"Breaking Open" A Discord Nitro Generator

Поделиться
HTML-код
  • Опубликовано: 21 дек 2024

Комментарии • 1,6 тыс.

  • @D0Samp
    @D0Samp Год назад +927

    The best part is that even if they had rolled a valid gift code by dumb luck, it wouldn't have detected it. There's a typo in the API call ("entitelemnts" instead of "entitlements") which will always return a 404.

    • @alex59292
      @alex59292 Год назад +26

      fr but also ntts could of just used run function on code and print the run function to get code source

    • @electra_
      @electra_ Год назад +24

      @@alex59292 might be a bad idea since it could be malware of some kind

    • @alex59292
      @alex59292 Год назад +4

      @@electra_ hes using repl so who cares

    • @LiEnby
      @LiEnby Год назад +6

      @@alex59292 protip; replace 'exec' with 'print' lol

    • @alex59292
      @alex59292 Год назад +1

      @@LiEnby print boring

  • @xapnaxx
    @xapnaxx 2 года назад +6514

    imagine buying nitro and it gets claimed by a random person you dont even know 😂

    • @wy477x
      @wy477x 2 года назад +626

      that actually happened with a steam gift card i got for christmas one time and it sucks

    • @panshul520
      @panshul520 2 года назад +184

      The only giveaway I won was of discord Nitro and just that happened

    • @imnotmarbin
      @imnotmarbin 2 года назад +120

      It's virtually impossible for that to happen, sure there's an infinitesimal probability, but it's not going to happen.

    • @fog-
      @fog- 2 года назад +166

      @@imnotmarbin it must have happened before, lots though, if you managed to generate a nitro gift lift, there was an author who bought the gift lol

    • @awesomeman6948
      @awesomeman6948 2 года назад

      @@imnotmarbin it was a joke you smellfungus

  • @cirkulx
    @cirkulx 2 года назад +5907

    So technically, they are just using kids to make free gift links by making them host it. What a genius plan.
    Edit 30/12/22: While executed poorly.

    • @edmarcthegreat
      @edmarcthegreat 2 года назад +483

      child labour

    • @cirkulx
      @cirkulx 2 года назад

      @@edmarcthegreat free nitro child labour

    • @gnomeslayah
      @gnomeslayah 2 года назад +178

      @@edmarcthegreat best invention

    • @ligmaballs1953
      @ligmaballs1953 2 года назад +30

      @@gnomeslayah lol

    • @spocite
      @spocite 2 года назад +68

      @@edmarcthegreatbest invention since sliced bread

  • @dolfies
    @dolfies Год назад +731

    The funniest thing is that there's a typo in the API endpoint, meaning it would never recognize it even if you do manage to generate a valid code.

    • @justnathan_4087
      @justnathan_4087 Год назад +29

      didn't even notice LOL

    • @oclxtch9376
      @oclxtch9376 Год назад +5

      whats the typo?

    • @andrew3606
      @andrew3606 Год назад +47

      @@oclxtch9376 "entitelemnts"

    • @okRoadToSubs
      @okRoadToSubs Год назад +19

      @@andrew3606 the coder misspelled entitlements lmao

    • @Theunicorn2012
      @Theunicorn2012 Год назад

      The funniest thing is that there's a typo in the API endpoint, meaning it would never recognize it even if you fo manage to generate a valid code.

  • @Oreoezi
    @Oreoezi 2 года назад +949

    What fascinates me is it takes the time to write all possible codes to a txt file instead of just creating one, testing it and moving on to the next.

    • @ikyyntts7807
      @ikyyntts7807 2 года назад +162

      what also fascinates me is HOW theyre generating them. the odds that a fully random string of letters is a nitro code is so unholily low, that if they were to put a minutes research in to see how nitro codes are compiled and try and systematically generate random codes, they would atleast have a chance at getting one.

    • @Oreoezi
      @Oreoezi 2 года назад +23

      @@ikyyntts7807 if the code is 6 letters long and it can be a combination of letters and numbers that would be 6 to the power of 12 more or less. It is very unlikely to say the least.

    • @Houtblokje
      @Houtblokje 2 года назад

      @@ikyyntts7807 I think these guys are in the range of being juuuuussssttt smart enough to write a scammy brute force code but just dumb enough to not put in any more effort in figuring out codes

    • @fog-
      @fog- 2 года назад +27

      @@ikyyntts7807 nitro gifts are much different, they're 6-8 characters long

    • @ikyyntts7807
      @ikyyntts7807 2 года назад +58

      @@fog- ah right, just an insight, apologies. but you could have also ACTUALLY utilised threading to have one thread continually generate codes and throw them into a pool, have a thread or two checking the codes. or something like that, either way the guy who made this one clearly doesn't have a clue what he's doing

  • @cutzudev
    @cutzudev 2 года назад +2072

    NTTS becoming an actual programmer after debunking all these scams 💀

  • @Marcozzz8
    @Marcozzz8 2 года назад +52

    The mwah ! at the end is always appreciated, love what you do !

  • @insig0
    @insig0 2 года назад +1586

    I seriously think that ONLY underage discord users fall for nitro generators. Also, I still cant believe that such low human beings exist, USING kids that don't know anything to get nitro. What a disappointment.

    • @izzyxvibes
      @izzyxvibes 2 года назад +21

      Yeah… I once downloaded one and it was an exe, but it is on my phone. And it came up with nsfw pop ups but I didn’t click any of them. Then I downloaded malwarebytes and they got rid of it lol. It was back in 2020 I believe . But I’m 13+ now since my bday was months ago, joined discord in 2018 but probably earlier since I had another acc

    • @rarehyperion
      @rarehyperion 2 года назад +48

      @@izzyxvibes I think you downloaded the wrong generator... you sure it said nitro?

    • @insig0
      @insig0 2 года назад +6

      @@rarehyperion FOR REAL that NSFW popup stuff is so annoying

    • @izzyxvibes
      @izzyxvibes 2 года назад +2

      @@rarehyperion ye it was for a pc tho. I have pc glad I didn’t download it on their

    • @Hexarian
      @Hexarian 2 года назад +1

      AAAAQwAAAGEAAABsAAAAbAAAACAAAABpAAAAdAAAACAAAABhAAAAIAAAAGQAAABpAAAAcwAAAGEAAABwAAAAcAAAAG8AAABpAAAAbgAAAHQAAABtAAAAZQAAAG4AAAB0AAAAIAAAAGEAAABsAAAAbAAAACAAAAB5AAAAbwAAAHUAAAAgAAAAdwAAAGEAAABuAAAAdAAAACwAAAAgAAAASQAAAHQAAAAnAAAAcwAAACAAAABlAAAAYQAAAHMAAAB5AAAAIAAAAGEAAABuAAAAZAAAACAAAABmAAAAdQAAAG4AAAAgAAAAdAAAAG8AAAAgAAAAdQAAAHMAAABlAAAALAAAACAAAABJAAAAJwAAAHYAAABlAAAAIAAAAHUAAABzAAAAZQAAAGQAAAAgAAAAbQAAAGUAAAB0AAAAaAAAAG8AAABkAAAAcwAAACAAAABsAAAAaQAAAGsAAABlAAAAIAAAAHQAAABoAAAAZQAAAHMAAABlAAAAIAAAAGIAAABlAAAAZgAAAG8AAAByAAAAZQAAACAAAABhAAAAbgAAAGQAAAAgAAAAcwAAAGEAAABmAAAAZQAAACAAAAB0AAAAbwAAACAAAABzAAAAYQAAAHkAAAAgAAAASQAAACcAAAB2AAAAZQAAACAAAABtAAAAYQAAAGQAAABlAAAAIAAAAGEAAAAgAAAAZgAAAGUAAAB3AAAAIAAAAGIAAAB1AAAAYwAAAGsAAABhAAAAcgAAAG8AAABvAAAAcwAAACAAAABmAAAAcgAAAG8AAABtAAAAIAAAAGkAAAB0AAAALg==
      UTF-32

  • @TaxEvasion1337
    @TaxEvasion1337 2 года назад +530

    funny thing is they don't even use threading

    • @itswilliboy7054
      @itswilliboy7054 2 года назад

      lol

    • @SyberiaK
      @SyberiaK 2 года назад

      I thought I'm the only one who noticed that lol

    • @electricz3045
      @electricz3045 2 года назад +38

      This script is memory heavy (file writing) so if they would implement threading it wouldn't be great as threading is for I/O tasks (like API requests but without mass file open, writing, closing) for these memory heavy tasks they should use multiprocessing where a process on each CPU is spawned. However i assume that they are too stupid to understand multiprocessing, they also could use threading with the queue function and not directly writing to file.

    • @radon-sp
      @radon-sp 2 года назад +33

      @@electricz3045 them writing them to a file instead of doing it in memory is the funniest shit ever

    • @v01d_r34l1ty
      @v01d_r34l1ty 2 года назад +1

      @@electricz3045 It would definitely still have a performance benefit. I think you can spawn as many threads as your CPU supports without any performance hitch so at some point the threads would theoretically spawn on separate cores and max out the performance. Also, while sockets operate more internally (memory) for Windows, they are file-based I/O on Unix based systems (i.e. FreeBSD, macOS, Linux). Nevertheless, randomly generating a string based on random numbers seeded by time (standard random generator) is going to be wholly inefficient as it won't come near to producing similar results as a more complex cryptographically safe algorithm.

  • @PokeHearts
    @PokeHearts 2 года назад +381

    I love videos like this, especially you running through the steps you took

    • @Theunicorn2012
      @Theunicorn2012 Год назад

      I love videos like this, especially you running through the steps you took

    • @Thedaisyda1sy
      @Thedaisyda1sy 6 месяцев назад

      I love videos like this, especially you running through the steps you took

  • @oxymoreproducer
    @oxymoreproducer Год назад +43

    This is honestly hilarious, I can't not imagine the thought process : "Hey let's bruteforce nitro links. But we'll make gullible kids do it for us instead." Genuinely a modern supervillain, I love it lmao

  • @arpita1shrivas
    @arpita1shrivas 2 года назад +311

    as a python programmer myself
    it's genuinely so funny to see a person try to encrypt their code only for it to be decrypted by a person who doesn't even code (much i think)
    hilarious. i want more of these videos.

    • @racapadexxa_
      @racapadexxa_ 2 года назад +23

      At the end of the day the interpeter has to see clear code, so you just replace whatever eval() or run() function with a print() and it's all useless

    • @novamc7945
      @novamc7945 2 года назад +6

      @@racapadexxa_ Exactly. The code is being decoded for you, so just print it instead of doing the job of the interpreter (which is already laid out)

    • @declan_youtube
      @declan_youtube 2 года назад +10

      This is incredibly one-sided but as a C++ developer it pains me to see someone try to obfuscate python

    • @SpaceKebab
      @SpaceKebab 2 года назад +1

      @@declan_youtube im sorry for you.. c++ its a horrendous language to learn

    • @declan_youtube
      @declan_youtube 2 года назад +10

      @@SpaceKebab It's incredibly over-exaggerated on how hard it is to learn tbh, you just gotta get used to stupidly named functions and stupid symbols like >

  • @nerdporkspass1m1st78
    @nerdporkspass1m1st78 Год назад +35

    Your interest in Discord is contagious, and it’s actually making me more interested in Discord drama, breaking news and technicalities. You’re more interested than me, and I use Discord every day.

