.sh:364: tor_curl_request --insecure \
|
|
./hosts/dataupload.sh:381: tor_curl_request --insecure \
|
|
./hosts/dosya.sh:108: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
|
./hosts/dosya.sh:109: PAGE=$(tor_curl_request --insecure --max-time "$ConnectTimeout" -L -s \
|
|
./hosts/dosya.sh:113: PAGE=$(tor_curl_request --insecure --max-time "$ConnectTimeout" -L -s \
|
|
./hosts/dosya.sh:172: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
|
./hosts/dosya.sh:173: file_header=$(tor_curl_request_extended --insecure --head -L -s \
|
|
./hosts/dosya.sh:179: file_header=$(tor_curl_request_extended --insecure --head -L -s \
|
|
./hosts/dosya.sh:402: tor_curl_request -L -G --insecure \
|
|
./hosts/dosya.sh:417: tor_curl_request -L -G --insecure \
|
|
./hosts/downloadgg.sh:90: response=$(tor_curl_request --insecure -L -s -b "${dgg_cookie_jar}" -c "${dgg_cookie_jar}" "$remote_url")
|
|
./hosts/downloadgg.sh:169: response=$(tor_curl_request --insecure -svo. -X POST \
|
|
./hosts/downloadgg.sh:255: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
|
./hosts/downloadgg.sh:257: tor_curl_request --insecure -X POST \
|
|
./hosts/downloadgg.sh:265: tor_curl_request --insecure -X POST \
|
|
./hosts/downloadgg.sh:275: tor_curl_request --insecure -X POST \
|
|
./hosts/downloadgg.sh:294: tor_curl_request --insecure -X POST \
|
|
./hosts/examples/ExampleNewHost.sh:102: file_header=$(tor_curl_request --insecure -L --head -s --referer "${remote_url//\.org/\.cc}" "$download_url")
|
|
./hosts/examples/ExampleNewHost.sh:199: tor_curl_request --insecure --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval --referer "$download_url" "$download_url" --continue-at - --output "$file_path"
|
|
./hosts/examples/ExampleNewHost.sh:201: tor_curl_request --insecure --referer "$download_url" "$download_url" --continue-at - --output "$file_path"
|
|
./hosts/examples/up_example.sh:112: response=$(tor_curl_upload --insecure \
|
|
./hosts/fileblade.sh:90: response=$(tor_curl_request --insecure -L -s -b "${fb_cookie_jar}" -c "${fb_cookie_jar}" "$remote_url")
|
|
./hosts/fileblade.sh:167: response=$(tor_curl_request --insecure -L -s -X POST \
|
|
./hosts/fileblade.sh:254: response=$(tor_curl_request --insecure -L -s -X POST \
|
|
./hosts/fileblade.sh:323: file_header=$(tor_curl_request --insecure -L --head -s "$download_url")
|
|
./hosts/fileblade.sh:438: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
|
./hosts/fileblade.sh:440: tor_curl_request --insecure -L \
|
|
./hosts/fileblade.sh:444: tor_curl_request --insecure -L \
|
|
./hosts/fileblade.sh:449: tor_curl_request --insecure \
|
|
./hosts/fileblade.sh:464: tor_curl_request --insecure \
|
|
./hosts/fileditch.sh:85: file_header=$(tor_curl_request --insecure --head -L -s "$download_url")
|
|
./hosts/fileditch.sh:176: tor_curl_request --insecure --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval "$download_url" --continue-at - --output "$file_path"
|
|
./hosts/fileditch.sh:178: tor_curl_request --insecure "$download_url" --continue-at - --output "$file_path"
|
|
./hosts/filedot.sh:112: PAGE=$(tor_curl_request --insecure --max-time "$ConnectTimeout" -L -s \
|
|
./hosts/filedot.sh:153: resp_login=$(tor_curl_request --insecure -L -s \
|
|
./hosts/filedot.sh:240: response=$(tor_curl_request --insecure -L -s \
|
|
./hosts/filedot.sh:320: response=$(tor_curl_request --insecure -L -s \
|
|
./hosts/filedot.sh:406: file_header=$(tor_curl_request --insecure -L --head -s --referer "${fixed_url}" "$download_url")
|
|
./hosts/filedot.sh:499: tor_curl_request --insecure -L -G --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval "$download_url" --continue-at - --output "$file_path"
|
|
./hosts/filedot.sh:501: tor_curl_request --insecure -L -G "$download_url" --continue-at - --output "$file_path"
|
|
./hosts/filehaus.sh:100: file_header=$(tor_curl_request_extended --insecure -L --head -s --referer "${remote_url//\.org/\.cc}" "$download_url")
|
|
./hosts/filehaus.sh:193: tor_curl_request_extended --insecure --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval --referer "$download_url" "$download_url" --continue-at - --output "$file_path"
|
|
./hosts/filehaus.sh:195: tor_curl_request_extended --insecure --referer "$download_url" "$download_url" --continue-at - --output "$file_path"
