Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!



   5266

Discord Python Execution Exploit

by Atomical - 15 June, 2021 - 04:01 PM
This post is by a banned member (Atomical) - Unhide
Atomical  
Godlike
441
Posts
102
Threads
4 Years of service
#1
So how this works is you embed a python payload into a image (it can be a rat, token grabber, cookie grabber), then upload it into a server (as a custom emoji) and run a simple few lines of code that don't look too suspicious. But once the code is ran, the script will search for the image with an embedded payload and then execute it. Here's one of the images that has an embedded payload (token grabber). As far as I know, this still works and will continue to work.

Leave a like!


Hidden Content
You must register or login to view this content.

I am currently not selling anything. Beware of impersonators.
This post is by a banned member (Domination) - Unhide
74
Posts
2
Threads
3 Years of service
#2
This is actually very nice, any Idea how to make the best use of it? Thanks hq post
This post is by a banned member (Islam009) - Unhide
This post is by a banned member (Enum55) - Unhide
This post is by a banned member (mobic65521) - Unhide
This post is by a banned member (Hammyy) - Unhide
This post is by a banned member (devitotivol) - Unhide
This post is by a banned member (aiocheckersss) - Unhide
6
Posts
0
Threads
3 Years of service
#8
very cool

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: 8 Guest(s)