    • @Theunicorn2012
      @Theunicorn2012 Год назад +1

      Your interest in Discord is contagious, and it’s actually making me more interested in Discord drama, breaking news and technicalities. You’re more interested than me, and I use Discord every day.

    • @RWPWarThunder
      @RWPWarThunder 2 месяца назад

      Your interest in Discord is contagious, and it’s actually making me more interested in Discord drama, breaking news and technicalities. You’re more interested than me, and I use Discord every day.

    • @nerdporkspass1m1st78
      @nerdporkspass1m1st78 2 месяца назад

      @@RWPWarThunder STOPPP WTF

    • @Georgia_Sakartvelo
      @Georgia_Sakartvelo 12 дней назад

      Your interest in Discord is contagious, and it’s actually making me more interested in Discord drama, breaking news and technicalities. You’re more interested than me, and I use Discord every day.

  • @agnieszkazint2799
    @agnieszkazint2799 Год назад +8

    Hey No Text To Speech,
    I'm a big fan of your RUclips channel. I love your informative and entertaining videos about Discord and other social media platforms. I'm also impressed by your commitment to helping people avoid scams and stay safe online.
    Keep up the great work!
    Sincerely,
    Bard

  • @dpadamm
    @dpadamm 2 года назад +55

    I'm not too completely sure on how this all works, but you explained it really well! It was also interesting to watch for some reason, and fulfilled the promise of it being satisfying. Thank you for entertaining 9 minutes of my day lol.

    • @kamisama7462
      @kamisama7462 Год назад +2

      Learn python buddy, it's fun and easy

    • @Theunicorn2012
      @Theunicorn2012 Год назад

      I'm not too completely sure on how this all works, but you explained it really well! It was also interesting to watch for some reason, and fulfilled the promise of it being satisfying. Thank you for entertaining 9 minutes of my day lol.

    • @dpadamm
      @dpadamm Год назад

      @@Theunicorn2012 bro?

    • @alikeremozfidan288
      @alikeremozfidan288 Год назад

      it has two steps: first code is just encoded junk filled with comments, he decodes and gets to actual code.
      then, second code just takes a random guests to find a random nitro gifts. they verify the gift code and if it actually works, it will sent to programmer instead
      it uses your computer as nitro code miner

  • @Master_YT
    @Master_YT 2 года назад +556

    Moral of the Story: Child Labour is the best way to do anything.

    • @jenkathefridge3933
      @jenkathefridge3933 2 года назад +32

      Ohhhh,thats how china makes alot of money.

    • @Wuzzy69
      @Wuzzy69 2 года назад +10

      This comment reminded me of minute movies

    • @Sockren
      @Sockren 2 года назад +16

      thats why roblox is the best platform ever

    • @thecatacombhimself
      @thecatacombhimself 2 года назад +6

      Nestle:

    • @ShiroCh_ID
      @ShiroCh_ID 2 года назад +2

      @@Sockren true true
      we just need to milk Parrents Money Using Child as the Proxy
      trully magnificent strategy that almost nobody relised

  • @siyustuff213
    @siyustuff213 Год назад +105

    i love how they spend all this effort cloaking the code in like 3 layers as if anybody who will actually fall for the scam is going to look closely at the code

    • @-_lIl_-
      @-_lIl_- Год назад

      I think they do this just so that people don't find out and be able to not fall for it or report them

    • @Edvit40
      @Edvit40 Год назад +2

      what happens in the dark, must never come to the light

    • @originalni_popisovac
      @originalni_popisovac Год назад

      weirdo

    • @vnc.t
      @vnc.t Год назад +3

      and they coded the thing wrong too so it doesn't even work

    • @Edvit40
      @Edvit40 Год назад

      @@vnc.t sir
      they did code it right
      its a scam
      obviously they're gonna take advantage of it

  • @dhi_holo
    @dhi_holo 2 года назад +17

    Making the code readable is basically just simple puzzle solving, I'd see this in an escape room that lets decoder sites be used, kinda thing

    • @xc_gwpl
      @xc_gwpl Год назад

      CTFs are basically that!

  • @MINDisOFF
    @MINDisOFF Год назад +7

    bro got the all the spirit elements😭 4:51 love,trust,god,eval,magic

  • @ciach0_
    @ciach0_ 2 года назад +4

    7:33
    Also, there is a typo which says "entitelemnts", so this has no chance to work

  • @OceanMalibuClub
    @OceanMalibuClub 2 года назад +349

    Discord is a place without safety and privacy

    • @nanami-p5b
      @nanami-p5b 2 года назад +8

      Good point

    • @foxmulder3833
      @foxmulder3833 2 года назад +5

      True

    • @insig0
      @insig0 2 года назад +10

      Never has been.

    • @lystid
      @lystid 2 года назад +38

      It's the users fault if they run some random files on the internet

    • @cllncl
      @cllncl 2 года назад +27

      That applies to almost everything, ever. As long as you have even a single brain cell, you cannot fall for some guy saying he can get you free stuff.

  • @GuardianIsIdiot
    @GuardianIsIdiot 2 года назад +29

    I nearly got scammed by a bit saying they would give me discord nitro, I had watched your video on it before and I managed to avoid it. Thanks!

    • @fusseldieb
      @fusseldieb Год назад

      Nobody ever is gonna get you Discord Nitro for free. If you trust somebody RANDOM, you already messed up.

    • @GuardianIsIdiot
      @GuardianIsIdiot Год назад +2

      @@fusseldiebnot for free, i missed this out, they were a friend and said it was a 80% discount. I found out later that my friends account was hacked

    • @Dreagerd
      @Dreagerd Год назад

      @@fusseldieb i literally got free nitro 2 times from random people 😭

  • @NorthLaker
    @NorthLaker 2 года назад +24

    The method they're using technically does work, but only for the first few times you try the request. After that you'll get rate limited to hell and back, and sending even more requests (say, 999995 of them) might actually get your IP banned from Discord altogether.

    • @Versuffe
      @Versuffe 2 года назад +16

      its a situation where you lose no matter what.
      1: you dont get a working code.
      2: you get a working code, it is traced back to you.
      3: its detected as a ddos, literally banning you from the website if the ip is found.

    • @justanerdywoman7785
      @justanerdywoman7785 Год назад +2

      you won't be banned, since, they have proxies in there, which means, you won't be banned, but proxies will be banned, as you still don't get banned.

    • @LiEnby
      @LiEnby Год назад +1

      ive sent like 3000 requests to discord before, you dont get banned you just get heavily rate limited (which, if you think about it, is basically a temporary ip ban)

  • @caplushymori
    @caplushymori Год назад +1

    2:29(when you run out of words to say) * ntts * "so my computer is a little "drunk""

  • @matthrew
    @matthrew 2 года назад +168

    imma be honest, you would be a pretty good python teacher

    • @racapadexxa_
      @racapadexxa_ 2 года назад +21

      For shure better than the one who wrote the code

    • @JamesRelok
      @JamesRelok 2 года назад +6

      how lmao what he said was so basicthat someone that doesnt even know python could do it lmao

    • @nubidubi23
      @nubidubi23 2 года назад +13

      @@JamesRelok 🤓🤓🤓

    • @spline5243
      @spline5243 2 года назад +4

      @@nubidubi23 "someone is smarter than me"

    • @dustin0001
      @dustin0001 2 года назад +1

      *Concatenation*

  • @catnap7656
    @catnap7656 Год назад +3

    this is like the guy from Willy Wonka making his workers find a golden ticket from millions of chocolate bars and they can't even keep it for themselves

  • @corruptor55
    @corruptor55 Год назад +3

    Although you said the process was easy, the fact that you de-compiled all that code to prove why these "nitro generators" are scams is commendable. There definitely needs to be more awareness about said scams, as the phrase "don't accept random links from strangers" unfortunately isn't common knowledge...or not enough people care to double-check. Either way, feel free to keep making these kinds of videos; I'm gonna need this information at some point o-o _/ /

  • @FlashDrive356
    @FlashDrive356 2 года назад +31

    5:04 Wow, RUclips's compression algorithm _really_ didn't like that

  • @fallgate
    @fallgate 2 года назад +16

    Btw in terms of this crypted code, that is pyarmor obfuscator and in some point in time it has all the code in string so i just run this in pycharm community with debug points at last lines and go line by line until it has a variable with the text
    It could also be rewritten a little to just spit out plain decoded text when ran

    • @xAffan
      @xAffan 2 года назад +1

      Dude smart!

    • @Mythitie
      @Mythitie Год назад

      @@xAffan Average programmer stuff.

    • @xAffan
      @xAffan Год назад +1

      @@Mythitie doesn't work if it's compiled to pyc. And there are no public decompilers so L

    • @vuki4653
      @vuki4653 Год назад

      @@xAffan there are public ones

    • @xAffan
      @xAffan Год назад +1

      @@vuki4653 not for 3.8+ / also weird seeing u here

  • @Rayanvision
    @Rayanvision 2 года назад +3

    Lmao the mwah at the end gets me everytime, it's weirdly sweet

    • @HyperNovva
      @HyperNovva 2 года назад

      I make sure to pause the video like 10 seconds before the end because of that outro. Everyone loves it but it grosses me out.

  • @theloper19
    @theloper19 Год назад +11

    Theoretically, if this DOES actually get a few valid ones and sends it to the random skiddies, you could tweak the code a bit and actually send it to your own webhook, basically giving you an actual free nitro generator.

    • @_KDP
      @_KDP Год назад

      or just make it show it on your screen lol

    • @Lukboo
      @Lukboo Год назад

      its easier just to literally make it send to your webhook@@_KDP

  • @cgytrus
    @cgytrus 2 года назад +2

    2:20 the proper way to do this is by using find and replace: ctrl+h, search mode: regular expression, search for "^#.*", replace with ""

  • @2fas_lol
    @2fas_lol 2 года назад +53

    Technically, you could fork it and change the webhook to your webhook, so it sends YOU the working nitro INSTEAD of the random people.

    • @racapadexxa_
      @racapadexxa_ 2 года назад +6

      Yea the only problem is that the code to generate the code doesn't work

    • @Squiidgy
      @Squiidgy Год назад +1

      oh wow 😂

    • @BostYT
      @BostYT Год назад

      @@racapadexxa_ It does but it is a very slight chance

    • @IanGaming101HD
      @IanGaming101HD Год назад +7

      @@racapadexxa_ it does, it validates it through discords api until it finds a valid gift so yes you can just make it send to you instead of the webhook

    • @racapadexxa_
      @racapadexxa_ Год назад +4

      @@IanGaming101HD Yes good luck with a one in a several trillion possibilities to get one code

  • @in1
    @in1 2 года назад +5

    This is just beautiful code. Love the names of the variables

    • @Fuofff
      @Fuofff 2 года назад

      Lmao just saw the names

  • @DragoNate
    @DragoNate 2 года назад

    "My brain barely works half the time, *_EXSPHESHLY_* when..."
    yup. I concur, good ser.

  • @brandensnow990
    @brandensnow990 Год назад +6

    the best part: all you have to do to get the "gift link" yourself is make a webhook and change the link after you deobfuscate it

    • @racapadexxa_
      @racapadexxa_ Год назад +1

      And find the 1 in multiple billions change to generate a working code before Discord bans your IP from their site

  • @goncalomarinho8478
    @goncalomarinho8478 2 года назад

    Roockie mistake that verification system to the gift codes will just be timed out after like 5 tries. They should use some way to mask the ip. Also this type of system of brute force can run for a full year without find anything.
    Anyways great video!

  • @varram3488
    @varram3488 2 года назад +4

    6:00 the worst attempent at obfuscation i have seen lmao

  • @MustaDevOld
    @MustaDevOld 2 года назад +1

    I've heard of hackers getting bitcoin by hacking a computer, but never heard of someone mining for a Nitro gift by making kids find the gifts for them.

  • @TroyGalviz
    @TroyGalviz 2 года назад +510

    I love scams

    • @wevboo
      @wevboo 2 года назад +5

      amen

    • @deadeye8333
      @deadeye8333 2 года назад +48

      Nah u an indian 100 percent

    • @apersoniguess_
      @apersoniguess_ 2 года назад +41

      @ArkkOfSpark! do you?

    • @SpectraMoyai
      @SpectraMoyai 2 года назад +12

      @@deadeye8333 this man right here is clearly an american

    • @elnexreal
      @elnexreal 2 года назад +1

      @@deadeye8333 XDDD

  • @pendragonscode
    @pendragonscode 2 года назад

    "this is basic obfuscation", once you sit in the ghex editor and a bunch of shit to just try to find something wrong in a NES game. That said, nice video.

  • @kormagogthedestroyer
    @kormagogthedestroyer Год назад +4

    Imagine setting up a scam and not even going through the effort of making 5 different alts

  • @vrl2012new
    @vrl2012new Год назад

    Fun Fact:
    In Python, to add a note you need to add # or #[space] (can vary I think idk I’m new to Python) to create a note which doesn’t count as code which means the code shown at 2:02 is probably fake.
    Oof I messed up the spelling of “space”
    Also uhh a lot of the “[name]=“ stuff and “[“[int]/[value]”]” are just variable text.
    IGNORE THIS COMMENT AS I MAY BE WRONG!

    • @patrickFREE.
      @patrickFREE. Год назад

      Yes it is not necassary, at the top yoh see a line without '#' and atart with import requests.
      The code works from the syntax side

  • @akii9553
    @akii9553 Год назад +7

    why the hell did this turn into a computer science lesson bro im on holiday

  • @SolarKid123
    @SolarKid123 Год назад

    3:33
    rot13 is actually a letter substitution cipher, which replaces a letter with the 13th letter after it! Hope this helps!

  • @tonyt2i512
    @tonyt2i512 2 года назад +9

    its like giving your 20 years of luck to someone else lol

  • @machiamavlad
    @machiamavlad Год назад

    that part when you were decompiling his code was the best programming tutorial for sure

  • @Liggliluff
    @Liggliluff 2 года назад +8

    These generators generate 16-character long links out of 60 possible characters. That's 60^16 possible links. That's 2,8 x 10^28 different codes.
    So if you have a server with 10000 users who all generate 100000 codes, that means the number is now 2,8 x 10^19. The likelyhood that you manage to get a real code is so tiny.
    But I do still think Discord could increase this by making the links 32 characters. Because while the likelyhood is already small, it's not small enough for these people. Making it 32 characters long, makes it so small that it's not even worth even trying.

    • @rayanalbozan5576
      @rayanalbozan5576 Год назад +1

      That would be the case if there was only one code. Of cource there is way more but still, it will be extremly rare for someone to hit the jackpot and get nitro for free

  • @billyfromzera4162
    @billyfromzera4162 2 года назад +2

    Nice explain, Shit like this happen really often and... Sometimes they send a software. I analysed it with the fantastic linux ubuntu terminal (i didn't decoded it cause i wanted to have some stuff like the pyinstaller), and it litteraly the same as this shit but in a software with a virus that litteraly take your discord token from your discord application. Well cya stay safe!

    • @declan_youtube
      @declan_youtube 2 года назад

      May I ask what you mean by "I didnt decode it because I wanted pyinstaller"? But other than that, cool

    • @billyfromzera4162
      @billyfromzera4162 2 года назад

      @@declan_youtube i analysed the malware with the terminal and i found what pip (pyinstaller) he used and sum other things with commands

    • @declan_youtube
      @declan_youtube 2 года назад

      @@billyfromzera4162 how can you analyze a python sample without even using vim or a text editor? Especially for a pyinstalled sample

    • @billyfromzera4162
      @billyfromzera4162 2 года назад

      @@declan_youtube linux provide that + i used the notepad AND i runned it via the terminal

  • @flizzycat
    @flizzycat 2 года назад +46

    I like how this technically isn't really a scam. As in, it won't steal your token, join servers for you or something like that. In theory this can work although chances are probably very very small

    • @NinjaKiwiOfficial
      @NinjaKiwiOfficial 2 года назад +4

      And you could change the python at the end so if a code is SOMEHOW found, it would just show it for you

    • @spacexplorer_
      @spacexplorer_ 2 года назад

      Potrošački savetnik

    • @jakethebeest2376
      @jakethebeest2376 2 года назад +14

      its still a scam, just stealing your computers processing power to generate random nitro links. and spamming discords api in your name. it wouldn't be a scam if it gave you the code if it did find it, but it doesn't it just gives it to the programmer

    • @flizzycat
      @flizzycat 2 года назад

      @@jakethebeest2376 can discord ban you for that?

