
Research
NPM targeted by malware campaign mimicking familiar library names
Socket uncovered npm malware campaign mimicking popular Node.js libraries and packages from other ecosystems; packages steal data and execute remote code.
Jalter is lightweight libs for Discord selfbot, yet it handle the most of Discord endpoint needs.
Automating user is against Discord's Terms of Service. This may result in termination
yarn add jalter
/ npm i jalter
NOTE: NodeJS 14.x or higher |
How to get token? Open browser devtools try to request something then check the network tab |
The documentation can be found https://sinkaroid.github.io/jalter
import Jalter from "jalter";
const jalter = new Jalter("wwgwgwgbadadaadpunopupupuu.X7hb5Q.-ngent00dinaLteer1213ngENt0dCcWW_1M");
jalter.getMe().then((res) => { console.log("me", res); });
CommonJS should do with const Jalter = require("jalter")
Jalter.banUser(options)
Jalter.createChannel(options)
Jalter.deleteMessage(options)
Jalter.getAuditLogs(options)
Jalter.getChannels(options)
Jalter.getMe(options)
Jalter.getMessage(options)
Jalter.getRoles(options)
Jalter.getUser(options)
Jalter.joinGuild(options)
Jalter.kickUser(options)
Jalter.leaveGuild(options)
Jalter.replyMessage(options)
Jalter.typingMessage(options)
Example From array given:
jalter.sendInterval("974918359500075041", 2000, ["hey", "ho", "let's go"])
.then((res) => { console.log("sendInterval", res); });
If not specified will use random "Hello World":
jalter.sendInterval("974918359500075041", 2000)
.then((res) => { console.log("sendInterval", res); });
Desired count is 5, and with 2 second interval
jalter.sendCount("974918359500075041", 2000, "hey", 5)
.then((res) => { console.log("sendCount", res); });
The answer is no, This is intended for something raw and pure HTTP request without extended actions, If you still rely listen events to implement a full-featured bot, use real bot account.
id_ID
• /jalter/ — Jalan Alternatif (?) Jadikan ini sebagai jalan alternatif, bukan sebuah tujuan.
This library is maintained but i never use it in production. However it is still somewhat experimental, You are encouraged to make your own tests with your specific endpoints and data types.
Cc: https://support.discord.com/hc/en-us/articles/115002192352-Automated-user-accounts-self-bots-
The question regarding "self bots" has come up here and there, and we'd like to make our stance clear:
Discord's API provides a separate type of user account dedicated to automation, called a bot account. Bot accounts can be created through the applications page, and are authenticated using a token (rather than a username and password). Unlike the normal OAuth2 flow, bot accounts have full access to all API routes without using bearer tokens, and can connect to the Real Time Gateway. Automating normal user accounts (generally called "self-bots") outside of the OAuth2/bot API is forbidden, and can result in an account termination if found.
FAQs
A NodeJS wrapper for Discord Selfbot
The npm package jalter receives a total of 49 weekly downloads. As such, jalter popularity was classified as not popular.
We found that jalter demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Socket uncovered npm malware campaign mimicking popular Node.js libraries and packages from other ecosystems; packages steal data and execute remote code.
Research
Socket's research uncovers three dangerous Go modules that contain obfuscated disk-wiping malware, threatening complete data loss.
Research
Socket uncovers malicious packages on PyPI using Gmail's SMTP protocol for command and control (C2) to exfiltrate data and execute commands.