"Breaking Open" A Discord Nitro Generator

Поделиться
HTML-код
  • Опубликовано: 4 июн 2024
  • Discord nitro generators are obviously fake. I mean even the big brains at Nasa probably couldn't crack free nitro. However there are an abundance of nitro "methods" where people get you to run some random code. Well, when the code looks like a wall of copy and paste, you need to do some deobfuscation and that's what I did.
    Keep in mind, the thumbnail is satire. What I did was literally no where close to any sort of hacking or advanced computer science. I'm a degenerate who uses Discord, not a comp sci major.
    DOWNLOAD LINKS
    -----------------------------------------------------------------------------
    RJain's video
    • Free Discord Nitro Gen...
    SOCIALS
    -----------------------------------------------------------------------------
    Discord Server
    / discord
    TIMESTAMPS
    -----------------------------------------------------------------------------
    00:00 - Goofy Stuff
    01:52 - Uber Nerdy Stuff
    05:10 - Satisfying Based Decode
    06:10 - What the code does
  • РазвлеченияРазвлечения

Комментарии • 1,6 тыс.

  • @xapnaxkun7557
    @xapnaxkun7557 Год назад +6347

    imagine buying nitro and it gets claimed by a random person you dont even know 😂

    • @wparkerunc
      @wparkerunc Год назад +607

      that actually happened with a steam gift card i got for christmas one time and it sucks

    • @panshul520
      @panshul520 Год назад +177

      The only giveaway I won was of discord Nitro and just that happened

    • @imnotmarbin
      @imnotmarbin Год назад +117

      It's virtually impossible for that to happen, sure there's an infinitesimal probability, but it's not going to happen.

    • @fog-
      @fog- Год назад +162

      @@imnotmarbin it must have happened before, lots though, if you managed to generate a nitro gift lift, there was an author who bought the gift lol

    • @awesomeman6948
      @awesomeman6948 Год назад

      @@imnotmarbin it was a joke you smellfungus

  • @D0Samp
    @D0Samp Год назад +768

    The best part is that even if they had rolled a valid gift code by dumb luck, it wouldn't have detected it. There's a typo in the API call ("entitelemnts" instead of "entitlements") which will always return a 404.

    • @alex59292
      @alex59292 Год назад +17

      fr but also ntts could of just used run function on code and print the run function to get code source

    • @electra_
      @electra_ Год назад +17

      @@alex59292 might be a bad idea since it could be malware of some kind

    • @alex59292
      @alex59292 Год назад +4

      @@electra_ hes using repl so who cares

    • @LiEnby
      @LiEnby Год назад +5

      @@alex59292 protip; replace 'exec' with 'print' lol

    • @alex59292
      @alex59292 Год назад +1

      @@LiEnby print boring

  • @dolfies
    @dolfies Год назад +666

    The funniest thing is that there's a typo in the API endpoint, meaning it would never recognize it even if you do manage to generate a valid code.

    • @justnathan_4087
      @justnathan_4087 Год назад +29

      didn't even notice LOL

    • @oclxtch9376
      @oclxtch9376 Год назад +5

      whats the typo?

    • @andrew3606
      @andrew3606 Год назад +45

      @@oclxtch9376 "entitelemnts"

    • @okRoadToSubs
      @okRoadToSubs Год назад +17

      @@andrew3606 the coder misspelled entitlements lmao

    • @Theunicorn2012
      @Theunicorn2012 11 месяцев назад

      The funniest thing is that there's a typo in the API endpoint, meaning it would never recognize it even if you fo manage to generate a valid code.

  • @cirkulx
    @cirkulx Год назад +5863

    So technically, they are just using kids to make free gift links by making them host it. What a genius plan.
    Edit 30/12/22: While executed poorly.

    • @edmarcthegreat
      @edmarcthegreat Год назад +482

      child labour

    • @cirkulx
      @cirkulx Год назад

      @@edmarcthegreat free nitro child labour

    • @nachooTM
      @nachooTM Год назад +178

      @@edmarcthegreat best invention

    • @ligmaballs1953
      @ligmaballs1953 Год назад +30

      @@nachooTM lol

    • @spocite
      @spocite Год назад +68

      @@edmarcthegreatbest invention since sliced bread

  • @cutzudev
    @cutzudev Год назад +2034

    NTTS becoming an actual programmer after debunking all these scams 💀

  • @Oreoezi
    @Oreoezi Год назад +932

    What fascinates me is it takes the time to write all possible codes to a txt file instead of just creating one, testing it and moving on to the next.

    • @ikyyntts7807
      @ikyyntts7807 Год назад +159

      what also fascinates me is HOW theyre generating them. the odds that a fully random string of letters is a nitro code is so unholily low, that if they were to put a minutes research in to see how nitro codes are compiled and try and systematically generate random codes, they would atleast have a chance at getting one.

    • @Oreoezi
      @Oreoezi Год назад +22

      @@ikyyntts7807 if the code is 6 letters long and it can be a combination of letters and numbers that would be 6 to the power of 12 more or less. It is very unlikely to say the least.

    • @Houtblokje
      @Houtblokje Год назад

      @@ikyyntts7807 I think these guys are in the range of being juuuuussssttt smart enough to write a scammy brute force code but just dumb enough to not put in any more effort in figuring out codes

    • @fog-
      @fog- Год назад +27

      @@ikyyntts7807 nitro gifts are much different, they're 6-8 characters long

    • @ikyyntts7807
      @ikyyntts7807 Год назад +58

      @@fog- ah right, just an insight, apologies. but you could have also ACTUALLY utilised threading to have one thread continually generate codes and throw them into a pool, have a thread or two checking the codes. or something like that, either way the guy who made this one clearly doesn't have a clue what he's doing

  • @TaxEvasion1337
    @TaxEvasion1337 Год назад +506

    funny thing is they don't even use threading

    • @itswilliboy7054
      @itswilliboy7054 Год назад

      lol

    • @SyberiaK
      @SyberiaK Год назад

      I thought I'm the only one who noticed that lol

    • @electricz3045
      @electricz3045 Год назад +38

      This script is memory heavy (file writing) so if they would implement threading it wouldn't be great as threading is for I/O tasks (like API requests but without mass file open, writing, closing) for these memory heavy tasks they should use multiprocessing where a process on each CPU is spawned. However i assume that they are too stupid to understand multiprocessing, they also could use threading with the queue function and not directly writing to file.

    • @radon-sp
      @radon-sp Год назад +33

      @@electricz3045 them writing them to a file instead of doing it in memory is the funniest shit ever

    • @v01d_r34l1ty
      @v01d_r34l1ty Год назад +1

      @@electricz3045 It would definitely still have a performance benefit. I think you can spawn as many threads as your CPU supports without any performance hitch so at some point the threads would theoretically spawn on separate cores and max out the performance. Also, while sockets operate more internally (memory) for Windows, they are file-based I/O on Unix based systems (i.e. FreeBSD, macOS, Linux). Nevertheless, randomly generating a string based on random numbers seeded by time (standard random generator) is going to be wholly inefficient as it won't come near to producing similar results as a more complex cryptographically safe algorithm.

  • @insig0
    @insig0 Год назад +1577

    I seriously think that ONLY underage discord users fall for nitro generators. Also, I still cant believe that such low human beings exist, USING kids that don't know anything to get nitro. What a disappointment.

    • @izzyxvibes
      @izzyxvibes Год назад +21

      Yeah… I once downloaded one and it was an exe, but it is on my phone. And it came up with nsfw pop ups but I didn’t click any of them. Then I downloaded malwarebytes and they got rid of it lol. It was back in 2020 I believe . But I’m 13+ now since my bday was months ago, joined discord in 2018 but probably earlier since I had another acc

    • @rarehyperion
      @rarehyperion Год назад +48

      @@izzyxvibes I think you downloaded the wrong generator... you sure it said nitro?

    • @insig0
      @insig0 Год назад +6

      @@rarehyperion FOR REAL that NSFW popup stuff is so annoying

    • @izzyxvibes
      @izzyxvibes Год назад +2

      @@rarehyperion ye it was for a pc tho. I have pc glad I didn’t download it on their

    • @Hexarian
      @Hexarian Год назад +1

      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
      UTF-32

  • @Master_YT
    @Master_YT Год назад +553

    Moral of the Story: Child Labour is the best way to do anything.

    • @jenkathefridge3933
      @jenkathefridge3933 Год назад +32

      Ohhhh,thats how china makes alot of money.

    • @Wuzzy69
      @Wuzzy69 Год назад +10

      This comment reminded me of minute movies

    • @Sockren
      @Sockren Год назад +16

      thats why roblox is the best platform ever

    • @thecatacombhimself
      @thecatacombhimself Год назад +6

      Nestle:

    • @ShiroCh_ID
      @ShiroCh_ID Год назад +2

      @@Sockren true true
      we just need to milk Parrents Money Using Child as the Proxy
      trully magnificent strategy that almost nobody relised

  • @MINDisOFF
    @MINDisOFF Год назад +7

    bro got the all the spirit elements😭 4:51 love,trust,god,eval,magic

  • @PokeHearts
    @PokeHearts Год назад +378

    I love videos like this, especially you running through the steps you took

    • @Theunicorn2012
      @Theunicorn2012 11 месяцев назад

      I love videos like this, especially you running through the steps you took

  • @arpita1shrivas
    @arpita1shrivas Год назад +303

    as a python programmer myself
    it's genuinely so funny to see a person try to encrypt their code only for it to be decrypted by a person who doesn't even code (much i think)
    hilarious. i want more of these videos.

    • @racapadexxa_
      @racapadexxa_ Год назад +22

      At the end of the day the interpeter has to see clear code, so you just replace whatever eval() or run() function with a print() and it's all useless

    • @novamc7945
      @novamc7945 Год назад +5

      @@racapadexxa_ Exactly. The code is being decoded for you, so just print it instead of doing the job of the interpreter (which is already laid out)

    • @declan_youtube
      @declan_youtube Год назад +9

      This is incredibly one-sided but as a C++ developer it pains me to see someone try to obfuscate python

    • @SpaceKebab
      @SpaceKebab Год назад

      @@declan_youtube im sorry for you.. c++ its a horrendous language to learn

    • @declan_youtube
      @declan_youtube Год назад +8

      @@SpaceKebab It's incredibly over-exaggerated on how hard it is to learn tbh, you just gotta get used to stupidly named functions and stupid symbols like >

  • @Marcozzz8
    @Marcozzz8 Год назад +49

    The mwah ! at the end is always appreciated, love what you do !

  • @nerdporkspass1m1st78
    @nerdporkspass1m1st78 Год назад +31

    Your interest in Discord is contagious, and it’s actually making me more interested in Discord drama, breaking news and technicalities. You’re more interested than me, and I use Discord every day.

    • @Theunicorn2012
      @Theunicorn2012 11 месяцев назад

      Your interest in Discord is contagious, and it’s actually making me more interested in Discord drama, breaking news and technicalities. You’re more interested than me, and I use Discord every day.

  • @oxymore13
    @oxymore13 Год назад +36

    This is honestly hilarious, I can't not imagine the thought process : "Hey let's bruteforce nitro links. But we'll make gullible kids do it for us instead." Genuinely a modern supervillain, I love it lmao

  • @OceanMalibuClub
    @OceanMalibuClub Год назад +348

    Discord is a place without safety and privacy

    • @An_kira154
      @An_kira154 Год назад +8

      Good point

    • @foxmulder3833
      @foxmulder3833 Год назад +5

      True

    • @insig0
      @insig0 Год назад +10

      Never has been.

    • @lystid
      @lystid Год назад +38

      It's the users fault if they run some random files on the internet

    • @cllncl
      @cllncl Год назад +27

      That applies to almost everything, ever. As long as you have even a single brain cell, you cannot fall for some guy saying he can get you free stuff.

  • @siyustuff213
    @siyustuff213 Год назад +100

    i love how they spend all this effort cloaking the code in like 3 layers as if anybody who will actually fall for the scam is going to look closely at the code

    • @-_lIl_-
      @-_lIl_- Год назад

      I think they do this just so that people don't find out and be able to not fall for it or report them

    • @Edvit40
      @Edvit40 Год назад +2

      what happens in the dark, must never come to the light

    • @originalni_popisovac
      @originalni_popisovac Год назад

      weirdo

    • @vnc.t
      @vnc.t Год назад +3

      and they coded the thing wrong too so it doesn't even work

    • @Edvit40
      @Edvit40 Год назад

      @@vnc.t sir
      they did code it right
      its a scam
      obviously they're gonna take advantage of it

  • @TroyGalviz
    @TroyGalviz Год назад +504

    I love scams

    • @wevboo
      @wevboo Год назад +5

      amen

    • @deadeye8333
      @deadeye8333 Год назад +48

      Nah u an indian 100 percent

    • @apersoniguess_
      @apersoniguess_ Год назад +41

      @ArkkOfSpark! do you?

    • @SpectraMoyai
      @SpectraMoyai Год назад +12

      @@deadeye8333 this man right here is clearly an american

    • @elnexreal
      @elnexreal Год назад +1

      @@deadeye8333 XDDD

  • @littlegayboy45_
    @littlegayboy45_ Год назад +55

    I'm not too completely sure on how this all works, but you explained it really well! It was also interesting to watch for some reason, and fulfilled the promise of it being satisfying. Thank you for entertaining 9 minutes of my day lol.

    • @kamisama7462
      @kamisama7462 Год назад +2

      Learn python buddy, it's fun and easy

    • @Theunicorn2012
      @Theunicorn2012 11 месяцев назад

      I'm not too completely sure on how this all works, but you explained it really well! It was also interesting to watch for some reason, and fulfilled the promise of it being satisfying. Thank you for entertaining 9 minutes of my day lol.

    • @littlegayboy45_
      @littlegayboy45_ 11 месяцев назад

      @@Theunicorn2012 bro?

    • @alikeremozfidan288
      @alikeremozfidan288 9 месяцев назад

      it has two steps: first code is just encoded junk filled with comments, he decodes and gets to actual code.
      then, second code just takes a random guests to find a random nitro gifts. they verify the gift code and if it actually works, it will sent to programmer instead
      it uses your computer as nitro code miner

  • @dhi_holo
    @dhi_holo Год назад +16

    Making the code readable is basically just simple puzzle solving, I'd see this in an escape room that lets decoder sites be used, kinda thing

    • @xc_gwpl
      @xc_gwpl Год назад

      CTFs are basically that!

  • @arrowsecho5779
    @arrowsecho5779 Год назад +11

    these vids are always so interesting and well done i have no clue how you consistently release such great content

  • @bsmn2oid
    @bsmn2oid Год назад +14

    I thought that python obfuscation looked familiar, turns out it was the same one some skid used to try and disguise a token stealer as a "maze game".

  • @agnieszkazint2799
    @agnieszkazint2799 8 месяцев назад +6

    Hey No Text To Speech,
    I'm a big fan of your RUclips channel. I love your informative and entertaining videos about Discord and other social media platforms. I'm also impressed by your commitment to helping people avoid scams and stay safe online.
    Keep up the great work!
    Sincerely,
    Bard

  • @GuardianIsIdiot
    @GuardianIsIdiot Год назад +28

    I nearly got scammed by a bit saying they would give me discord nitro, I had watched your video on it before and I managed to avoid it. Thanks!

    • @fusseldieb
      @fusseldieb Год назад

      Nobody ever is gonna get you Discord Nitro for free. If you trust somebody RANDOM, you already messed up.

