All Projects → ultrasecurity → Telekiller

ultrasecurity / Telekiller

A Tools Session Hijacking And Stealer Local Passcode Telegram Windows

Programming Languages

python
139335 projects - #7 most used programming language
python3
1442 projects
hack
652 projects

Projects that are alternatives of or similar to Telekiller

Powershell Rat
Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.
Stars: ✭ 636 (+421.31%)
Mutual labels:  hacking, penetration-testing, rat
H4cker
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+8466.39%)
Mutual labels:  hacking, penetration-testing
Blackrat
BlackRAT - Java Based Remote Administrator Tool
Stars: ✭ 87 (-28.69%)
Mutual labels:  hacking, rat
Ratel
RAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model, the server sends commands and the client executes the commands and sends the result back to the server. The client is completely undetectable by anti-virus software.
Stars: ✭ 121 (-0.82%)
Mutual labels:  hacking, rat
Gitjacker
🔪 Leak git repositories from misconfigured websites
Stars: ✭ 1,249 (+923.77%)
Mutual labels:  hacking, penetration-testing
One Lin3r
Gives you one-liners that aids in penetration testing operations, privilege escalation and more
Stars: ✭ 1,259 (+931.97%)
Mutual labels:  hacking, penetration-testing
Keye
Keye is a reconnaissance tool that was written in Python with SQLite3 integrated. After adding a single URL, or a list of URLs, it will make a request to these URLs and try to detect changes based on their response's body length.
Stars: ✭ 101 (-17.21%)
Mutual labels:  hacking, penetration-testing
Resources
A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-49.18%)
Mutual labels:  hacking, penetration-testing
Oscp Prep
my oscp prep collection
Stars: ✭ 105 (-13.93%)
Mutual labels:  hacking, penetration-testing
Hackingthe.cloud
Content for hackingthe.cloud
Stars: ✭ 101 (-17.21%)
Mutual labels:  hacking, penetration-testing
Scilla
🏴‍☠️ Information Gathering tool 🏴‍☠️ DNS / Subdomains / Ports / Directories enumeration
Stars: ✭ 116 (-4.92%)
Mutual labels:  hacking, penetration-testing
Beef Over Wan
Browser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Script does the changes Required to make hooked Linked Accessible Over WAN .So anyone can use this framework and Attack Over WAN without Port Forwarding [NGROK or any Localhost to Webhost Service Required ]
Stars: ✭ 82 (-32.79%)
Mutual labels:  hacking, penetration-testing
Blackworm
Black Worm Offical Repo
Stars: ✭ 80 (-34.43%)
Mutual labels:  hacking, rat
In Spectre Meltdown
This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in
Stars: ✭ 86 (-29.51%)
Mutual labels:  hacking, penetration-testing
Givingstorm
Infection vector that bypasses AV, IDS, and IPS. (For now...)
Stars: ✭ 72 (-40.98%)
Mutual labels:  hacking, penetration-testing
Ssh Mitm
SSH man-in-the-middle tool
Stars: ✭ 1,328 (+988.52%)
Mutual labels:  hacking, penetration-testing
Oscp Automation
A collection of personal scripts used in hacking excercises.
Stars: ✭ 118 (-3.28%)
Mutual labels:  hacking, penetration-testing
Ghost
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
Stars: ✭ 992 (+713.11%)
Mutual labels:  hacking, rat
Slickermaster Rev4
NSA Hacking Tool Recreation UnitedRake
Stars: ✭ 62 (-49.18%)
Mutual labels:  hacking, rat
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 1,392 (+1040.98%)
Mutual labels:  hacking, penetration-testing
                                                     .
                                                    / \
  _________ _______  _        _______    _          |U|    _        _        _______  _______
  \__   __/(  ____ \( \      (  ____ \  | \    /\   |L|   ( \      ( \      (  ____ \(  ____ )
     ) (   | (    \/| (      | (    \/  |  \  / /   |T|   | (      | (      | (    \/| (    )|
     | |   | (__    | |      | (__      |  (_/ /    |R|   | |      | |      | (__    | (____)|
     | |   |  __)   | |      |  __)     |   _ (     |A|   | |      | |      |  __)   |     __)
     | |   | (      | |      | (        |  ( \ \    |S|   | |      | |      | (      | (\ (
     | |   | (____/\| (____/\| (____/\  |  /  \ \   |E|   | (____/\| (____/\| (____/\| ) \ \__
     )_(   (_______/(_______/(_______/  |_/    \/   |C|   (_______/(_______/(_______/|/   \__/
                                                  '--8--'
                                                     8
                                                     O

PyPI

TeleKiller

A Tools Session Hijacking And Stealer Local passcode Telegram Windows

Features :

  • [x] Session Hijacking
  • [x] Stealer Local Passcode
  • [x] Keylogger
  • [x] Shell
  • [x] Bypass 2 Step Verification
  • [x] Bypass Av (Coming Soon)

Installation Windows alt tag

git clone https://github.com/ultrasecurity/TeleKiller.git
cd TeleKiller
pip install -r requirements.txt
python TeleKiller.py

Dependency :

  • [x] python 2.7
  • [x] pyHook
  • [x] pywin32

ScreenShot

29

Video Tutorial

Operating Systems Tested

  • Windows 10
  • Windows 8.1
  • Windows 8
  • Windows 7

📧 Contact


Thanks to

Milad Ranjbar
MrQadir
Abolfazl Hajizade
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].