Tools Get unlimited keep2share premium

Red.

Bathwater Drinker
Mar 13, 2022
120
2,715
1,252
0fya082315al84db03fa9bf467e3.png
This guide will show you how to get "unlimited" premium days for your keep2share account in just a few seconds.

It's using the xfantazy method, where you get one day for each 10 views. Some people tried automating this with Selenium, which was way too overkill.
Just use the API.

There's an endpoint called /events/user/videoViewed, which is requested after you started watching the video for some seconds.
This will essentially count one view for your account. Do this with a list of proxies and you should be able to farm some views and get some premium days.

Let's write a bash script.
Bash:
Please, Log in or Register to view codes content!

Before running this, you have to create a file in the same directory called proxies.txt, where you'll put all your proxies in, using the default format.

Code:
Please, Log in or Register to view codes content!

You probably want to replace <url> with the previously named website, which I can't include in the script, since it's a blacklisted word/host.
And also replace YourUserId with your account id. You can find this at the end of your referral url you've copied by clicking on "Share & Get Free Premium!".

Feel free to change the contentId, for example when the script stops working suddenly. You can also get this from said referral url.

Run this script and you'll get approximately one view for each proxy. You can reuse the same proxies later.

If you're on Windows and wondering how to run this, simply download
Please, Log in or Register to see links and images
, which will install an terminal emulator that allows you to run bash scripts. Then you can right click on the folder where your script is located in and click "Git Bash here".
Assuming you've named your file k2s.sh, run chmod +x k2s.sh and then ./k2s.sh.

Have fun.
 
Last edited:

backwards

Tier 2 Sub
Jan 4, 2023
31
1
209
277
0fya082315al84db03fa9bf467e3.png
Using Tor (thousands of unique ip addresses):

1. Make sure you have tor cli installed (if you have tor browser installed, you most likely already have it).
2. Add user ids (found at the end of the share url) to the USER_IDS array.
3. Run tor from the command line: sudo tor
-- The output of the last line should be something like: Opened Socks listener connection (ready) on 127.0.0.1:9050
4. Optionally, use
Please, Log in or Register to see links and images
to bypass cloudflare verification.

The script automatically picks curl-impersonate-chrome if it exists in the binary path.

Note: curl-impersonate does not support Chrome 108 at this time.

Bash:
Please, Log in or Register to view codes content!

Proof:

Please, Log in or Register to see links and images
Please, Log in or Register to see links and images
 
Last edited:

Dania

I tip my hat to you, m'lady.
Mar 11, 2022
370
1
12,438
1,408
0fya082315al84db03fa9bf467e3.png
The Tor script does indeed work as intended, many thanks for creating it. (y)
Please, Log in or Register to view quotes
Your errors are on line 9, 19 and 24. If you re-copy the script from a7x7's post, change only the numbers after USER_IDS to match your user ID it should work. (y)
Please, Log in or Register to view quotes
Please, Log in or Register to view quotes
For now I believe the only native Windows option - except for using a VM (see below) - is to use the proxy script on the previous page.

Update: It’s possible to use WSL as well. Check kdpass’ post below. This solution is the easiest in my opinion. (y)

Following a7x7's instructions, here's what I did on my Linux Mint machine and a test VM:


Please, Log in or Register to view spoilers

:MLADY:
 
Last edited:

idnim

Diamond Tier
Sep 3, 2022
17
768
927
0fya082315al84db03fa9bf467e3.png
Works like a charm
brave_DfN2bdAoL0.png

You just need good proxies
 

kdpass

Bathwater Drinker
Mar 12, 2022
97
1,240
1,242
0fya082315al84db03fa9bf467e3.png
Please, Log in or Register to view quotes
  1. Copy the above code in a text editor and change the USER_IDS=(12345678) with your USER_IDS=( ) Save the file ask2s.sh. You can use any name you want.
  2. Install
    Please, Log in or Register to see links and images
    from the Microsoft store.
  3. Open command prompt (CMD) and type ubuntu. This will enable you to use ubuntu inside your windows OS.
  4. Install
    Please, Log in or Register to see links and images
    . You can use the above instructions to edit the /etc/tor/torrc configuration file. Stop tor using sudo service tor stop
  5. Change directory to the directory containing the k2s.sh script.
  6. Type sudo -s and hit enter. Then enter your password.
  7. Start Tor sudo service tor start
  8. Run the bash scriptbash k2s.sh
 

Red.

Bathwater Drinker
Mar 13, 2022
120
2,715
1,252
0fya082315al84db03fa9bf467e3.png
Please, Log in or Register to view quotes
You can find tons of free proxies everywhere.
Please, Log in or Register to see links and images

Try saving the bash script and your proxies.txt with the unix line break instead of CRLF. You can edit this using Notepad++ by right clicking the line break style field and choosing Unix (LF).

https://i.imgur was here once, but it's now gone/0sxBCg5.png

If you want a more reliable solution for proxies, you have to spend some money for quality proxy providers or VPNs that also provide SOCKS5 tunnels. These are usually the best option. (forget NordVPN and all the other commercial bullshit)
 
Last edited:

JIGSAW766

Tier 2 Sub
May 5, 2022
17
165
287
0fya082315al84db03fa9bf467e3.png
#!/bin/bash

# Separate multiple ids using spaces.
USER_IDS=(480600)

# Ascii to Char:
Please, Log in or Register to see links and images

chr() { printf "\\x$(printf "%x" "$1")"; }

Please, Log in or Register to see links and images
120)$(chr 102)$(chr 97)$(chr 110)$(chr 116)$(chr 97)$(chr 122)$(chr 121)$(chr 46)$(chr 99)$(chr 111)$(chr 109)

while true
do
#
Please, Log in or Register to see links and images

user_id=${USER_IDS[ $RANDOM % ${#USER_IDS[@]} ]}
# Refresh ip address
sudo killall -HUP tor
if ! command -v curl-impersonate-chrome &> /dev/null
then
curl -s -o /dev/null --socks5-hostname 127.0.0.1:9050
Please, Log in or Register to see links and images
\
--data-raw "contentId=5ce96349bd03f31871c05b40&refUserId=$user_id" \
-H "User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:105.0) Gecko/20100101" \
-H "Accept: */*"
else
curl-impersonate-chrome -s -o /dev/null --socks5-hostname 127.0.0.1:9050
Please, Log in or Register to see links and images
\
--data-raw "contentId=5ce96349bd03f31871c05b40&refUserId=$user_id" \
-H "User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:105.0) Gecko/20100101" \
-H "Accept: */*"
fi
done


HELP ME PLEASE :/
 
  • Like
Reactions: kdpass

kdpass

Bathwater Drinker
Mar 12, 2022
97
1,240
1,242

Dania

I tip my hat to you, m'lady.
Mar 11, 2022
370
1
12,438
1,408
0fya082315al84db03fa9bf467e3.png
Please, Log in or Register to view quotes

It looks like Tor is running as intended now. (y)

Quickly looking up the \r, it seems it’s Windows’ “carriage return character”. A user on Askubuntu explains it this way:
Please, Log in or Register to view quotes

(Also see kdpass’ response below (y))


On the same page they suggest running
sed -i 's/\r$//' curl.sh to remove this character. This will fix the errors on line 2 and 5 and hopefully also the error on line 32. (y)