    • @GuardianIsIdiot
      @GuardianIsIdiot Год назад +2

      @@fusseldiebnot for free, i missed this out, they were a friend and said it was a 80% discount. I found out later that my friends account was hacked

    • @Dreagerd
      @Dreagerd Год назад

      @@fusseldieb i literally got free nitro 2 times from random people 😭

  • @NorthLaker
    @NorthLaker Год назад +25

    The method they're using technically does work, but only for the first few times you try the request. After that you'll get rate limited to hell and back, and sending even more requests (say, 999995 of them) might actually get your IP banned from Discord altogether.

    • @Versuffe
      @Versuffe Год назад +16

      its a situation where you lose no matter what.
      1: you dont get a working code.
      2: you get a working code, it is traced back to you.
      3: its detected as a ddos, literally banning you from the website if the ip is found.

    • @justanerdywoman7785
      @justanerdywoman7785 Год назад +2

      you won't be banned, since, they have proxies in there, which means, you won't be banned, but proxies will be banned, as you still don't get banned.

    • @LiEnby
      @LiEnby Год назад +1

      ive sent like 3000 requests to discord before, you dont get banned you just get heavily rate limited (which, if you think about it, is basically a temporary ip ban)

  • @varram3488
    @varram3488 Год назад +4

    6:00 the worst attempent at obfuscation i have seen lmao

  • @mochithegodboss
    @mochithegodboss Год назад

    wow the deobfuscating the code just got me so into coding even in it was really simple, thats such a cool skill to have and to understand code

    • @Pyrolite
      @Pyrolite 9 месяцев назад +1

      Well in this case, whoever 'developed' the program sucks at encrypting it and you can directly tell what cipher it is from the code. Everything else is basic python with a questionable generation method

  • @matthrew
    @matthrew Год назад +169

    imma be honest, you would be a pretty good python teacher

    • @racapadexxa_
      @racapadexxa_ Год назад +21

      For shure better than the one who wrote the code

    • @JamesRelok
      @JamesRelok Год назад +6

      how lmao what he said was so basicthat someone that doesnt even know python could do it lmao

    • @nubidubi23
      @nubidubi23 Год назад +13

      @@JamesRelok 🤓🤓🤓

    • @spline5243
      @spline5243 Год назад +4

      @@nubidubi23 "someone is smarter than me"

    • @dustin0001
      @dustin0001 Год назад +1

      *Concatenation*

  • @corruptor55
    @corruptor55 11 месяцев назад +3

    Although you said the process was easy, the fact that you de-compiled all that code to prove why these "nitro generators" are scams is commendable. There definitely needs to be more awareness about said scams, as the phrase "don't accept random links from strangers" unfortunately isn't common knowledge...or not enough people care to double-check. Either way, feel free to keep making these kinds of videos; I'm gonna need this information at some point o-o _/ /

  • @theloper19
    @theloper19 Год назад +11

    Theoretically, if this DOES actually get a few valid ones and sends it to the random skiddies, you could tweak the code a bit and actually send it to your own webhook, basically giving you an actual free nitro generator.

    • @_KDP
      @_KDP 10 месяцев назад

      or just make it show it on your screen lol

    • @Lukboo
      @Lukboo 9 месяцев назад

      its easier just to literally make it send to your webhook@@_KDP

  • @goncalomarinho8478
    @goncalomarinho8478 Год назад

    Roockie mistake that verification system to the gift codes will just be timed out after like 5 tries. They should use some way to mask the ip. Also this type of system of brute force can run for a full year without find anything.
    Anyways great video!

  • @retromusician_official
    @retromusician_official 9 месяцев назад +1

    I actually learned how to do basic obfusctation in python, thank you!

  • @Realtreno
    @Realtreno Год назад +156

    Just change the weebhook link so you send nitro to your own weebhook 🤷

    • @snuz
      @snuz Год назад +18

      Genius.

    • @Bl4n
      @Bl4n Год назад +3

      good idea lmao

    • @tenidiotaodpizzy4603
      @tenidiotaodpizzy4603 Год назад +3

      so you can just edit the code however you want?

    • @John-wy7xf
      @John-wy7xf Год назад

      Or send l bozo to their webhook

    • @alex59292
      @alex59292 Год назад +17

      @@tenidiotaodpizzy4603 you can but since the repl is owned by them changes to there repl wont work

  • @2fas_lol
    @2fas_lol Год назад +53

    Technically, you could fork it and change the webhook to your webhook, so it sends YOU the working nitro INSTEAD of the random people.

    • @racapadexxa_
      @racapadexxa_ Год назад +6

      Yea the only problem is that the code to generate the code doesn't work

    • @Squiidgy
      @Squiidgy Год назад +1

      oh wow 😂

    • @BostYT
      @BostYT Год назад

      @@racapadexxa_ It does but it is a very slight chance

    • @IanGaming101HD
      @IanGaming101HD Год назад +7

      @@racapadexxa_ it does, it validates it through discords api until it finds a valid gift so yes you can just make it send to you instead of the webhook

    • @racapadexxa_
      @racapadexxa_ Год назад +4

      @@IanGaming101HD Yes good luck with a one in a several trillion possibilities to get one code

  • @luckyberry8250
    @luckyberry8250 Год назад +2

    This was incredibly interesting and informative

  • @in1
    @in1 Год назад +5

    This is just beautiful code. Love the names of the variables

    • @IsBirb
      @IsBirb Год назад

      Lmao just saw the names

  • @fallgate
    @fallgate Год назад +15

    Btw in terms of this crypted code, that is pyarmor obfuscator and in some point in time it has all the code in string so i just run this in pycharm community with debug points at last lines and go line by line until it has a variable with the text
    It could also be rewritten a little to just spit out plain decoded text when ran

    • @xAffan
      @xAffan Год назад +1

      Dude smart!