|
|
./hosts/firestorage.sh:98: response=$(tor_curl_request --insecure -L -s "${fixed_url}")
|
|
./hosts/firestorage.sh:226: file_header=$(tor_curl_request --insecure -L --head -s --referer "${fixed_url}" "$download_url")
|
|
./hosts/firestorage.sh:335: tor_curl_request --insecure -L -G --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval "$download_url" --continue-at - --output "$file_path"
|
|
./hosts/firestorage.sh:337: tor_curl_request --insecure -L -G "$download_url" --continue-at - --output "$file_path"
|
|
./hosts/gofile.sh:97: response=$(tor_curl_request --insecure -s -X POST \
|
|
./hosts/gofile.sh:170: response=$(tor_curl_request --insecure -G -L -s \
|
|
./hosts/gofile.sh:250: file_header=$(tor_curl_request --insecure -L --head -s \
|
|
./hosts/gofile.sh:369: tor_curl_request --insecure -G --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \
|
|
./hosts/gofile.sh:383: tor_curl_request --insecure -G \
|
|
./hosts/hexload.sh:108: response=$(tor_curl_request --insecure -s --data "$form_data" "https://hexload.com/download")
|
|
./hosts/hexload.sh:116: response=$(tor_curl_request --insecure -s --data "$form_data" "https://hexload.com/download")
|
|
./hosts/hexload.sh:122: response=$(tor_curl_request --insecure -s --data "$form_data" "https://hexload.com/download")
|
|
./hosts/hexload.sh:254: file_header=$(tor_curl_request --insecure --head -L -s --referer "$file_url" "$download_url")
|
|
./hosts/hexload.sh:321: tor_curl_request --insecure --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval --referer "$file_url" "$download_url" --continue-at - --output "$file_path"
|
|
./hosts/hexload.sh:323: tor_curl_request --insecure --referer "$file_url" "$download_url" --continue-at - --output "$file_path"
|
|
./hosts/innocent.sh:97: file_header=$(tor_curl_request_extended --insecure --head -L -s "$download_url")
|
|
./hosts/innocent.sh:100: file_header=$(tor_curl_request --insecure -m 16 -s -D - -o /dev/null \
|
|
./hosts/innocent.sh:107: file_header=$(tor_curl_request --insecure --head -H "Connection: keep-alive" -L -s -i "$download_url" |
|
|
./hosts/innocent.sh:119: file_header=$(tor_curl_request --insecure --head -L -s "$download_url")
|
|
./hosts/innocent.sh:211: tor_curl_request_extended --insecure "$download_url" --continue-at - --output "$file_path"
|
|
./hosts/innocent.sh:214: tor_curl_request_extended --insecure "$download_url" --output "$file_path"
|
|
./hosts/isupload.sh:90: response=$(tor_curl_request_extended --insecure -L -s -b "${isup_cookie_jar}" -c "${isup_cookie_jar}" "$remote_url")
|
|
./hosts/isupload.sh:164: response=$(tor_curl_request_extended --insecure -L -s -X POST \
|
|
./hosts/isupload.sh:238: file_header=$(tor_curl_request --insecure --head -L -s "$download_url")
|
|
./hosts/isupload.sh:241: file_header=$(tor_curl_request --insecure -m 16 -s -D - -o /dev/null \
|
|
./hosts/isupload.sh:248: file_header=$(tor_curl_request --insecure --head -H "Connection: keep-alive" -L -s -i "$download_url" |
|
|
./hosts/isupload.sh:260: file_header=$(tor_curl_request_extended --insecure --head -L -s "$download_url")
|
|
./hosts/isupload.sh:352: tor_curl_request_extended --insecure -L "$download_url" --output "$file_path"
|
|
./hosts/isupload.sh:396: tor_curl_request_extended --insecure -L --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval "$download_url" --continue-at - --output "$file_path"
|
|
./hosts/isupload.sh:398: tor_curl_request_extended --insecure -L "$download_url" --continue-at - --output "$file_path"
|
|
./hosts/kraken.sh:104: PAGE=$(tor_curl_request --insecure --max-time "$ConnectTimeout" -s -L -c "${kraken_cookie_jar}" "${fixed_url}")
|
|
./hosts/kraken.sh:169: down_request=$(tor_curl_request --insecure -L -s -b "${kraken_cookie_jar}" -c "${kraken_cookie_jar}" -F "token=${kraken_token}" "${kraken_action}")
|
|
./hosts/kraken.sh:186: file_header=$(tor_curl_request --insecure --head -L -s -b "${kraken_cookie_jar}" -c "${kraken_cookie_jar}" --referer "$kraken_action" "$download_url")
|
|
./hosts/kraken.sh:286: tor_curl_request --insecure --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval --referer "$kraken_action" "$download_url" --continue-at - --output "$file_path"
|
|
