![]() ![]() If this was your alt account and you are concerned about it, I suggest you just delete it. What this could of done is sent your token to the attacker or setup to intercept your network requests from discord (ie. That was pretty stupid if you did not understand the code. Another problem could be the code you might have pasted into console that gives you your token. I'm not great at malware or mischievous software, but to remove it, probably reinstall your OS like mentioned by bluewave41. If you ran the code locally on your computer then it could of downloaded scripts that remain on your computer that refresh every time your token changes. The simple fix is to stop running the code. Therefore, they constantly have access to your account. How to Handle 26-Byte Secret for Time-based One Time Password Google Colab - Google Drive cant be mounted anymore - Browser Popup (Google. What must be happening here is that you keep putting your user token in the replit to run the code, and every time you run the code, it's sending your token to the attacker. NEVER trust any code asking for your user token that you don't understand. For it to work the user needs to understand what they've just done and the general Discord user will not be technical enough for this. That exact reason is why implementing a button to regenerate your token doesn't make sense. A Discord Token Grabber (educational purposes only) The new discord update now stores your token encrypted. The reason mass DM clients work is because people don't realize they've just given their token away. Send the script to your victim and make them run it. Obfuscate the code or install it as a backdoor in an other script. Change the ‘WEBHOOKURL’ variable value to your Discord webhook URL in TokenGrabber.py. Now you need to ask yourself: is someone who is dumb enough to scan a random QR code and ignore all the very obvious warning messages given to them smart enough to realize they gave their token away? How to use: Create a webhook on your Discord server. You cannot (bar some crazy zero day exploit) get someone's token by simply sending them an image without any interaction. Now by image token grabber I have to assume you're referring to QR codes. ![]() ![]() If someone was to run an unknown malicious script they need to change their password which changes their token. There is no telling what this script may have done. First off, the console already has a very large clear warning deterring anyone from running an unknown script. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |