Channel: ⇱SSLHTUNNELMAX.COM⇲
Forwarded from ASH Apps OFFICIAL (ASH)
🟢 ASH Tunnel : @ASHAppsOFFICIAL
🇩🇪 Germany 12
ℹ️ Calls are not supported in this server
Protocols :
UDP(all modes)
HTTP(from port 81 to port 7299 except port 443)
SSH(port 22)
SSL(port 443)
WS(port 80 & 8080)
WSS(port 8443)
DNSTT
DoH
DoT
🇩🇪 Germany 12
ℹ️ Calls are not supported in this server
Protocols :
UDP(all modes)
HTTP(from port 81 to port 7299 except port 443)
SSH(port 22)
SSL(port 443)
WS(port 80 & 8080)
WSS(port 8443)
DNSTT
DoH
DoT
Forwarded from ASH Apps OFFICIAL (ASH)
🟢 ASH Tunnel : @ASHAppsOFFICIAL
🇸🇬 Singapore 1
ℹ️ Calls are not supported in this server
Protocols :
UDP(all modes)
HTTP(from port 81 to port 7299 except port 443)
SSH(port 22)
SSL(port 443)
WS(port 80 & 8080)
WSS(port 8443)
FastDNS(port 53)
🇸🇬 Singapore 1
ℹ️ Calls are not supported in this server
Protocols :
UDP(all modes)
HTTP(from port 81 to port 7299 except port 443)
SSH(port 22)
SSL(port 443)
WS(port 80 & 8080)
WSS(port 8443)
FastDNS(port 53)
Forwarded from ASH Apps OFFICIAL (ASH)
🟢 ASH Tunnel : @ASHAppsOFFICIAL
🇺🇸 USA 1
ℹ️ Calls are not supported in this server
Protocols :
UDP(all modes)
HTTP(from port 81 to port 7299 except port 443)
SSH(port 22)
SSL(port 443)
WS(port 80 & 8080)
WSS(port 8443)
DNS2TCP
🇺🇸 USA 1
ℹ️ Calls are not supported in this server
Protocols :
UDP(all modes)
HTTP(from port 81 to port 7299 except port 443)
SSH(port 22)
SSL(port 443)
WS(port 80 & 8080)
WSS(port 8443)
DNS2TCP
Forwarded from ASH Apps OFFICIAL (ASH)
🟢 ASH Tunnel : @ASHAppsOFFICIAL
🇺🇸 USA 2
ℹ️ Calls are not supported in this server
Protocols :
UDP(all modes)
HTTP(from port 81 to port 7299 except port 443)
SSH(port 22)
SSL(port 443)
WS(port 80 & 8080)
WSS(port 8443)
DNSTT
DoH
DoT
🇺🇸 USA 2
ℹ️ Calls are not supported in this server
Protocols :
UDP(all modes)
HTTP(from port 81 to port 7299 except port 443)
SSH(port 22)
SSL(port 443)
WS(port 80 & 8080)
WSS(port 8443)
DNSTT
DoH
DoT
Forwarded from 📶𝗜𝗡𝗧𝗘𝗥𝗡𝗘𝗧 𝗙𝗢𝗥 𝗔𝗟𝗟📶
🟢 ASH Tunnel :
All the protocols are available and the servers are powerful
UDP, HTTP, SSH, SSL, WS, WSS, DNSTT, DoH, DoT, DNS2TCP, FastDNS
Join us @ASHAppsOFFICIAL
ASH Tunnel Download : https://hottg.com/ASHAppsOFFICIAL/10/48757
جميع البروتوكولات متوفرة، والسيرفرات قوية تتحمل الضغط
UDP, HTTP, SSH, SSL, WS, WSS, DNSTT, DoH, DoT, DNS2TCP, FastDNS
إنضمو هنا : @ASHAppsOFFICIAL
رابط التطبيق : https://hottg.com/ASHAppsOFFICIAL/10/48757
All the protocols are available and the servers are powerful
UDP, HTTP, SSH, SSL, WS, WSS, DNSTT, DoH, DoT, DNS2TCP, FastDNS
Join us @ASHAppsOFFICIAL
ASH Tunnel Download : https://hottg.com/ASHAppsOFFICIAL/10/48757
جميع البروتوكولات متوفرة، والسيرفرات قوية تتحمل الضغط
UDP, HTTP, SSH, SSL, WS, WSS, DNSTT, DoH, DoT, DNS2TCP, FastDNS
إنضمو هنا : @ASHAppsOFFICIAL
رابط التطبيق : https://hottg.com/ASHAppsOFFICIAL/10/48757
Forwarded from ASH Apps OFFICIAL (ASH)
🟢 ASH Tunnel :
All the unworking DNSTT servers are now replaced with FastDNS, more informations in the arrow described in the screenshot
+ New server : 🇩🇪 Germany 13
@ASHAppsOFFICIAL
All the unworking DNSTT servers are now replaced with FastDNS, more informations in the arrow described in the screenshot
+ New server : 🇩🇪 Germany 13
@ASHAppsOFFICIAL
Forwarded from 📶𝗜𝗡𝗧𝗘𝗥𝗡𝗘𝗧 𝗙𝗢𝗥 𝗔𝗟𝗟📶
🟢 ASH Tunnel :
VPS installer :
Intoducing the new update of ASH HTTP proxy that exists in our official installer script .
