Skip to content

kinghacker0/Telegram-EvilDropper

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

5 Commits
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

Telegram-EvilDropper

Telegram video (mp4) extension manipulation to redirect victims to malicious sites. In this POC, a Google Play Phishing Page is used as an example.

Youtube thumbnail.jpg

πŸ“Œ Telegram Vulnerability Proof of Concept (POC)

πŸš€ Overview

This repository demonstrates a vulnerability in Telegram where an attacker can redirect a victim to a malicious site by sending a specially crafted video.

⚠️ Impact

  • πŸ›‘ The victim is tricked into opening a video sent via Telegram.
  • πŸ”— Upon clicking the video preview, the victim is redirected to a malicious website that can install malware or expose the victim's IP address, device model, etc.

πŸ›  Setup and Installation

git clone https://github.com/kinghacker0/Telegram-EvilDropper
cd Telegram-EvilDropper

Now, edit the tg.py file using any text editor and fill in the required information:

  • Chat ID Link
  • Bot ID Link
  • Custom HTML file (for redirection or phishing page)

After saving the changes, run the following command to receive the video message:

python3 tg.py

βš–οΈ Disclaimer

This information is provided for educational purposes only. The author is not responsible for any misuse of this tool.

πŸ“’ More Information

For more details, follow me on Instagram and visit my website:

🌐 Website: My Website

πŸ“· Instagram: Instagram

About

Telegram video (mp4) extension manipulation to redirect victim on malicious site

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages