Introduction - If you have any usage issues, please Google them yourself
After a copy of the desired access token is made,the only thing that is to be done is to exchange the original value of the Token field with the address of the new token.The process will have the same access rights as the victim.