./hosts/kraken.sh:288: tor_curl_request --insecure --referer "$kraken_action" "$download_url" --continue-at - --output "$file_path"
|
|
./hosts/mediafire.sh:94: response=$(tor_curl_request --insecure -L -s \
|
|
./hosts/mediafire.sh:157: file_header=$(tor_curl_request --insecure -L --head -s \
|
|
./hosts/mediafire.sh:276: tor_curl_request_extended --insecure "$download_url" --continue-at - --output "$file_path"
|
|
./hosts/mediafire.sh:279: tor_curl_request_extended --insecure "$download_url" --output "$file_path"
|
|
./hosts/nippy.sh:119: response=$(tor_curl_request --insecure -L -s -b "${nippy_cookie_jar}" -c "${nippy_cookie_jar}" "$fixed_url")
|
|
./hosts/nippy.sh:188: file_header=$(tor_curl_request --insecure -L --head -s \
|
|
./hosts/nippy.sh:299: tor_curl_request --insecure -L --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \
|
|
./hosts/nippy.sh:302: tor_curl_request --insecure -L "$download_url" --continue-at - --output "$file_path"
|
|
./hosts/oshi.sh:101: file_header=$(tor_curl_request --insecure --head -L -s --referer "$remote_url" "$download_url")
|
|
./hosts/oshi.sh:195: tor_curl_request --insecure --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval --referer "$file_url" "$download_url" --continue-at - --output "$file_path"
|
|
./hosts/oshi.sh:197: tor_curl_request --insecure --referer "$file_url" "$download_url" --continue-at - --output "$file_path"
|
|
./hosts/pixeldrain.sh:94: response=$(tor_curl_request --insecure -L -s "https://pixeldrain.com/u/$fileid")
|
|
./hosts/pixeldrain.sh:256: file_header=$(tor_curl_request --insecure --head -L -s --referer "$file_url" "$pdheadurl")
|
|
./hosts/pixeldrain.sh:322: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
|
./hosts/pixeldrain.sh:324: tor_curl_request --insecure \
|
|
./hosts/pixeldrain.sh:328: tor_curl_request --insecure \
|
|
./hosts/pixeldrain.sh:333: tor_curl_request --insecure \
|
|
./hosts/pixeldrain.sh:342: tor_curl_request --insecure \
|
|
./hosts/quax.sh:85: file_header=$(tor_curl_request --insecure --head -L -s "$download_url")
|
|
./hosts/quax.sh:176: tor_curl_request --insecure --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval "$download_url" --continue-at - --output "$file_path"
|
|
./hosts/quax.sh:178: tor_curl_request --insecure "$download_url" --continue-at - --output "$file_path"
|
|
./hosts/ranoz.sh:90: response=$(tor_curl_request --insecure -L -s "$remote_url")
|
|
./hosts/ranoz.sh:150: file_header=$(tor_curl_request --insecure --head -L -i -s "$download_url")
|
|
./hosts/ranoz.sh:259: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
|
./hosts/ranoz.sh:261: tor_curl_request --insecure -L -G --no-alpn \
|
|
./hosts/ranoz.sh:265: tor_curl_request --insecure -L -G --no-alpn \
|
|
./hosts/ranoz.sh:270: tor_curl_request --insecure -L -G --no-alpn \
|
|
./hosts/ranoz.sh:285: tor_curl_request --insecure -L -G --no-alpn \
|
|
./hosts/syspro.sh:88: response=$(tor_curl_request --insecure -L -s "$remote_url")
|
|
./hosts/syspro.sh:186: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
|
./hosts/syspro.sh:188: tor_curl_request --insecure -L \
|
|
./hosts/syspro.sh:193: tor_curl_request --insecure \
|
|
./hosts/syspro.sh:199: tor_curl_request --insecure -L \
|
|
./hosts/syspro.sh:205: tor_curl_request --insecure -L \
|
|
./hosts/tempfileme.sh:89: response=$(tor_curl_request --insecure -L -s "$remote_url")
|
|
./hosts/tempfileme.sh:170: file_header=$(tor_curl_request --insecure -L --head -s --referer "${remote_url}" "$download_url")
|
|
./hosts/tempfileme.sh:298: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
|
./hosts/tempfileme.sh:300: tor_curl_request --insecure -L \
|
|
./hosts/tempfileme.sh:305: tor_curl_request --insecure -L \
|
|
./hosts/tempfileme.sh:311: tor_curl_request --insecure -L \
|
|
./hosts/tempfileme.sh:326: tor_curl_request --insecure -L \
|
|
./hosts/tempsh.sh:88: file_header=$(tor_curl_request --insecure -s -D - -o /dev/null -X POST \
|
|
./hosts/tempsh.sh:225: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
|
./hosts/tempsh.sh:227: tor_curl_request --insecure -X POST \
|
|
./hosts/tempsh.sh:231: tor_curl_request --insecure -X POST \
|
|
./hosts/tempsh.sh:236: tor_curl_request --insecure -X POST \
|
|
./hosts/tempsh.sh:250: tor_curl_request --insecure -X POST \
|
|
./hosts/torup.sh:92: response=$(tor_curl_request --insecure -L -s \