It is now replaced from HTTP protocol only, to HTTP + WS that are working in the same time and the same ports, and as ar result, installing separated WS protocol option has been removed.
How to switch between both of those protocols when I need one of them ?
- It's so easy, if you want to use WS Protocol, declare 'Upgrade: websocket' in your own payload. If you want to use HTTP protocol, don't declare it in your payload
New payload header : [sameresponse]
What's the benefit of this new feature ?
- it gets the response headers of your host using the same injected payload and bring it back for your client
How to use it ?
- you should declare it exactly in the right side of the "Host" header,
Example :
Before :
GET /cdn-cgi/trace HTTP/1.1[crlf]Host: www.google.com[crlf][crlf]
After :
GET /cdn-cgi/trace HTTP/1.1[crlf][sameresponse]Host: www.google.com[crlf][crlf]
⚠ Note : if [sameresponse] is declared but 'host' header doesn't exist, the [sameresponse] feature will be skipped and the default response 200 OK will be given
Examples below soon :
VPS installer :
Intoducing the new update of ASH HTTP proxy that exists in our official installer script .
It is now replaced from HTTP protocol only, to HTTP + WS that are working in the same time and the same ports, and as ar result, installing separated WS protocol option has been removed.
How to switch between both of those protocols when I need one of them ?
- It's so easy, if you want to use WS Protocol, declare 'Upgrade: websocket' in your own payload. If you want to use HTTP protocol, don't declare it in your payload
New payload header : [sameresponse]
What's the benefit of this new feature ?
- it gets the response headers of your host using the same injected payload and bring it back for your client
How to use it ?
- you should declare it exactly in the right side of the "Host" header,
Example :
Before :
GET /cdn-cgi/trace HTTP/1.1[crlf]Host: www.google.com[crlf][crlf]
After :
GET /cdn-cgi/trace HTTP/1.1[crlf][sameresponse]Host: www.google.com[crlf][crlf]
⚠ Note : if [sameresponse] is declared but 'host' header doesn't exist, the [sameresponse] feature will be skipped and the default response 200 OK will be given
Examples below soon :
GitHub
GitHub - ASHANTENNA/VPNScript: Bash script installer of specific protocols for ASH Tunnel application : UDP, HTTP, SSL, WS, DNSTT…
Bash script installer of specific protocols for ASH Tunnel application : UDP, HTTP, SSL, WS, DNSTT, DoH, DoT, DNS2TCP, BadVPN UDPGW - ASHANTENNA/VPNScript
Forwarded from 📶𝗜𝗡𝗧𝗘𝗥𝗡𝗘𝗧 𝗙𝗢𝗥 𝗔𝗟𝗟📶
🟢 ASH Tunnel :
VPS installer :
نقدم لكم التحديث الجديد الخاص ببروكسي ASH HTTP الموجود في سكريبت الinstaller الرسمي الخاص بنا.