    • @flizzycat
      @flizzycat 2 года назад

      @@spacexplorer_ 👀

  • @AS90VR
    @AS90VR Год назад

    bro the voice crack in min 6:18 was hilarious 😂

  • @SamuraiDestroy
    @SamuraiDestroy 2 года назад +8

    8:05 OK but this does mean that if someone was really desperate for free nitro, they could rewrite the code to NOT send the valid codes to the webhook and instead have it print them. I know what I must do.

    • @NichtDu
      @NichtDu 2 года назад

      No because they will notice your ip/account spamming the api endpoint and ban you

    • @NichtDu
      @NichtDu 2 года назад +3

      + it is mathematically impossible to generate a valid code during your lifetime

    • @xXXEnderCraftXXx
      @xXXEnderCraftXXx 2 года назад

      XD same thing that I tought.But this is still a mean thing to do.By using those somehow revealed links you are stealing nitro gifts from people.

    • @ParadiseReserve
      @ParadiseReserve 2 года назад

      thts wht i was thinking lmfao

    • @vineeeeed9342
      @vineeeeed9342 2 года назад

      @@NichtDu it doesnt use your account when checking, and you could add a 1s delay for each link
      But nitro generators never work so dont even bother

  • @Primatecage
    @Primatecage Год назад

    yo fella i appreciate this kinda content keep it up!

  • @nikoijp
    @nikoijp 2 года назад +6

    Edit the code so that nitro codes generated that don't work gets sent to them so it spams them with invalid codes.

  • @mochithegodboss
    @mochithegodboss Год назад

    wow the deobfuscating the code just got me so into coding even in it was really simple, thats such a cool skill to have and to understand code

    • @Pyrolite
      @Pyrolite Год назад +1

      Well in this case, whoever 'developed' the program sucks at encrypting it and you can directly tell what cipher it is from the code. Everything else is basic python with a questionable generation method

  • @Faketreno
    @Faketreno 2 года назад +158

    Just change the weebhook link so you send nitro to your own weebhook 🤷

    • @snuz
      @snuz 2 года назад +18

      Genius.

    • @Bl4n
      @Bl4n 2 года назад +3

      good idea lmao

    • @tenidiotaodpizzy4603
      @tenidiotaodpizzy4603 2 года назад +3

      so you can just edit the code however you want?

    • @alex59292
      @alex59292 2 года назад +17

      @@tenidiotaodpizzy4603 you can but since the repl is owned by them changes to there repl wont work

    • @Roy28_29
      @Roy28_29 2 года назад +31

      @@alex59292 then run the code in your own python, if you trust it

  • @nnou
    @nnou 2 года назад

    7:35 "entitelemnts" thats totally a valid endpoint

  • @funwithalbi2425
    @funwithalbi2425 2 года назад +9

    you seem like a good programmer since everything you did was correct

    • @giakhanhvn2mc
      @giakhanhvn2mc Год назад +1

      absolute unnecessary bullshit, just change the exec, eval to print and the code will print out without going through any of these crap, interpreted python is a hot piece of garbage in terms of security

    • @funwithalbi2425
      @funwithalbi2425 Год назад

      @@giakhanhvn2mche was trying to obfuscate it

    • @giakhanhvn2mc
      @giakhanhvn2mc Год назад +1

      @@funwithalbi2425 unnecessary steps, he can just replace all exec to print, it will spit out the code instantly, no hassles

  • @MajinManju
    @MajinManju Год назад +1

    I love videos like this because it takes away this façade hackers have, that they are some type of coding god or mastermind, but in reality its just garbage code packaged in a different way.

  • @vvv331
    @vvv331 2 года назад +7

    I really love how satisfying it is to bruteforce poorly obfuscated code, i once did that with one of the exploits and it was poorly obfuscated that most of obfuscation was redirecting to unobfuscated source code.
    It's honestly funny seeing how their obfuscation just miserably fails and ends up exposing source code. Also, I'm pretty sure everyone know that you would never run something that's obfuscated so, it makes it even funnier.

    • @Hexarian
      @Hexarian 2 года назад

      I'd like to see you try bruteforce our code.

    • @alex59292
      @alex59292 2 года назад

      @@wnuggy ikr base 64 isnt obfuscation

    • @pwrsocket
      @pwrsocket 2 года назад

      L furry

    • @declan_youtube
      @declan_youtube 2 года назад

      ​@@Hexarian May I try?

    • @Hexarian
      @Hexarian 2 года назад

      @@wnuggy It's not, Do you think I'm that stupid? Please remember that I do not have your brain in my skull.

  • @magnum_dingus
    @magnum_dingus Год назад +1

    My guy, you need some CyberChef chef in your life.

  • @rage3288
    @rage3288 Год назад +4

    0:07 IS THAT THE JENNY MOD FOR MINECRAFT SERVER?!?!?!?

  • @user-xr7fw4ks2n
    @user-xr7fw4ks2n 2 года назад +4

    if you de-obfuscated it, couldn't you just remove the bit where it asks discord's api "Is this code legit" and treat EVERY code it generates as legit, such that they receive a bunch of useless links?

    • @declan_youtube
      @declan_youtube 2 года назад

      Yes, but we have no way of contacting the webhook they use to receive the messages

    • @elnexreal
      @elnexreal 2 года назад

      @@declan_youtube actually we have, you know if you have access to the webhook link you can send anything you want into it. You can do this by coding a script or by using tools like discohook

    • @declan_youtube
      @declan_youtube 2 года назад

      @@elnexreal Yes, but the webhook in this sample is dead - so we still cannot contact the webhook being used

  • @NoahtheEpicGuy
    @NoahtheEpicGuy Год назад

    Code obfuscation and written in a super modern high level language? Wow, that's original.
    Assemblomaniacs have had you all beat for _centuries_

  • @tixonochek
    @tixonochek 2 года назад +10

    I ran quite a lot of nitro generators without even knowing what perks were in the past. Fortunately i changed OS few times.