|
|
./hosts/torup.sh:188: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
|
./hosts/torup.sh:190: tor_curl_request --insecure -L -G --no-alpn \
|
|
./hosts/torup.sh:196: tor_curl_request --insecure -L -G --no-alpn \
|
|
./hosts/torup.sh:203: tor_curl_request --insecure -L -G --no-alpn \
|
|
./hosts/torup.sh:219: tor_curl_request --insecure -L -G --no-alpn \
|
|
./hosts/up2share.sh:91: response=$(tor_curl_request --insecure -L -s -b "${up2share_cookie_jar}" -c "${up2share_cookie_jar}" \
|
|
./hosts/up2share.sh:144: response=$(tor_curl_request --insecure -L -s -b "${up2share_cookie_jar}" -c "${up2share_cookie_jar}" \
|
|
./hosts/up2share.sh:195: file_header=$(tor_curl_request --insecure -L -s --head \
|
|
./hosts/up2share.sh:312: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
|
./hosts/up2share.sh:314: tor_curl_request --insecure -L \
|
|
./hosts/up2share.sh:321: tor_curl_request --insecure -L \
|
|
./hosts/up2share.sh:329: tor_curl_request --insecure -L \
|
|
./hosts/up2share.sh:347: tor_curl_request --insecure -L \
|
|
./hosts/uploadee.sh:90: response=$(tor_curl_request --insecure -L -s "$remote_url")
|
|
./hosts/uploadee.sh:143: file_header=$(tor_curl_request --insecure --head -L -s -b "${upee_cookie_jar}" -c "${upee_cookie_jar}" --referer "$remote_url" "$download_url")
|
|
./hosts/uploadee.sh:249: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
|
./hosts/uploadee.sh:251: tor_curl_request --insecure -L -G --no-alpn \
|
|
./hosts/uploadee.sh:257: tor_curl_request --insecure -L -G --no-alpn \
|
|
./hosts/uploadee.sh:265: tor_curl_request --insecure -L -G --no-alpn \
|
|
./hosts/uploadee.sh:282: tor_curl_request --insecure -L -G --no-alpn \
|
|
./hosts/uploadev.sh:91: response=$(tor_curl_request --insecure -L -s -b "${upev_cookie_jar}" -c "${upev_cookie_jar}" \
|
|
./hosts/uploadev.sh:181: response=$(tor_curl_request --insecure -L -s -X POST \
|
|
./hosts/uploadev.sh:268: file_header=$(tor_curl_request --insecure -L --head -s "$download_url")
|
|
./hosts/uploadev.sh:367: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
|
./hosts/uploadev.sh:369: tor_curl_request --insecure -L \
|
|
./hosts/uploadev.sh:374: tor_curl_request --insecure -L \
|
|
./hosts/uploadev.sh:380: tor_curl_request --insecure -L \
|
|
./hosts/uploadev.sh:396: tor_curl_request --insecure -L \
|
|
./hosts/uploadflix.sh:97: response=$(tor_curl_request --insecure -L -s "${fixed_url}")
|
|
./hosts/uploadflix.sh:150: response=$(tor_curl_request --insecure -L -s -X POST --data "$form_data" "${fixed_url}")
|
|
./hosts/uploadflix.sh:192: file_header=$(tor_curl_request --insecure -L --head -s --referer "${fixed_url}" "${download_url}")
|
|
./hosts/uploadflix.sh:286: tor_curl_request --insecure -L -G --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval "$download_url" --continue-at - --output "$file_path"
|
|
./hosts/uploadflix.sh:288: tor_curl_request --insecure -L -G "$download_url" --continue-at - --output "$file_path"
|
|
./hosts/uploadhive.sh:88: response=$(tor_curl_request --insecure -L -s "$remote_url")
|
|
./hosts/uploadhive.sh:134: response=$(tor_curl_request --insecure -L -s -X POST --data "$form_data" "$remote_url")
|
|
./hosts/uploadhive.sh:185: file_header=$(tor_curl_request --insecure --head -s -L --referer "$remote_url" "$download_url")
|
|
./hosts/uploadhive.sh:279: tor_curl_request --insecure -L -G --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval "$download_url" --continue-at - --output "$file_path"
|
|
./hosts/uploadhive.sh:281: tor_curl_request --insecure -L -G "$download_url" --continue-at - --output "$file_path"
|
|
./hosts/up_1fichier.sh:107: response=$(tor_curl_request --insecure -L -s "https://1fichier.com/")
|
|
./hosts/up_1fichier.sh:180: response=$(tor_curl_upload --insecure -L \
|
|
./hosts/up_anonfile.sh:102: response=$(tor_curl_upload --insecure -i \
|
|
./hosts/up_anonsharing.sh:102: response=$(tor_curl_upload --insecure -i \
|
|
./hosts/up_ateasystems.sh:102: response=$(tor_curl_upload --insecure -i \
|
|
./hosts/up_axfc.sh:109: response=$(tor_curl_request --insecure -L -s -b "${axfc_cookie_jar}" -c "${axfc_cookie_jar}" "$fixed_url")
|
|
./hosts/up_axfc.sh:136: response=$(tor_curl_upload --insecure -L -s -X POST \
|
|
./hosts/up_axfc.sh:184: response=$(tor_curl_upload --insecure -L -i -X POST \
