Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!



   5266

Discord Python Execution Exploit

by Atomical - 15 June, 2021 - 04:01 PM
This post is by a banned member (xmaresalizm31) - Unhide
This post is by a banned member (HelloWorldDus) - Unhide
This post is by a banned member (Masloid) - Unhide
Masloid  
Registered
120
Posts
3
Threads
4 Years of service
#51
(15 June, 2021 - 04:01 PM)Atomical Wrote: Show More
So how this works is you embed a python payload into a image (it can be a rat, token grabber, cookie grabber), then upload it into a server (as a custom emoji) and run a simple few lines of code that don't look too suspicious. But once the code is ran, the script will search for the image with an embedded payload and then execute it. Here's one of the images that has an embedded payload (token grabber). As far as I know, this still works and will continue to work.

Leave a like!

looks nice
This post is by a banned member (Leafy123) - Unhide
Leafy123  
Registered
12
Posts
0
Threads
3 Years of service
#52
(15 June, 2021 - 04:01 PM)Atomical Wrote: Show More
So how this works is you embed a python payload into a image (it can be a rat, token grabber, cookie grabber), then upload it into a server (as a custom emoji) and run a simple few lines of code that don't look too suspicious. But once the code is ran, the script will search for the image with an embedded payload and then execute it. Here's one of the images that has an embedded payload (token grabber). As far as I know, this still works and will continue to work.

Leave a like!

thx man u best
This post is by a banned member (shadow15zx) - Unhide
This post is by a banned member (rizadou) - Unhide
This post is by a banned member (0x44FF) - Unhide
0x44FF  
Registered
36
Posts
0
Threads
3 Years of service
#55
(15 June, 2021 - 04:01 PM)Atomical Wrote: Show More
So how this works is you embed a python payload into a image (it can be a rat, token grabber, cookie grabber), then upload it into a server (as a custom emoji) and run a simple few lines of code that don't look too suspicious. But once the code is ran, the script will search for the image with an embedded payload and then execute it. Here's one of the images that has an embedded payload (token grabber). As far as I know, this still works and will continue to work.

Leave a like!

thx testigng wack
This post is by a banned member (Muhammad493) - Unhide
5
Posts
0
Threads
3 Years of service
#56
g6d confirmed

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: 2 Guest(s)