    • @Mythitie
      @Mythitie Год назад

      @@xAffan Average programmer stuff.

    • @xAffan
      @xAffan Год назад +1

      @@Mythitie doesn't work if it's compiled to pyc. And there are no public decompilers so L

    • @vuki4653
      @vuki4653 Год назад

      @@xAffan there are public ones

    • @xAffan
      @xAffan Год назад +1

      @@vuki4653 not for 3.8+ / also weird seeing u here

  • @brandensnow990
    @brandensnow990 Год назад +6

    the best part: all you have to do to get the "gift link" yourself is make a webhook and change the link after you deobfuscate it

    • @racapadexxa_
      @racapadexxa_ Год назад +1

      And find the 1 in multiple billions change to generate a working code before Discord bans your IP from their site

  • @FlashDrive356
    @FlashDrive356 Год назад +32

    5:04 Wow, RUclips's compression algorithm _really_ didn't like that

  • @cgytrus
    @cgytrus Год назад +2

    2:20 the proper way to do this is by using find and replace: ctrl+h, search mode: regular expression, search for "^#.*", replace with ""

  • @catnap7656
    @catnap7656 Год назад +3

    this is like the guy from Willy Wonka making his workers find a golden ticket from millions of chocolate bars and they can't even keep it for themselves

  • @Rayanvision
    @Rayanvision Год назад +3

    Lmao the mwah at the end gets me everytime, it's weirdly sweet

    • @HyperNovva
      @HyperNovva Год назад

      I make sure to pause the video like 10 seconds before the end because of that outro. Everyone loves it but it grosses me out.

  • @SolarKid123
    @SolarKid123 5 месяцев назад

    3:33
    rot13 is actually a letter substitution cipher, which replaces a letter with the 13th letter after it! Hope this helps!

  • @ErrorSyrox
    @ErrorSyrox Год назад +2

    Sheeesh this man is really good on explaining stuff with code, bruv make like a whole 30 min video about smth that is normal if you scripted it(planned it) cuz it is very not boring

  • @Liggliluff
    @Liggliluff Год назад +8

    These generators generate 16-character long links out of 60 possible characters. That's 60^16 possible links. That's 2,8 x 10^28 different codes.
    So if you have a server with 10000 users who all generate 100000 codes, that means the number is now 2,8 x 10^19. The likelyhood that you manage to get a real code is so tiny.
    But I do still think Discord could increase this by making the links 32 characters. Because while the likelyhood is already small, it's not small enough for these people. Making it 32 characters long, makes it so small that it's not even worth even trying.

    • @rayanalbozan5576
      @rayanalbozan5576 Год назад +1

      That would be the case if there was only one code. Of cource there is way more but still, it will be extremly rare for someone to hit the jackpot and get nitro for free

  • @akii9553
    @akii9553 Год назад +6

    why the hell did this turn into a computer science lesson bro im on holiday

  • @acermf7983
    @acermf7983 Год назад

    This brings me back to the Microsoft point/ gold generator days

  • @tonyt2i512
    @tonyt2i512 Год назад +9

    its like giving your 20 years of luck to someone else lol

  • @flizzycat
    @flizzycat Год назад +46

    I like how this technically isn't really a scam. As in, it won't steal your token, join servers for you or something like that. In theory this can work although chances are probably very very small

    • @NinjaKiwiOfficial
      @NinjaKiwiOfficial Год назад +4

      And you could change the python at the end so if a code is SOMEHOW found, it would just show it for you

    • @spacexplorer_
      @spacexplorer_ Год назад

      Potrošački savetnik

    • @jakethebeest2376
      @jakethebeest2376 Год назад +14

      its still a scam, just stealing your computers processing power to generate random nitro links. and spamming discords api in your name. it wouldn't be a scam if it gave you the code if it did find it, but it doesn't it just gives it to the programmer

    • @flizzycat
      @flizzycat Год назад

      @@jakethebeest2376 can discord ban you for that?

    • @flizzycat
      @flizzycat Год назад

      @@spacexplorer_ 👀

  • @BostYT
    @BostYT Год назад

    I didn't think you knew much about code but wow good job!

  • @MajinManju
    @MajinManju Год назад +1

    I love videos like this because it takes away this façade hackers have, that they are some type of coding god or mastermind, but in reality its just garbage code packaged in a different way.

  • @kormagogthedestroyer
    @kormagogthedestroyer Год назад +4

    Imagine setting up a scam and not even going through the effort of making 5 different alts

  • @nikoijp
    @nikoijp Год назад +6

    Edit the code so that nitro codes generated that don't work gets sent to them so it spams them with invalid codes.

  • @gaittevansong
    @gaittevansong Год назад

    The reason it has so much garbage commented in there is because Windows Defender will not scan files over a certain size. Great work!

  • @RedShedG
    @RedShedG Год назад +2

    very interesting, would love to watch more of stuff like this

  • @barry63196
    @barry63196 Год назад +4

    8:18 the 4th server in your servers list....

  • @funwithalbi2425
    @funwithalbi2425 Год назад +9

    you seem like a good programmer since everything you did was correct

    • @giakhanhvn2mc
      @giakhanhvn2mc 11 месяцев назад +1

      absolute unnecessary bullshit, just change the exec, eval to print and the code will print out without going through any of these crap, interpreted python is a hot piece of garbage in terms of security

    • @funwithalbi2425
      @funwithalbi2425 11 месяцев назад

      @@giakhanhvn2mche was trying to obfuscate it

    • @giakhanhvn2mc
      @giakhanhvn2mc 11 месяцев назад +1

      @@funwithalbi2425 unnecessary steps, he can just replace all exec to print, it will spit out the code instantly, no hassles

  • @user-we8fx8bo8x
    @user-we8fx8bo8x 9 месяцев назад

    yo fella i appreciate this kinda content keep it up!

  • @JohnSmith-ri6wq
    @JohnSmith-ri6wq Год назад +2

    Hey NTTS I was wondering how you got your Notepad++ to have the whole thing fit on the screen. My code runs off and no matter how hard I look for a margin video I can't find one lol.

  • @methastudio
    @methastudio Год назад +4

    1:40 Steven He

  • @abyssaltheking
    @abyssaltheking Год назад +26

    if you edit the code, you could theoretically make it send it to yourself for free nitro 😎
    they just gave you the code to get started, so they are not lying, just as long as you know how to code

    • @racapadexxa_
      @racapadexxa_ Год назад +32

      Yes, in a million years you could actually find a code expired in 2012

    • @VeeOasis
      @VeeOasis Год назад +9

      Also you are stealing from others since someone has to buy the nitro to if you do get a link that works you stole it from someone else

    • @dorang599
      @dorang599 Год назад +1

      @@VeeOasis i cant lie we dont care + we didnt ask + teachers pet

    • @toNieh
      @toNieh Год назад +16

      @@dorang599 you sound like you would actually trust these generatorss

    • @ceoofgaming7914
      @ceoofgaming7914 Год назад +1

      @@VeeOasis not really, the discord's api probably has a lot of these and they probably generate a new link whenever someone gifts nitro

  • @billyfromzera4162
    @billyfromzera4162 Год назад +2

    Nice explain, Shit like this happen really often and... Sometimes they send a software. I analysed it with the fantastic linux ubuntu terminal (i didn't decoded it cause i wanted to have some stuff like the pyinstaller), and it litteraly the same as this shit but in a software with a virus that litteraly take your discord token from your discord application. Well cya stay safe!

    • @declan_youtube
      @declan_youtube Год назад

      May I ask what you mean by "I didnt decode it because I wanted pyinstaller"? But other than that, cool

    • @billyfromzera4162
      @billyfromzera4162 Год назад

      @@declan_youtube i analysed the malware with the terminal and i found what pip (pyinstaller) he used and sum other things with commands

    • @declan_youtube
      @declan_youtube Год назад

      @@billyfromzera4162 how can you analyze a python sample without even using vim or a text editor? Especially for a pyinstalled sample

    • @billyfromzera4162
      @billyfromzera4162 Год назад

      @@declan_youtube linux provide that + i used the notepad AND i runned it via the terminal

  • @machiamavlad
    @machiamavlad Год назад

    that part when you were decompiling his code was the best programming tutorial for sure

  • @tixonochek
    @tixonochek Год назад +11

    I ran quite a lot of nitro generators without even knowing what perks were in the past. Fortunately i changed OS few times.

    • @TheyCallMeIce
      @TheyCallMeIce Год назад +4

      Not kid me believing all the "survey/app tasks for cash" apps, AND downloading a code generator for one of these...

  • @ciach0_
    @ciach0_ Год назад +3

    7:33
    Also, there is a typo which says "entitelemnts", so this has no chance to work

  • @Kye5000
    @Kye5000 Год назад +1

    You can also delete any webhook by its URL, if you send a HTTP request to the webhoook url with the 'DELETE" http method it will completely delete the webhook, its on the discord developers documentation

    • @Slada1
      @Slada1 Год назад

      That's how it was probably deleted

  • @anonymousmagician5267
    @anonymousmagician5267 Год назад

    that outro was the most beautiful thing I have ever seen

  • @RyderKunAnimations
    @RyderKunAnimations Год назад +4

    No ones gonna talk about there's a jenny's mod server on his list?

  • @Tw1fty
    @Tw1fty Год назад +6

    Who else tried to join the server to troll the owner but saw that its not on disboard anymore :P

  • @JopsyJop
    @JopsyJop Год назад

    As someone who enjoys / wants to become good at computer programming . . . this LOOKS fun

  • @GuardianIsIdiot
    @GuardianIsIdiot Год назад +4

    Yes

  • @connor255
    @connor255 Год назад +4

    A NEW NTTS VIDEO WOO

  • @docvrilliant
    @docvrilliant Год назад +1

    Notepad++ installations by default come bundled with mime tools extension, which allowes for (un)escaping URL's/text and base64 decoding without having to resort to 3rd party websites. Just 2 clicks(plugins>mimetools)

  • @MetaBloxer
    @MetaBloxer 5 месяцев назад +1

    If I were in a situation like this, I would absolutely NOT spam their webhook. That would be a huge waste of time.
    Just tweak the code a little so it sends EVERY nitro link to the webhook instead of just the valid ones :)

  • @capnryna
    @capnryna Год назад +5

    Since python obfuscation still needs python to run clear code, you can simply replace the eval() or run() with print()

  • @sigma7636
    @sigma7636 Год назад +15

    You could also just replace the last 'eval(compile(...))' with a print. Then running the code in replit would have it print out the deobfuscated version.

    • @alex59292
      @alex59292 Год назад

      You must be new here, we don't take simple or easy way here we only use 500 websites and spread false news about coding since he doesn't know one thing he claims and has nothing to back him up

    • @lagknowswhy
      @lagknowswhy Год назад +4

      @@alex59292 you could open the replit and fact check it?

    • @alex59292
      @alex59292 Год назад

      @@lagknowswhy well he did get code from this video but really really inefficient

    • @alex59292
      @alex59292 Год назад

      @@pani777 about the nitro sniping video on how it's spamming discord api when it's just a gateway event 💀💀💩💩

    • @sigma7636
      @sigma7636 Год назад +1

      @@alex59292 ?

  • @si8915
    @si8915 Год назад

    the "muac" at the end always makes my brain release dopamine

  • @MaxeyTheTechCat
    @MaxeyTheTechCat Год назад

    Hey NTTS Would it be possible to do the same thing you did and change the webhook to your own?

  • @Fluxirya
    @Fluxirya Год назад +14

    i'm imagining someone sending the scammer spam messages using his webhook link.

    • @xClairy
      @xClairy Год назад +5

      Lmao no wonder he said the web hook is invalid don't try it cause it probably died

    • @-_-_-_-_-_-_-_-_-_-_-_-_-_-ucq
      @-_-_-_-_-_-_-_-_-_-_-_-_-_-ucq Год назад +1

      So does that means you can send "fuck you scammer" messages using his webhook Link?

    • @declan_youtube
      @declan_youtube Год назад +1

      ​@@-_-_-_-_-_-_-_-_-_-_-_-_-_-ucq the webhook doesn't work anymore, but if it did, yes

  • @Influxional
    @Influxional Год назад +3

    wow no cap discord really should make you a mod

  • @therandomguy6200
    @therandomguy6200 Год назад

    Jeffrey really matches the "Nerd" PFP in Discord

  • @SamuelHere
    @SamuelHere Год назад

    Very interesting and well explained good video dude

  • @user-xr7fw4ks2n
    @user-xr7fw4ks2n Год назад +4

    if you de-obfuscated it, couldn't you just remove the bit where it asks discord's api "Is this code legit" and treat EVERY code it generates as legit, such that they receive a bunch of useless links?

    • @declan_youtube
      @declan_youtube Год назад

      Yes, but we have no way of contacting the webhook they use to receive the messages

    • @elnexreal
      @elnexreal Год назад

      @@declan_youtube actually we have, you know if you have access to the webhook link you can send anything you want into it. You can do this by coding a script or by using tools like discohook

    • @declan_youtube
      @declan_youtube Год назад

      @@elnexreal Yes, but the webhook in this sample is dead - so we still cannot contact the webhook being used

  • @jettyseb
    @jettyseb Год назад +3

    Hold on, you could save the valid links to your own text file, and redeem them yourself, therefore you would have an inefficient but working nitro code generator!

    • @NewRodin
      @NewRodin 9 месяцев назад

      C'mon now, in order to end up finding one working code you'd probably have to spend hours running that thing, not to mention the risk of getting IP banned from Discord if they flag you as trying to doxx (constant request/calls to the api beyond rate limits).. And even then, all that just for a subscription service that'll end soon anyways? Pffft lmao

  • @xenai.
    @xenai. 3 месяца назад

    Ive never done coding yet, although ive done very minimal altering of code for a game i play.
    I really want to learn coding once im done with school, and seeing you decode it was fun.
    Until you said that was the easy part. Lol

  • @MAXIMUM-pc1ch
    @MAXIMUM-pc1ch 5 месяцев назад +1

    thanks for the decode toutorial lol, btw is it possible to decode an lua decoded script?

  • @SamuraiDestroy
    @SamuraiDestroy Год назад +8

    8:05 OK but this does mean that if someone was really desperate for free nitro, they could rewrite the code to NOT send the valid codes to the webhook and instead have it print them. I know what I must do.

    • @NichtDu
      @NichtDu Год назад

      No because they will notice your ip/account spamming the api endpoint and ban you

    • @NichtDu
      @NichtDu Год назад +3

      + it is mathematically impossible to generate a valid code during your lifetime

    • @xXXEnderCraftXXx
      @xXXEnderCraftXXx Год назад

      XD same thing that I tought.But this is still a mean thing to do.By using those somehow revealed links you are stealing nitro gifts from people.

    • @xvxxr
      @xvxxr Год назад

      thts wht i was thinking lmfao

    • @vineeeeed9342
      @vineeeeed9342 Год назад

      @@NichtDu it doesnt use your account when checking, and you could add a 1s delay for each link
      But nitro generators never work so dont even bother

  • @kittenzrulz2314
    @kittenzrulz2314 Год назад +4

    There are safe ways to run shady programs and code including using a VM.

    • @starleigh6680
      @starleigh6680 Год назад

      Code dosent work. There’s a major typo that causes it to brick itself half way through execution

    • @win10mc
      @win10mc Год назад

      @@starleigh6680 i assume you mean line 83 "entitelmnts"?

  • @DragoNate
    @DragoNate Год назад

    "My brain barely works half the time, *_EXSPHESHLY_* when..."
    yup. I concur, good ser.

  • @DWal32
    @DWal32 9 месяцев назад

    what they should have done is, in addition to fixing their typos, was create another server that has a string showing the farthest generated link, so that previously generated links could just be skipped over altogether. That way, while it could be traced, you would get more reliable generation as, unless discord reuses codes, you wouldnt waste processing power.

  • @vvv331
    @vvv331 Год назад +7

    I really love how satisfying it is to bruteforce poorly obfuscated code, i once did that with one of the exploits and it was poorly obfuscated that most of obfuscation was redirecting to unobfuscated source code.
    It's honestly funny seeing how their obfuscation just miserably fails and ends up exposing source code. Also, I'm pretty sure everyone know that you would never run something that's obfuscated so, it makes it even funnier.

    • @wnuggy
      @wnuggy Год назад +1

      "obfuscation"

    • @Hexarian
      @Hexarian Год назад

      I'd like to see you try bruteforce our code.

    • @alex59292
      @alex59292 Год назад

      @@wnuggy ikr base 64 isnt obfuscation

    • @wnuggy
      @wnuggy Год назад

      @@Hexarian if it's b64 "obfuscation" don't even talk

    • @pwrsocket
      @pwrsocket Год назад

      L furry

  • @ItzYojoPlayz
    @ItzYojoPlayz Год назад +4

    Wait, so technically couldn’t you change the code and make it so you get the nitro?
    Update: I got it to work if you replace the webhook url with one of your own

    • @universoul8929
      @universoul8929 Год назад +2

      It's mathematically impossible to generate a valid code in your lifetime

    • @ItzYojoPlayz
      @ItzYojoPlayz Год назад +1

      @@robertplayz9157 how do you do that?

    • @starleigh6680
      @starleigh6680 Год назад +1

      @@ItzYojoPlayz print()

    • @ItzYojoPlayz
      @ItzYojoPlayz Год назад

      @@starleigh6680 thanks

    • @filipetrujeira3359
      @filipetrujeira3359 Год назад

      @@universoul8929 Do not say it is mathematically impossible when it is not. Math can NOT calculate luck. On average, it would take more than hundreds of times the age off the entire universe, but it's also possible for you to get 20 codes in a minute, it's just that the probability is astronomically low.

  • @dargoplayz
    @dargoplayz Год назад

    This is really a Christmas miracle

  • @sennypai7196
    @sennypai7196 Год назад

    So would you be able to simply reverse this to where you could get the nitro instead of them?

  • @Fmahfs
    @Fmahfs Год назад

    This is the only youtuber who makes jokes about being drunk while having the most serious voice ever

    • @Fmahfs
      @Fmahfs Год назад

      @Shokk yes

  • @Onrirtopia
    @Onrirtopia Год назад +13

    instead of doing all this base64 stuff you could've just removed the evals and printed it lmfao.

    • @giakhanhvn2mc
      @giakhanhvn2mc Год назад +1

      yea, agreed, cmon, this isn't C++ or java or any compiled programming language, python is the easiest to de-obf than any other things

    • @alex59292
      @alex59292 Год назад +1

      i was gonna say that

    • @Onrirtopia
      @Onrirtopia Год назад +2

      @@giakhanhvn2mc yeah, altho it should be noted that VM languages like Java, Kotlin, C++, Dart and Lua are extremely easy to de-compile. I woulden't really ever use them for anything to do with security.

    • @Onrirtopia
      @Onrirtopia Год назад

      @element what are you talking about? VM languages are not easy to deobfuscate because unlike python they are not interpeted but compiled.
      Their bytecodes can be transformed back to regular code therefor being easy to break in on the source codes.
      Python is also extremely easy to deobfuscate seeing as it's interpeted and they can't hide any code from you.

    • @Onrirtopia
      @Onrirtopia Год назад +1

      @Sir Avian I wasn't talking about obfuscation but rather compilation.
      Lua is not interpeted like python but compiled and ran in a virtual machine like java or c#. You can very easily get the original source code from this compilation.
      The lua compiler also destroys all unused variables and dumb stuff that you write meaning all your obfuscation is completely useless.

  • @daleryanaldover6545
    @daleryanaldover6545 Год назад +3

    If you remove the webhooks, you can technically keep the working nitro codes but make sure to run the script on a VM or something

    • @kzxv_
      @kzxv_ Год назад +1

      what's the point of running it in a VM? either way mathematically impossible

  • @Liebe-Futurel
    @Liebe-Futurel Год назад

    Another way you can play around with deobfuscation is on Kali, a few tools pre installed that can do it automatically

  • @hatewendy
    @hatewendy 9 месяцев назад

    i love ur voice sm bro i even sleep while watching your videos even the video is boring but ur voice isnt

  • @monkaSisLife
    @monkaSisLife Год назад +17

    its almost like they are creating their own botnet to bruteforce nitro codes

    • @hi-kt3qr
      @hi-kt3qr Год назад +3

      Except they are all running on basically the same system because replit users all share servers and there’s only so many servers.

    • @PliskinYT
      @PliskinYT Год назад

      I was just gonna say this, this is just a botnet with extra steps