لقد تم تغييره من بروتوكل HTTP إلى HTTP + WS حيث يعملان في نفس الوقت ونفس المنافذ، وكنتيجة، تم نزع بروتوكول WS الذي يعمل بشكل منفصل
كيف يمكنني التغيير بين كلا من هذين البروتوكولين عندما أريد واحدا فيهم ؟
- الأمر سهل، إذا كنت تريد استعمال بروتوكول الWS، أعلن عن 'Upgrade: websocket' داخل البايلود الخاص بك، إذا كنت تريد استعمال بروتوكول الHTTP، فلا تعلن عنها في البايلود الخاص بك
بايلود header جديد : [sameresponse]
ما فائدة هذه الميزة الجديدة ؟
- تقوم بالحصول على الإستجابة الخاصة بالهوست الموجود داخل البايلود الخاص وتقوم بإرجاعه للclient الخاص بك
كيف أستعملها ؟
- يجب أن تعلنها تماما في الجانب الأيسر من الheader الخاص بال'Host'
مثال :
قبل :
GET /cdn-cgi/trace HTTP/1.1[crlf]Host: www.google.com[crlf][crlf]
بعد :
GET /cdn-cgi/trace HTTP/1.1[crlf][sameresponse]Host: www.google.com[crlf][crlf]
⚠ ملاحظة :
إذا تم الإعلان عن [sameresponse] لكن الheader الخاص بال'host' ليس موجودا، فسيتم تجاوز ميزة ال[sameresponse] وستعطى الإجابة الإفتراضية 200 OK
VPS installer :
نقدم لكم التحديث الجديد الخاص ببروكسي ASH HTTP الموجود في سكريبت الinstaller الرسمي الخاص بنا.
لقد تم تغييره من بروتوكل HTTP إلى HTTP + WS حيث يعملان في نفس الوقت ونفس المنافذ، وكنتيجة، تم نزع بروتوكول WS الذي يعمل بشكل منفصل
كيف يمكنني التغيير بين كلا من هذين البروتوكولين عندما أريد واحدا فيهم ؟
- الأمر سهل، إذا كنت تريد استعمال بروتوكول الWS، أعلن عن 'Upgrade: websocket' داخل البايلود الخاص بك، إذا كنت تريد استعمال بروتوكول الHTTP، فلا تعلن عنها في البايلود الخاص بك
بايلود header جديد : [sameresponse]
ما فائدة هذه الميزة الجديدة ؟
- تقوم بالحصول على الإستجابة الخاصة بالهوست الموجود داخل البايلود الخاص وتقوم بإرجاعه للclient الخاص بك
كيف أستعملها ؟
- يجب أن تعلنها تماما في الجانب الأيسر من الheader الخاص بال'Host'
مثال :
قبل :
GET /cdn-cgi/trace HTTP/1.1[crlf]Host: www.google.com[crlf][crlf]
بعد :
GET /cdn-cgi/trace HTTP/1.1[crlf][sameresponse]Host: www.google.com[crlf][crlf]
⚠ ملاحظة :
إذا تم الإعلان عن [sameresponse] لكن الheader الخاص بال'host' ليس موجودا، فسيتم تجاوز ميزة ال[sameresponse] وستعطى الإجابة الإفتراضية 200 OK
GitHub
GitHub - ASHANTENNA/VPNScript: Bash script installer of specific protocols for ASH Tunnel application : UDP, HTTP, SSL, WS, DNSTT…
Bash script installer of specific protocols for ASH Tunnel application : UDP, HTTP, SSL, WS, DNSTT, DoH, DoT, DNS2TCP, BadVPN UDPGW - ASHANTENNA/VPNScript
Forwarded from 📶𝗜𝗡𝗧𝗘𝗥𝗡𝗘𝗧 𝗙𝗢𝗥 𝗔𝗟𝗟📶
Example 1 :
Both HTTP and WS have the same port, and both are working properly, the trigger between both of them is 'Upgrade: websocket'
Both HTTP and WS have the same port, and both are working properly, the trigger between both of them is 'Upgrade: websocket'
Websocket ✅
Domain : ben.my-north-africa.com
Username : sshpluss
Password : sshpluss
Created : 2025-06-25
Expired : 2025-06-27
==============================
Payload Websocket TLS
==============================
GET wss://bug.com [protocol][crlf]Host: ben.my-north-africa.com[crlf]Upgrade: websocket[crlf][crlf]
==============================
Payload Websocket No TLS
==============================