    • @TheyCallMeIce
      @TheyCallMeIce Год назад +4

      Not kid me believing all the "survey/app tasks for cash" apps, AND downloading a code generator for one of these...

  • @wingswlani
    @wingswlani Год назад

    0:03 one time I was actually at one of those Santa things when I was like 9, I asked for my dad back, and the Santa dude just said “did he run away?”

  • @barry63196
    @barry63196 2 года назад +4

    8:18 the 4th server in your servers list....

  • @Fmahfs
    @Fmahfs 2 года назад

    This is the only youtuber who makes jokes about being drunk while having the most serious voice ever

    • @Fmahfs
      @Fmahfs 2 года назад

      @Shokk yes

  • @Fixator10
    @Fixator10 2 года назад +2

    I love how they basically scream that their code is best and multithreaded, but no actual threading in code.

  • @sigma7636
    @sigma7636 2 года назад +15

    You could also just replace the last 'eval(compile(...))' with a print. Then running the code in replit would have it print out the deobfuscated version.

    • @alex59292
      @alex59292 2 года назад

      You must be new here, we don't take simple or easy way here we only use 500 websites and spread false news about coding since he doesn't know one thing he claims and has nothing to back him up

    • @foundfpvfootage
      @foundfpvfootage 2 года назад +4

      @@alex59292 you could open the replit and fact check it?

    • @alex59292
      @alex59292 2 года назад

      @@foundfpvfootage well he did get code from this video but really really inefficient

    • @alex59292
      @alex59292 2 года назад

      @@pani777 about the nitro sniping video on how it's spamming discord api when it's just a gateway event 💀💀💩💩

    • @sigma7636
      @sigma7636 2 года назад +1

      @@alex59292 ?

  • @luckyberry8250
    @luckyberry8250 Год назад +2

    This was incredibly interesting and informative

  • @RyderKunAnimations
    @RyderKunAnimations 2 года назад +4

    No ones gonna talk about there's a jenny's mod server on his list?

  • @NinjaWarotMCph
    @NinjaWarotMCph 2 года назад

    man these nitro generators are absolutely hilarious
    By the by, some knowledge of ROT13 for the curious:
    ROT13 is not computer encoding but a _cipher._ If anyone here knows Caesar Cipher, it's that basically. For the uninitiated: It's an "encoding" where each letter is shifted a number of letters up or down. Take the case of the letter E, which is the fifth letter. If we say "shift three up", that means we need to find the third letter _after_ it, which is H. If we say "shift two down", that's the second letter _before_ it, which is C.
    ROT13 is a special form of these ciphers, since the ROT13 makes you find the thirteenth letter after it... which is also the thirteenth letter before it. That's because there are 26 letters in the alphabet, so you only need to find the letter of the ciphered letter's mirror position. (Example, if the ciphered letter is A, then the decoded letter is Z.)

  • @abyssaltheking
    @abyssaltheking 2 года назад +26

    if you edit the code, you could theoretically make it send it to yourself for free nitro 😎
    they just gave you the code to get started, so they are not lying, just as long as you know how to code

    • @racapadexxa_
      @racapadexxa_ 2 года назад +32

      Yes, in a million years you could actually find a code expired in 2012

    • @VeeOasis
      @VeeOasis 2 года назад +9

      Also you are stealing from others since someone has to buy the nitro to if you do get a link that works you stole it from someone else

    • @dorangex
      @dorangex 2 года назад +1

      @@VeeOasis i cant lie we dont care + we didnt ask + teachers pet

    • @toNieh
      @toNieh 2 года назад +16

      @@dorangex you sound like you would actually trust these generatorss

    • @ceoofgaming7914
      @ceoofgaming7914 2 года назад +1

      @@VeeOasis not really, the discord's api probably has a lot of these and they probably generate a new link whenever someone gifts nitro

  • @TheRealTheLights
    @TheRealTheLights 2 года назад +1

    I JUST Relised This Was 14 minutes ago xd Thanks For Warning Us And Making Content For Us (if you are wondering this comment was not written by a bot)

  • @Fluxirya
    @Fluxirya 2 года назад +14

    i'm imagining someone sending the scammer spam messages using his webhook link.

    • @xClairy
      @xClairy 2 года назад +5

      Lmao no wonder he said the web hook is invalid don't try it cause it probably died

    • @Rizzaural
      @Rizzaural 2 года назад +1

      So does that means you can send "fuck you scammer" messages using his webhook Link?

    • @declan_youtube
      @declan_youtube 2 года назад +1

      ​@@Rizzaural the webhook doesn't work anymore, but if it did, yes

  • @LennoxDev
    @LennoxDev 2 года назад +1

    let's see when the owner finally has nitro... maybe he just found the credit card of his mom then lmao

  • @Tw1fty
    @Tw1fty 2 года назад +6

    Who else tried to join the server to troll the owner but saw that its not on disboard anymore :P

  • @ErrorSyrox
    @ErrorSyrox Год назад +2

    Sheeesh this man is really good on explaining stuff with code, bruv make like a whole 30 min video about smth that is normal if you scripted it(planned it) cuz it is very not boring

  • @Yojo315
    @Yojo315 2 года назад +4

    Wait, so technically couldn’t you change the code and make it so you get the nitro?
    Update: I got it to work if you replace the webhook url with one of your own

    • @universoul8929
      @universoul8929 2 года назад +2

      It's mathematically impossible to generate a valid code in your lifetime

    • @Yojo315
      @Yojo315 2 года назад +1

      @@robertplayz9157 how do you do that?

