ultrasecurity / Telekiller
A Tools Session Hijacking And Stealer Local Passcode Telegram Windows
Stars: ✭ 122
Programming Languages
Projects that are alternatives of or similar to Telekiller
Powershell Rat
Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.
Stars: ✭ 636 (+421.31%)
Mutual labels: hacking, penetration-testing, rat
H4cker
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+8466.39%)
Mutual labels: hacking, penetration-testing
Blackrat
BlackRAT - Java Based Remote Administrator Tool
Stars: ✭ 87 (-28.69%)
Mutual labels: hacking, rat
Ratel
RAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model, the server sends commands and the client executes the commands and sends the result back to the server. The client is completely undetectable by anti-virus software.
Stars: ✭ 121 (-0.82%)
Mutual labels: hacking, rat
Gitjacker
🔪 Leak git repositories from misconfigured websites
Stars: ✭ 1,249 (+923.77%)
Mutual labels: hacking, penetration-testing
One Lin3r
Gives you one-liners that aids in penetration testing operations, privilege escalation and more
Stars: ✭ 1,259 (+931.97%)
Mutual labels: hacking, penetration-testing
Keye
Keye is a reconnaissance tool that was written in Python with SQLite3 integrated. After adding a single URL, or a list of URLs, it will make a request to these URLs and try to detect changes based on their response's body length.
Stars: ✭ 101 (-17.21%)
Mutual labels: hacking, penetration-testing
Resources
A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-49.18%)
Mutual labels: hacking, penetration-testing
Hackingthe.cloud
Content for hackingthe.cloud
Stars: ✭ 101 (-17.21%)
Mutual labels: hacking, penetration-testing
Scilla
🏴☠️ Information Gathering tool 🏴☠️ DNS / Subdomains / Ports / Directories enumeration
Stars: ✭ 116 (-4.92%)
Mutual labels: hacking, penetration-testing
Beef Over Wan
Browser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Script does the changes Required to make hooked Linked Accessible Over WAN .So anyone can use this framework and Attack Over WAN without Port Forwarding [NGROK or any Localhost to Webhost Service Required ]
Stars: ✭ 82 (-32.79%)
Mutual labels: hacking, penetration-testing
In Spectre Meltdown
This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in
Stars: ✭ 86 (-29.51%)
Mutual labels: hacking, penetration-testing
Givingstorm
Infection vector that bypasses AV, IDS, and IPS. (For now...)
Stars: ✭ 72 (-40.98%)
Mutual labels: hacking, penetration-testing
Ssh Mitm
SSH man-in-the-middle tool
Stars: ✭ 1,328 (+988.52%)
Mutual labels: hacking, penetration-testing
Oscp Automation
A collection of personal scripts used in hacking excercises.
Stars: ✭ 118 (-3.28%)
Mutual labels: hacking, penetration-testing
Ghost
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
Stars: ✭ 992 (+713.11%)
Mutual labels: hacking, rat
Slickermaster Rev4
NSA Hacking Tool Recreation UnitedRake
Stars: ✭ 62 (-49.18%)
Mutual labels: hacking, rat
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 1,392 (+1040.98%)
Mutual labels: hacking, penetration-testing
.
/ \
_________ _______ _ _______ _ |U| _ _ _______ _______
\__ __/( ____ \( \ ( ____ \ | \ /\ |L| ( \ ( \ ( ____ \( ____ )
) ( | ( \/| ( | ( \/ | \ / / |T| | ( | ( | ( \/| ( )|
| | | (__ | | | (__ | (_/ / |R| | | | | | (__ | (____)|
| | | __) | | | __) | _ ( |A| | | | | | __) | __)
| | | ( | | | ( | ( \ \ |S| | | | | | ( | (\ (
| | | (____/\| (____/\| (____/\ | / \ \ |E| | (____/\| (____/\| (____/\| ) \ \__
)_( (_______/(_______/(_______/ |_/ \/ |C| (_______/(_______/(_______/|/ \__/
'--8--'
8
O
TeleKiller
A Tools Session Hijacking And Stealer Local passcode Telegram Windows
Features :
- [x] Session Hijacking
- [x] Stealer Local Passcode
- [x] Keylogger
- [x] Shell
- [x] Bypass 2 Step Verification
- [x] Bypass Av (Coming Soon)
Windows
Installation git clone https://github.com/ultrasecurity/TeleKiller.git
cd TeleKiller
pip install -r requirements.txt
python TeleKiller.py
Dependency :
- [x] python 2.7
- [x] pyHook
- [x] pywin32
ScreenShot
Video Tutorial
- [+] Youtube : https://youtu.be/Ugz1GSlTZyc
Operating Systems Tested
- Windows 10
- Windows 8.1
- Windows 8
- Windows 7
📧 Contact
- WebSite Ultra Security Team : https://ultrasec.org
- Channel Telegram : https://t.me/UltraSecurity
Thanks to
Milad Ranjbar
MrQadir
Abolfazl Hajizade
Note that the project description data, including the texts, logos, images, and/or trademarks,
for each open source project belongs to its rightful owner.
If you wish to add or remove any projects, please contact us at [email protected].