|
|
./hosts/up_bedrive.sh:102: response=$(tor_curl_upload --insecure -i \
|
|
./hosts/up_bowfile.sh:108: response=$(tor_curl_request --insecure -L -i \
|
|
./hosts/up_dailyuploads.sh:109: response=$(tor_curl_upload --insecure -i \
|
|
./hosts/up_dashfile.sh:102: response=$(tor_curl_upload --insecure -i \
|
|
./hosts/up_dataupload.sh:102: response=$(tor_curl_upload --insecure -i \
|
|
./hosts/up_dbree.sh:102: response=$(tor_curl_upload --insecure -i \
|
|
./hosts/up_dosya.sh:107: response=$(tor_curl_upload --insecure -L -i \
|
|
./hosts/up_fileblade.sh:104: response=$(tor_curl_upload --insecure -i \
|
|
./hosts/up_fileditch.sh:107: response=$(tor_curl_upload --insecure -i -L \
|
|
./hosts/up_filehaus.sh:106: response=$(tor_curl_upload --insecure -i \
|
|
./hosts/up_firestorage.sh:113: response=$(tor_curl_upload --insecure -i \
|
|
./hosts/up_gofile.sh:102: response=$(tor_curl_request --insecure -L -s "https://api.gofile.io/servers")
|
|
./hosts/up_gofile.sh:121: response=$(tor_curl_upload --insecure -i \
|
|
./hosts/up_hexload.sh:109: response=$(tor_curl_upload --insecure -i \
|
|
./hosts/up_innocent.sh:99: response=$(tor_curl_upload --insecure -D - -o /dev/null \
|
|
./hosts/up_isupload.sh:104: response=$(tor_curl_upload --insecure -i \
|
|
./hosts/up_kouploader.sh:108: response=$(tor_curl_request --insecure -L -s -b "${ko_cookie_jar}" -c "${ko_cookie_jar}" "$PostUrlHost")
|
|
./hosts/up_kouploader.sh:132: response=$(tor_curl_upload --insecure -L -i \
|
|
./hosts/up_kraken.sh:115: response=$(tor_curl_upload --insecure -i \
|
|
./hosts/up_nippy.sh:125: response=$(tor_curl_upload --insecure -i \
|
|
./hosts/up_nofile.sh:102: response=$(tor_curl_upload --insecure -i \
|
|
./hosts/up_offshorecat.sh:104: response=$(tor_curl_upload --insecure -i \
|
|
./hosts/up_oshi.sh:110: response=$(tor_curl_upload --insecure \
|
|
./hosts/up_pixeldrain.sh:112: response=$(tor_curl_upload --insecure -X PUT \
|
|
./hosts/up_quax.sh:102: response=$(tor_curl_upload --insecure -i \
|
|
./hosts/up_ranoz.sh:102: response=$(tor_curl_upload --insecure -L -i -s \
|
|
./hosts/up_ranoz.sh:129: response=$(tor_curl_upload --insecure -i -X PUT \
|
|
./hosts/up_shareonline.sh:102: response=$(tor_curl_upload --insecure -i \
|
|
./hosts/up_syspro.sh:102: response=$(tor_curl_upload --insecure -i \
|
|
./hosts/up_tempfileme.sh:102: response=$(tor_curl_upload --insecure -i \
|
|
./hosts/up_tempsh.sh:102: response=$(tor_curl_upload --insecure -i \
|
|
./hosts/up_torup.sh:109: response=$(tor_curl_request --insecure -L -s -b "${torp_cookie_jar}" -c "${torp_cookie_jar}" \
|
|
./hosts/up_torup.sh:149: response=$(tor_curl_upload --insecure -i \
|
|
./hosts/up_turboonion.sh:99: response=$(tor_curl_upload --insecure \
|
|
./hosts/up_uploadbay.sh:102: response=$(tor_curl_upload --insecure -i \
|
|
./hosts/up_uploadee.sh:106: response=$(tor_curl_request --insecure -L -s "https://www.upload.ee/ubr_link_upload.php")
|
|
./hosts/up_uploadee.sh:176: response=$(tor_curl_upload --insecure -i -L \
|
|
./hosts/up_uploadev.sh:102: response=$(tor_curl_upload --insecure -i \
|
|
./hosts/up_uploadflix.sh:106: response=$(tor_curl_upload --insecure -i \
|
|
./hosts/up_uploadhive.sh:128: response=$(tor_curl_upload --insecure -i \
|
|
./hosts/up_uploadraja.sh:102: response=$(tor_curl_upload --insecure -i \
|
|
./hosts/up_yolobit.sh:102: response=$(tor_curl_upload --insecure -i \
|
|
./hosts/youdbox.sh:95: response=$(tor_curl_request --insecure -L -i -s "${fixed_url}")
|
|
./hosts/youdbox.sh:141: response=$(tor_curl_request --insecure -L -s -X POST --data "$form_data" "${fixed_url}")
|
|
./hosts/youdbox.sh:183: file_header=$(tor_curl_request --insecure -L --head -s --referer "${fixed_url}" "$download_url")
|
|
./hosts/youdbox.sh:276: tor_curl_request --insecure -L -G --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval "$download_url" --continue-at - --output "$file_path"
|
|
./hosts/youdbox.sh:278: tor_curl_request --insecure -L -G "$download_url" --continue-at - --output "$file_path"
|
|
./mad.sh:100:UseTorCurlImpersonate=false
|
|
./mad.sh:391:tor_curl_request() {
|
|
./mad.sh:392: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
|
./mad.sh:393: "${curl_impersonate[@]}" --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" --connect-timeout ${ConnectTimeout} --compressed --globoff "$@"
|
|
./mad.sh:395: curl --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" --connect-timeout ${ConnectTimeout} --compressed --globoff "$@"
|
|
./mad.sh:398:tor_curl_request_extended() {
|
|
./mad.sh:400: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
|
./mad.sh:401: "${curl_impersonate[@]}" --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" --connect-timeout $randomtimeout --compressed --globoff "$@"
|
|
./mad.sh:403: curl --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" --connect-timeout $randomtimeout --compressed --globoff "$@"
|
|
./mad.sh:406:tor_curl_upload() {
|
|
./mad.sh:407: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
|
./mad.sh:409: "${curl_impersonate[@]}" --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" --connect-timeout ${ConnectTimeout} --speed-limit $UploadSpeedMin --speed-time $UploadTimeoutInterval --compressed --globoff "$@"
|
|
./mad.sh:411: "${curl_impersonate[@]}" --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" --connect-timeout ${ConnectTimeout} --compressed --globoff "$@"
|
|
./mad.sh:415: curl --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" --connect-timeout ${ConnectTimeout} --speed-limit $UploadSpeedMin --speed-time $UploadTimeoutInterval -H 'User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:109.0) Gecko/20100101 Firefox/115.0' -H 'Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8' -H 'Accept-Language: en-US,en;q=0.5' -H 'Accept-Encoding: gzip, deflate, br' -H 'Origin: null' -H 'Connection: keep-alive' -H 'Upgrade-Insecure-Requests: 1' -H 'Sec-Fetch-Dest: document' -H 'Sec-Fetch-Mode: navigate' -H 'Sec-Fetch-Site: cross-site' -H 'Sec-Fetch-User: ?1' -H 'TE: trailers' --compressed --globoff "$@"
|
|
./mad.sh:417: curl --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" --connect-timeout ${ConnectTimeout} -H 'User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:109.0) Gecko/20100101 Firefox/115.0' -H 'Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8' -H 'Accept-Language: en-US,en;q=0.5' -H 'Accept-Encoding: gzip, deflate, br' -H 'Origin: null' -H 'Connection: keep-alive' -H 'Upgrade-Insecure-Requests: 1' -H 'Sec-Fetch-Dest: document' -H 'Sec-Fetch-Mode: navigate' -H 'Sec-Fetch-Site: cross-site' -H 'Sec-Fetch-User: ?1' -H 'TE: trailers' --compressed --globoff "$@"
|
|
./mad.sh:1361:install_curl_impersonate() {
|
|
./mad.sh:1363: echo -e "${BLUE}lwthiker curl_impersonate${NC} is the original dev, but it is relatively inactive."
|
|
./mad.sh:1364: echo -e "- Currently uses curl v8.1.1."
|
|
./mad.sh:1368: echo -e "${BLUE}lexiforest curl_impersonate${NC} is an active fork of curl_impersonate."
|
|
./mad.sh:1369: echo -e "+ Currently uses curl v8.7.1"
|
|
./mad.sh:1373: PS3='Please select which curl_impersonate to install: '
|
|
./mad.sh:1381: install_curl_impersonate_lwthiker_orig
|
|
./mad.sh:1385: install_curl_impersonate_lexiforest_fork
|
|
./mad.sh:1395:install_curl_impersonate_lwthiker_orig() {
|
|
./mad.sh:1399: echo -e "${BLUE}lwthiker curl_impersonate${NC} is the original curl_impersonate."
|
|
./mad.sh:1400: echo -e "+ Currently uses curl v8.1.1, and has low activity for updates"
|
|
./mad.sh:1403: echo -e "${GREEN}| Fetching:${NC} latest ${BLUE}lwthiker curl_impersonate${NC} info from github...${NC}"
|
|
./mad.sh:1406: response=$(tor_curl_request --insecure -L -s https://github.com/lwthiker/curl-impersonate/releases/latest)
|
|
./mad.sh:1408: debugHtml "github" "lbf_inst_curlimp$j" "$response"
|
|
./mad.sh:1411: latestTag=$(grep -oPi -m 1 '(?<=/curl-impersonate/releases/tag/).*?(?=")' <<< "$response")
|
|
./mad.sh:1421: yes_or_no "Do you wish to download and extract curl_impersonate $latestTag (using tor+curl)?" && {
|
|
./mad.sh:1423: download_url='https://github.com/lwthiker/curl-impersonate/releases/download/'"$latestTag"'/curl-impersonate-'"$latestTag"'.x86_64-linux-gnu.tar.gz'
|
|
./mad.sh:1426: file_header=$(tor_curl_request --insecure --head -Ls "$download_url")
|
|
./mad.sh:1428: debugHtml "github" "head_inst_curlimp$j" "${file_header}"
|
|
./mad.sh:1476: tor_curl_request --insecure -L "$download_url" --continue-at - --output "$file_path"
|
|
./mad.sh:1505: echo -e "| Extracting curl_impersonate..."
|
|
./mad.sh:1507: rm -f "${ScriptDir}"/curl*
|
|
./mad.sh:1508: mv "$extract_location/curl-impersonate-ff" "${ScriptDir}/"
|
|
./mad.sh:1509: mv "$extract_location/curl_ff109" "${ScriptDir}/"
|
|
./mad.sh:1510: echo -e "${GREEN}| Done.${NC} Update ${BLUE}\"UseTorCurlImpersonate=true\"${NC} in script to use..."
|
|
./mad.sh:1518:install_curl_impersonate_lexiforest_fork() {
|
|
./mad.sh:1522: echo -e "${BLUE}lexiforest curl_impersonate${NC} is an active fork of curl_impersonate."
|
|
./mad.sh:1523: echo -e "+ Currently uses curl v8.7.1, and is patched for latest CVEs"
|
|
./mad.sh:1526: echo -e "${GREEN}| Fetching:${NC} latest ${BLUE}lexiforest curl_impersonate fork${NC} info from github...${NC}"
|
|
./mad.sh:1529: response=$(tor_curl_request --insecure -L -s https://github.com/lexiforest/curl-impersonate/releases/latest)
|
|
./mad.sh:1531: debugHtml "github" "lbf_inst_curlimp$j" "$response"
|
|
./mad.sh:1534: latestTag=$(grep -oPi -m 1 '(?<=/curl-impersonate/releases/tag/).*?(?=")' <<< "$response")
|
|
./mad.sh:1544: yes_or_no "Do you wish to download and extract curl_impersonate $latestTag (using tor+curl)?" && {
|
|
./mad.sh:1546: download_url='https://github.com/lexiforest/curl-impersonate/releases/download/'"$latestTag"'/curl-impersonate-'"$latestTag"'.x86_64-linux-gnu.tar.gz'
|
|
./mad.sh:1549: file_header=$(tor_curl_request --insecure --head -Ls "$download_url")
|
|
./mad.sh:1551: debugHtml "github" "head_inst_curlimp$j" "${file_header}"
|
|
./mad.sh:1599: tor_curl_request --insecure -L "$download_url" --continue-at - --output "$file_path"
|
|
./mad.sh:1628: echo -e "| Extracting curl_impersonate..."
|
|
./mad.sh:1630: rm -f "${ScriptDir}"/curl*
|
|
./mad.sh:1631: mv "$extract_location/curl-impersonate-chrome" "${ScriptDir}/"
|
|
./mad.sh:1632: mv "$extract_location/curl_chrome131" "${ScriptDir}/"
|
|
./mad.sh:1633: echo -e "${GREEN}| Done.${NC} Update ${BLUE}\"UseTorCurlImpersonate=true\"${NC} in script to use..."
|
|
./mad.sh:1795: echo -e ":${NC} ${GREEN}MAD${PINK} Audit${NC} : Reports usage of http & curl in scripts${PINK}${BLD} :"
|
|
./mad.sh:1803: maud_curl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep --color='always' -Ei 'curl')
|
|
./mad.sh:1804: maud_torcurl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep -A 12 --color='always' -Ei 'tor_curl')
|
|
./mad.sh:1813: echo -e "${PINK}MAD Audit of curl:${NC} (${GREEN}grep \"curl\"${NC})"
|
|
./mad.sh:1815: echo -e "$maud_curl"
|
|
./mad.sh:1817: echo -e "${PINK}MAD Audit of tor_curl (+12 lines after):${NC} (${GREEN}grep \"tor_curl\"${NC})"
|
|
./mad.sh:1819: echo -e "$maud_torcurl"
|
|
./mad.sh:1831: maud_curl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep --color='always' -Ei 'curl')
|
|
./mad.sh:1832: maud_torcurl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep -A 12 --color='always' -Ei 'tor_curl')
|
|
./mad.sh:1841: echo -e "${PINK}MAD Audit of curl:${NC} (${GREEN}grep \"curl \"${NC})"
|
|
./mad.sh:1843: echo -e "$maud_curl"
|
|
./mad.sh:1845: echo -e "${PINK}MAD Audit of tor_curl (+12 lines after):${NC} (${GREEN}grep \"tor_curl\"${NC})"
|
|
./mad.sh:1847: echo -e "$maud_torcurl"
|
|
./mad.sh:1853: maud_curl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep --color='always' -Ei 'curl')
|
|
./mad.sh:1854: maud_torcurl=$(grep -n -vxE '[[:blank:]]*([#].*)?' $fil | grep -A 12 --color='always' -Ei 'tor_curl')
|
|
./mad.sh:1863: echo -e "${PINK}MAD Audit of curl:${NC} (${GREEN}grep \"curl\"${NC})"
|
|
./mad.sh:1865: echo -e "$maud_curl"
|
|
./mad.sh:1867: echo -e "${PINK}MAD Audit of tor_curl (+12 lines after):${NC} (${GREEN}grep \"tor_curl\"${NC})"
|
|
./mad.sh:1869: echo -e "$maud_torcurl"
|
|
./mad.sh:2816: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
|
./mad.sh:2817: printf "client: ${GREEN}Tor${NC} + ${BLUE}curl_impersonate${NC}\\n"
|
|
./mad.sh:2819: printf "client: ${GREEN}Tor${NC} + ${GREEN}curl${NC}\\n"
|
|
./mad.sh:2991: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
|
./mad.sh:2992: printf "client: ${GREEN}Tor${NC} + ${BLUE}curl_impersonate${NC}\\n"
|
|
./mad.sh:2994: printf "client: ${GREEN}Tor${NC} + ${GREEN}curl${NC}\\n"
|
|
./mad.sh:3192: file_header=$(tor_curl_request --insecure -m 8 -s -D - -o /dev/null \
|
|
./mad.sh:3199: file_header=$(tor_curl_request --insecure --head -H "Connection: keep-alive" -L -s -i "$download_url" |
|
|
./mad.sh:3327: tor_curl_request --insecure -L --referer "$file_url" "$download_url" --output "$file_path"
|
|
./mad.sh:3371: tor_curl_request --insecure -L --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval "$download_url" --continue-at - --output "$file_path"
|
|
./mad.sh:3373: tor_curl_request --insecure -L --referer "$file_url" "$download_url" --continue-at - --output "$file_path"
|
|
./mad.sh:3571: response=$(tor_curl_upload --insecure -i \
|
|
./mad.sh:3578: response=$(tor_curl_upload --insecure -i \
|
|
./mad.sh:3649:if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
|
./mad.sh:3650: curl_impersonate=()
|
|
./mad.sh:3651: readarray -d $'' arrFiles < <(find "$ScriptDir" -maxdepth 1 -name "curl_*" -printf '%p\n' | sort -Vk1)
|
|
./mad.sh:3652: bFoundCurlHeader=false
|
|
./mad.sh:3656: curl_impersonate=($fil)
|
|
./mad.sh:3657: bFoundCurlHeader=true
|
|
./mad.sh:3661: if [ "$bFoundCurlHeader" == "false" ]; then
|
|
./mad.sh:3662: echo -e "${RED}[ERROR] Missing dependency \"curl-impersonate\"!${NC}"
|
|
./mad.sh:3665: echo -e "You'll need to download ${GREEN}\"curl-impersonate\"${NC}."
|
|
./mad.sh:3668: echo -e "The latest binary can be obtained on GitHub, search for \"curl-impersonate\""
|
|
./mad.sh:3670: echo -e " 1. Visit the page of curl-impersonate and add \"/releases/latest/\" at end of URL."
|
|
./mad.sh:3674: echo -e " 4. Download archive ${GREEN}\"curl-impersonate-vX.Y.Z.x86_64-linux-gnu.tar.gz\"${YELLOW}."
|
|
./mad.sh:3675: echo -e " 5. Extract files ${GREEN}\"curl-impersonate-ff\"${NC} and ${GREEN}\"curl_ff109\"${NC} next to this script."
|
|
./mad.sh:3678: echo -e "run $0 install_curl_impersonate\\n"
|
|
./mad.sh:3680: yes_or_no "Do you wish to download and extract latest curl_impersonate (using tor+curl)?" && {
|
|
./mad.sh:3681: UseTorCurlImpersonate=false
|
|
./mad.sh:3682: install_curl_impersonate
|
|
./mad.sh:3766: echo -e "[${YELLOW}Install curl_impersonate${NC}]: Downloads the latest binary for curl_impersonate from github repo (3 choices)"
|
|
./mad.sh:3767: printf " %s install_curl_impersonate\\n" "$0"
|
|
./mad.sh:3845:elif [[ "$arg1" == "install_curl_impersonate" ]]; then
|
|
./mad.sh:3846: install_curl_impersonate
|
|
./mad.sh:3877:if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
|
./mad.sh:3878: printf "client: ${GREEN}Tor${NC} + ${BLUE}curl_impersonate${NC}\\n"
|
|
./mad.sh:3880: printf "client: ${GREEN}Tor${NC} + ${GREEN}curl${NC}\\n"
|
|
./plugins/pjscloud.sh:44: if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
|
./plugins/pjscloud.sh:45: response=$("${curl_impersonate[@]}" --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" \
|
|
./plugins/pjscloud.sh:53: response=$(curl --proxy "socks5h://${tor_identity}@${TorIp}:${torPort}" \
|
|
|