    • @starleighpersonal
      @starleighpersonal 2 года назад +1

      @@Yojo315 print()

    • @Yojo315
      @Yojo315 2 года назад

      @@starleighpersonal thanks

    • @filipetrujeira3359
      @filipetrujeira3359 2 года назад

      @@universoul8929 Do not say it is mathematically impossible when it is not. Math can NOT calculate luck. On average, it would take more than hundreds of times the age off the entire universe, but it's also possible for you to get 20 codes in a minute, it's just that the probability is astronomically low.

  • @lottery248
    @lottery248 Год назад +2

    the even bigger problem is that Discord did nothing to gives users more so that less likely they would want Nitro and so is the chance they fall into those scams.

  • @jettyseb
    @jettyseb Год назад +3

    Hold on, you could save the valid links to your own text file, and redeem them yourself, therefore you would have an inefficient but working nitro code generator!

    • @NewRodin
      @NewRodin Год назад

      C'mon now, in order to end up finding one working code you'd probably have to spend hours running that thing, not to mention the risk of getting IP banned from Discord if they flag you as trying to doxx (constant request/calls to the api beyond rate limits).. And even then, all that just for a subscription service that'll end soon anyways? Pffft lmao

  • @hatewendy
    @hatewendy Год назад

    i love ur voice sm bro i even sleep while watching your videos even the video is boring but ur voice isnt

  • @capnryna
    @capnryna 2 года назад +5

    Since python obfuscation still needs python to run clear code, you can simply replace the eval() or run() with print()

  • @si8915
    @si8915 2 года назад

    the "muac" at the end always makes my brain release dopamine

  • @Onrirtopia
    @Onrirtopia 2 года назад +13

    instead of doing all this base64 stuff you could've just removed the evals and printed it lmfao.

    • @giakhanhvn2mc
      @giakhanhvn2mc 2 года назад +1

      yea, agreed, cmon, this isn't C++ or java or any compiled programming language, python is the easiest to de-obf than any other things

    • @alex59292
      @alex59292 2 года назад +1

      i was gonna say that

    • @Onrirtopia
      @Onrirtopia 2 года назад +2

      @@giakhanhvn2mc yeah, altho it should be noted that VM languages like Java, Kotlin, C++, Dart and Lua are extremely easy to de-compile. I woulden't really ever use them for anything to do with security.

    • @Onrirtopia
      @Onrirtopia 2 года назад

      @element what are you talking about? VM languages are not easy to deobfuscate because unlike python they are not interpeted but compiled.
      Their bytecodes can be transformed back to regular code therefor being easy to break in on the source codes.
      Python is also extremely easy to deobfuscate seeing as it's interpeted and they can't hide any code from you.

    • @Onrirtopia
      @Onrirtopia 2 года назад +1

      @Sir Avian I wasn't talking about obfuscation but rather compilation.
      Lua is not interpeted like python but compiled and ran in a virtual machine like java or c#. You can very easily get the original source code from this compilation.
      The lua compiler also destroys all unused variables and dumb stuff that you write meaning all your obfuscation is completely useless.

  • @therandomguy6200
    @therandomguy6200 Год назад

    Jeffrey really matches the "Nerd" PFP in Discord

  • @JamesRelok
    @JamesRelok 2 года назад +3

    When a nitro code is bought you have 48h to claim it. So if the code isnt claimed within 48h it will be regenerated and the chance of a script kiddie guessing it is 1 in 218,340,105,584,896.

  • @Rokk_
    @Rokk_ Год назад

    rot13 is not just some "coding computer thing", it's a Caesar cipher where alphabetically the letters are shifted by 13 places. It's actually laughably simple and I'm surprised they didn't go for something more clever.

  • @influxional
    @influxional Год назад +3

    wow no cap discord really should make you a mod

  • @PliskinYT
    @PliskinYT 2 года назад +1

    At first I thought it was gonna be a Token Grabber, and it turns out it's a shittily made botnet

  • @kittenzrulz
    @kittenzrulz 2 года назад +4

    There are safe ways to run shady programs and code including using a VM.

    • @starleighpersonal
      @starleighpersonal 2 года назад

      Code dosent work. There’s a major typo that causes it to brick itself half way through execution

    • @win10mc
      @win10mc 2 года назад

      @@starleighpersonal i assume you mean line 83 "entitelmnts"?

  • @anonymousmagician5267
    @anonymousmagician5267 Год назад

    that outro was the most beautiful thing I have ever seen

  • @RRC_TH
    @RRC_TH Год назад +3

    1:40 Steven He

  • @melo-7904
    @melo-7904 Год назад +1

    bro really said to the scammers "dude your code sucks and your encryption sucks let me tell you what you should be doing to code anything really"

  • @connor255
    @connor255 2 года назад +4

    A NEW NTTS VIDEO WOO

  • @Gwa_GwaG
    @Gwa_GwaG Месяц назад

    "I am 100% real hacker now:❌"
    "I am 100% mentally unstable now:✅"

  • @daleryanaldover6545
    @daleryanaldover6545 2 года назад +3

    If you remove the webhooks, you can technically keep the working nitro codes but make sure to run the script on a VM or something

    • @kzxv_
      @kzxv_ 2 года назад +1

      what's the point of running it in a VM? either way mathematically impossible

  • @retromusician_official
    @retromusician_official Год назад +1

    I actually learned how to do basic obfusctation in python, thank you!

  • @monkaSisLife
    @monkaSisLife 2 года назад +17

    its almost like they are creating their own botnet to bruteforce nitro codes

    • @hi-kt3qr
      @hi-kt3qr 2 года назад +3

      Except they are all running on basically the same system because replit users all share servers and there’s only so many servers.

    • @PliskinYT
      @PliskinYT 2 года назад

      I was just gonna say this, this is just a botnet with extra steps