GET / HTTP/1.1[crlf]Host: ben.my-north-africa.com[crlf]Upgrade: websocket[crlf][crlf]
==============================
Domain : ben.my-north-africa.com
Username : sshpluss
Password : sshpluss
Created : 2025-06-25
Expired : 2025-06-27
==============================
Payload Websocket TLS
==============================
GET wss://bug.com [protocol][crlf]Host: ben.my-north-africa.com[crlf]Upgrade: websocket[crlf][crlf]
==============================
Payload Websocket No TLS
==============================
GET / HTTP/1.1[crlf]Host: ben.my-north-africa.com[crlf]Upgrade: websocket[crlf][crlf]
==============================
Forwarded from Buk laisvas H. S. [PRO] (ᯓ🄷🅂ᯓᴾᴿᴼ)
Hostname : hspro.sbs
Username : testall
Password : testlla
Limit Device : 10000
━━━━━━━━━━━━━━━━━━━━
Port openssh : 22, 443
Port dropbear : 109, 143, 443
Port ssh udp : 1-65535
Port stunnel : 443,
Port ssh websocket http : 2052
Alternative port ovpn & ssh websocket http : 80, 8080, 2082, 2086.
Port ssh websocket https : 443
Port ovpn websocket http : 2095
Port squid : 2086, 3128
Port badvpn/udpgw : 7100-7300
DNS Hostname : dns.hspro.sbs
Pub key slowdns : 6ca1cfd3d731255811a584b6167277893e0702185192f6d8d8161a369fe11c6e
Dns for slowdns : 1.1.1.1 / 8.8.8.8
v2ray
Domain : hspro.sbs
Port TLS : 443
Port NONE-TLS : 80
Port Alternative NONE-TLS : 80, 8080, 2082, 2086, 69, 55.
ID : 3b9ec69c-79cf-403b-81b3-41c29e53b709
Network : Websocket
Websocket Path : /vmessws
━━━━━━━━━━━━━━━━━━━━
LINK WS TLS : vmess://ICAgICAgewogICAgICAidiI6ICIyIiwKICAgICAgInBzIjogInRlc3RhbGwiLAogICAgICAiYWRkIjogImhzcHJvLnNicyIsCiAgICAgICJwb3J0IjogIjQ0MyIsCiAgICAgICJpZCI6ICIzYjllYzY5Yy03OWNmLTQwM2ItODFiMy00MWMyOWU1M2I3MDkiLAogICAgICAiYWlkIjogIjAiLAogICAgICAibmV0IjogIndzIiwKICAgICAgInBhdGgiOiAiL3ZtZXNzd3MiLAogICAgICAidHlwZSI6ICJub25lIiwKICAgICAgImhvc3QiOiAiaHNwcm8uc2JzIiwKICAgICAgInRscyI6ICJ0bHMiCn0K
━━━━━━━━━━━━━━━━━━━━
LINK WS NONE-TLS : vmess://ICAgICAgewogICAgICAidiI6ICIyIiwKICAgICAgInBzIjogInRlc3RhbGwiLAogICAgICAiYWRkIjogImhzcHJvLnNicyIsCiAgICAgICJwb3J0IjogIjgwIiwKICAgICAgImlkIjogIjNiOWVjNjljLTc5Y2YtNDAzYi04MWIzLTQxYzI5ZTUzYjcwOSIsCiAgICAgICJhaWQiOiAiMCIsCiAgICAgICJuZXQiOiAid3MiLAogICAgICAicGF0aCI6ICIvdm1lc3N3cyIsCiAgICAgICJ0eXBlIjogIm5vbmUiLAogICAgICAiaG9zdCI6ICJoc3Byby5zYnMiLAogICAgICAidGxzIjogIm5vbmUiCn0K
Domain : hspro.sbs
Port TLS : 443
Port NONE-TLS : 8880
ID : f6c29afd-0ab9-4396-8558-14214e64b68f
Network : Websocket
Websocket Path : /vlessws
━━━━━━━━━━━━━━━━━━━━
LINK WS TLS : vless://[email protected]:443?path=/vlessws&security=tls&encryption=none&host=hspro.sbs&type=ws&sni=hspro.sbs#testlla
━━━━━━━━━━━━━━━━━━━━
LINK WS NONE-TLS : vless://[email protected]:8880?path=/vlessws&encryption=none&host=hspro.sbs&type=ws#testlla
Username : testall
Password : testlla
Limit Device : 10000
━━━━━━━━━━━━━━━━━━━━
Port openssh : 22, 443
Port dropbear : 109, 143, 443
Port ssh udp : 1-65535
Port stunnel : 443,
Port ssh websocket http : 2052
Alternative port ovpn & ssh websocket http : 80, 8080, 2082, 2086.
Port ssh websocket https : 443
Port ovpn websocket http : 2095
Port squid : 2086, 3128
Port badvpn/udpgw : 7100-7300
DNS Hostname : dns.hspro.sbs
Pub key slowdns : 6ca1cfd3d731255811a584b6167277893e0702185192f6d8d8161a369fe11c6e
Dns for slowdns : 1.1.1.1 / 8.8.8.8
v2ray
Domain : hspro.sbs
Port TLS : 443
Port NONE-TLS : 80
Port Alternative NONE-TLS : 80, 8080, 2082, 2086, 69, 55.
ID : 3b9ec69c-79cf-403b-81b3-41c29e53b709
Network : Websocket
Websocket Path : /vmessws
━━━━━━━━━━━━━━━━━━━━
LINK WS TLS : vmess://ICAgICAgewogICAgICAidiI6ICIyIiwKICAgICAgInBzIjogInRlc3RhbGwiLAogICAgICAiYWRkIjogImhzcHJvLnNicyIsCiAgICAgICJwb3J0IjogIjQ0MyIsCiAgICAgICJpZCI6ICIzYjllYzY5Yy03OWNmLTQwM2ItODFiMy00MWMyOWU1M2I3MDkiLAogICAgICAiYWlkIjogIjAiLAogICAgICAibmV0IjogIndzIiwKICAgICAgInBhdGgiOiAiL3ZtZXNzd3MiLAogICAgICAidHlwZSI6ICJub25lIiwKICAgICAgImhvc3QiOiAiaHNwcm8uc2JzIiwKICAgICAgInRscyI6ICJ0bHMiCn0K
━━━━━━━━━━━━━━━━━━━━
LINK WS NONE-TLS : vmess://ICAgICAgewogICAgICAidiI6ICIyIiwKICAgICAgInBzIjogInRlc3RhbGwiLAogICAgICAiYWRkIjogImhzcHJvLnNicyIsCiAgICAgICJwb3J0IjogIjgwIiwKICAgICAgImlkIjogIjNiOWVjNjljLTc5Y2YtNDAzYi04MWIzLTQxYzI5ZTUzYjcwOSIsCiAgICAgICJhaWQiOiAiMCIsCiAgICAgICJuZXQiOiAid3MiLAogICAgICAicGF0aCI6ICIvdm1lc3N3cyIsCiAgICAgICJ0eXBlIjogIm5vbmUiLAogICAgICAiaG9zdCI6ICJoc3Byby5zYnMiLAogICAgICAidGxzIjogIm5vbmUiCn0K
Domain : hspro.sbs
Port TLS : 443
Port NONE-TLS : 8880
ID : f6c29afd-0ab9-4396-8558-14214e64b68f
Network : Websocket
Websocket Path : /vlessws
━━━━━━━━━━━━━━━━━━━━
LINK WS TLS : vless://[email protected]:443?path=/vlessws&security=tls&encryption=none&host=hspro.sbs&type=ws&sni=hspro.sbs#testlla
━━━━━━━━━━━━━━━━━━━━
LINK WS NONE-TLS : vless://[email protected]:8880?path=/vlessws&encryption=none&host=hspro.sbs&type=ws#testlla
HTML Embed Code: