Telegram video (mp4) extension manipulation to redirect victims to malicious sites. In this POC, a Google Play Phishing Page is used as an example.
This repository demonstrates a vulnerability in Telegram where an attacker can redirect a victim to a malicious site by sending a specially crafted video.
- 🛑 The victim is tricked into opening a video sent via Telegram.
- 🔗 Upon clicking the video preview, the victim is redirected to a malicious website that can install malware or expose the victim's IP address, device model, etc.
git clone https://github.com/kinghacker0/Telegram-EvilDropper
cd Telegram-EvilDropper
Now, edit the tg.py
file using any text editor and fill in the required information:
After saving the changes, run the following command to receive the video message:
python3 tg.py
This information is provided for educational purposes only. The author is not responsible for any misuse of this tool.
For more details, follow me on Instagram and visit my website:
🌐 Website: My Website
📷 Instagram: Instagram