Activity
Mon
Wed
Fri
Sun
Dec
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
What is this?
Less
More

Memberships

Anonymous

Public • 2k • Free

91 contributions to Anonymous
For the people who don't like Discord Bot RAT's
I started coding with VB.Net almost 18 years ago - by that I'm surely a lot older than the rest in here. I usually don't deal with that stuff, especially the low quality crap floating around for free - or even worse being sold out there. A thing I've recently found was a RAT, that is NOT controlled by a panel, instead the actor is using a discord bot and monitoring the connection with slash commands. I'm not one of those active discord users, anyways I knew enough about their API to "exploit" the bot and abuse the fact that they use discord. The Idea: Reverse engineering the Bot token such as the actor's server id out of the malicious executable and abusing the bot In the first picture you can already see the bot token and Server-ID. As imagined, the developers didn't put much afford into protecting it so this got no security at all. And that's already enough information, time to think about a second step. You can of course spam the bot, but it's more funny to make the bot invite us to the server. My python skills are really bad, but the script works: import discord from discord.ext import commands intents = discord.Intents.default() bot = commands.Bot(command_prefix='!', intents=intents) @bot.event async def on_ready(): print(f'{bot.user} connected') server = bot.get_guild(int('')) invite_link = await server.text_channels[0].create_invite(max_age=0) print(f'{invite_link}') bot.run('') If there are any issues feel free to ask for help, someone will possibly help you They ended up banning me, but don't forget, since the discord bot is creating a channel for every victim it got administrator permissions which are enough to make a script that unbans you import discord from discord.ext import commands intents = discord.Intents.default() bot = commands.Bot(command_prefix='!', intents=intents) @bot.event async def on_ready(): print(f'{bot.user} connected')
35
35
New comment Aug 22
For the people who don't like Discord Bot RAT's
0 likes • Jul 28
@Camari Jamar possible
0 likes • Aug 4
@Camari Jamar I even joined your discord server. But you threw me out You posted it on GitHub
RAT
Quasar Rat or Xeno Rat. Which is better?
1
5
New comment Jul 19
1 like • Jul 9
Quasar is stable but old, Xeno is newer but unstable and bugged. Your choice, you can also remote execute the other payload any time
0 likes • Jul 19
@Vexxed D none of them. They are your internal IP addresses and won't get a connection
BYPASS PAYPAL VERIFICATION
HOW TO BYPASS PAYPAL VERIFICATION OR QUICK SECURITY CHECK
1
1
New comment Jul 9
0 likes • Jul 9
You need a OTP bot or an exploit. But I guess the exploits are patched
Want to make an exe file undetectable.
I want to make a rat file from Quasar 1.4.1 undetectable. It is made from C# and is open source. I don't know where to start with this. any help would be great. https://github.com/quasar/Quasar
0
13
New comment Jun 30
0 likes • Jun 30
@Ignredient Consumer https://hackforums.net/member.php?action=profile&uid=5420967
0 likes • Jun 30
@Shadow Keter antivirus will just delete it.
Why is RSA far more used than ECC even though ECC is more secure with the same key size?
I don't get it. Why is ECC not used more than RSA if it is more secure, faster, and uses fewer server resources?
0
4
New comment Jun 15
0 likes • Jun 15
RSA has been the standard for secure data transmission for a longer time, even if ECC offers stronger security with smaller key sizes and faster processing times
0 likes • Jun 15
@Idan Code well there are also other reasons, but this is the main
1-10 of 91
Ben Crobbery
4
10points to level up
@ben-crobbery-4082
Psych, Crime, International, Est 1989 Telegram: @DeathDealer187 The ONLY RELab Admin

Active 12d ago
Joined Feb 27, 2024
Alaska
powered by