{"id":30665,"date":"2023-10-06T08:57:01","date_gmt":"2023-10-06T08:57:01","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=30665"},"modified":"2023-10-06T08:57:14","modified_gmt":"2023-10-06T08:57:14","slug":"nightmangle","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/nightmangle\/","title":{"rendered":"Nightmangle &#8211; Cyber Espionage via Telegram&#8217;s C2 Agent ExploredNightmangle"},"content":{"rendered":"\n<p>Nightmangle is post-exploitation Telegram Command and Control (C2\/C&amp;C) Agent, created by&nbsp;<a href=\"https:\/\/t.me\/P0x3k\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">@1N73LL1G3NC3<\/a>.<\/p>\n\n\n\n<p>It was developed as Proof of Concept (POC), that Telegram API can be used by threat actors for post-exploitation and to control their agents..<\/p>\n\n\n\n<p>Nightmangle uses Telegram as a C2 server to communicate between the attacker and the client. However, it can only set one Telegram bot API per payload. This means that if you want to infect another machine, you need to build a new payload with a new Telegram bot API.<\/p>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<p>Please keep in mind that these Agent has been developed and shared for educational purposes only! Any misuse of this info will not be the responsibility of the author.<\/p>\n<\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"user-content-quick-start\"><strong><a href=\"https:\/\/github.com\/1N73LL1G3NC3x\/Nightmangle#quick-start\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Quick Start<\/a><\/strong><\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li><a href=\"http:\/\/rustup.rs\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Download Rust<\/a>.<\/li>\n\n\n\n<li>Create a new bot using&nbsp;<a href=\"https:\/\/t.me\/botfather\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">@Botfather<\/a>&nbsp;to get a token in the format&nbsp;<code>0123456789:XXXXxXXxxxXxX3x3x-3X-XxxxX3XXXXxx3X<\/code>.<\/li>\n\n\n\n<li>Put these token into&nbsp;<code>Bot::new(\"0123456789:XXXXxXXxxxXxX3x3x-3X-XxxxX3XXXXxx3X\")<\/code>.<\/li>\n\n\n\n<li>Obtain Telegram UserId for a bot maintainer user in the format&nbsp;<code>9876543210<\/code>.<\/li>\n\n\n\n<li>Put these UserId into&nbsp;<code>ConfigParameters {bot_maintainer: UserId(9876543210)}<\/code>.<\/li>\n\n\n\n<li>Make sure that your Rust compiler is up to date:<\/li>\n<\/ol>\n\n\n\n<pre class=\"wp-block-code\"><code>$ rustup update nightly\n$ rustup override set nightly<\/code><\/pre>\n\n\n\n<ol class=\"wp-block-list\" start=\"7\">\n<li>Compilation:<\/li>\n<\/ol>\n\n\n\n<pre class=\"wp-block-code\"><code># Windows PowerShell\n$ cargo build --release<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"user-content-agent\"><strong>Agent<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<p>Fully written in Rust<\/p>\n<\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"user-content-commands\"><a href=\"https:\/\/github.com\/1N73LL1G3NC3x\/Nightmangle#commands\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><strong>Commands:<\/strong><\/a><\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code>Help            - Display help info.                                                                \/help\nShowDir         - Show content of specified directory.                                              \/showdir {dirname}\nSendFile        - Get specified file from victim.                                                   \/sendfile {filepath}\nTask            - Execute specified shell commnd.                                                   \/task cmd.exe \/c {command}\nImperun         - Impersonate and run (Token Duplication UAC Bypass)                                \/imperun {list\/exec} {pid} {cmd.exe \/c whoami}\nScreenshot      - Take screenshot.                                                                  \/screenshot\nSt3al3r         - Steal saved credentials from browsers (Firefox, Edge, Chromium, Chrome, Brave)    \/st3al3r<\/code><\/pre>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgh7vFs9zro3nTD-8AreJvEqF65dmUXkILibgUfz3lkHdVSlGWeKMIV4gVn5VwrcQABztw8AT0kOwm3Yc2mW_2Q2PllAZri0JMTS_taMezOCWljI_ZFELsF3XQdCKpMvHdmoDAPO1X9UaZSdkYOIUWkYQHvpa21B_ySR_eshrfEjo1lRj7-gLn2bkVI_MoV\/s16000\/Credentials.webp\" alt=\"\"\/><\/figure>\n<\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgTpH-sP6Xl9egi0JRZrOl48x4Nmj68R8C1W-YwNskgIZ16v0M27y_oJkiATvmr4Or0b0-wL3FgFxb4nF8EWqg71iXm5VAucdpfZn1lloRgWWuN766wd0AdIIS1E_lGPrflGOGRINljbLMqfezJY2XMSvp5Kuo1M1EmOw3tMhapHEEWYvwNd8fRZkB5bXbL\/s16000\/task.webp\" alt=\"\"\/><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\" id=\"user-content-coffee\"><a href=\"https:\/\/github.com\/1N73LL1G3NC3x\/Nightmangle#coffee\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><strong>Coffee<\/strong><\/a><\/h2>\n\n\n\n<p>Coffee is a custom implementation of the original Cobalt Strike&#8217;s beacon_inline_execute. It supports most of the features of the Cobalt Strike compatibility layer, based on&nbsp;<a href=\"https:\/\/github.com\/hakaioffsec\/coffee\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Coffee<\/a>. To use these module, select BOF file with name ends with &#8216;.o&#8217; like&nbsp;<code>whoami.x64.o<\/code>&nbsp;to send.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>BOF Arguments<\/strong><\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code>Arguments for the BOF can be passed as caption to the message. Each argument must be prefixed with the type of the argument followed by a colon (:). The following types are supported:\n\n    str - A null-terminated string\n    wstr - A wide null-terminated string\n    int - A signed 32-bit integer\n    short - A signed 16-bit integer<\/code><\/pre>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhOgi4x3PwL-iVKQtWBIRGAVBxhtMbiw7XDeusI4h8tAjYQwnkUa0rUT6aoS8DMJOiP3frfF8TCFhBeggRyiGTzN0NDgwZEzP20r1Wgn9-9x4XHrWXupVstPNUorVAojYxwhFL-OQCaRvr6g3_LvhtCnoIe3f00lTMmTrqChLuQ8y-DsmaqtWXQg1Q-IZ1d\/s16000\/BOF.webp\" alt=\"\"\/><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\" id=\"user-content-in-memory-net-assembly-execution\"><a href=\"https:\/\/github.com\/1N73LL1G3NC3x\/Nightmangle#in-memory-net-assembly-execution\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><strong>In-memory .NET Assembly Execution<\/strong><\/a><\/h2>\n\n\n\n<p>Based on&nbsp;<a href=\"https:\/\/github.com\/yamakadi\/clroxide\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">ClrOxide<\/a>, it will load the CLR in the current process, resolve mscorlib, run your executable and return output back to the Telegram chat.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEip4jaVjT9Bwg9F8jFFSwb_hbgBhTjNqGzPxMaoZB_DrU7WL-xmF4V_OtGrrAuFT2sKU1zFu1L7xujW2X0TBLK09RgZJ31Jm-_hJyUuZuZkYo6KWFbNU4VTej1hrwwXKPmKOjZ9X01FzaiKBV2n_0DZsQUAgymu50sJVmkNtbfj-5j0dbv6b5h_azopwF5V\/s16000\/clr.png\" alt=\"\"\/><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\" id=\"user-content-token-duplication-uac-bypass\"><a href=\"https:\/\/github.com\/1N73LL1G3NC3x\/Nightmangle#token-duplication-uac-bypass\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><strong>Token Duplication UAC Bypass<\/strong><\/a><\/h2>\n\n\n\n<p>Imperun uses a token, stolen from an elevated process, to launch an elevated process of the attacker\u2019s choosing, based on&nbsp;<a href=\"https:\/\/github.com\/zblurx\/impersonate-rs\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Impersonate-RS<\/a>.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiOOgjhkrgxDaUYLV14xhSUPANyrlbj-Xb2f1gscvsxEQGTORJ-_VkI4DEAb1qAqHwPWYsnf7cOFzOJw7ikTlhxqFHa6fYD9FOSLj5mSmOmgfkhyphenhyphenJ6reBRkSSEBEJjJCQm1OAqShPlUd0VqSaUStBJoTtCL2a7bLYyfTt9AsTCuXKUWFVQb21LbUDlmyinw\/s16000\/imperun.webp\" alt=\"\"\/><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\" id=\"user-content-file-upload\"><a href=\"https:\/\/github.com\/1N73LL1G3NC3x\/Nightmangle#file-upload\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><strong>File Upload<\/strong><\/a><\/h2>\n\n\n\n<p>Just select file to send and add caption with destination directory, to the message.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"user-content-server\"><a href=\"https:\/\/github.com\/1N73LL1G3NC3x\/Nightmangle#server\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><strong>Server<\/strong><\/a><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Evasion: Telegram traffic can blend in with legitimate network traffic, making it less likely to be detected or blocked by network security solutions.<\/li>\n\n\n\n<li>Encryption: Telegram uses end-to-end encryption for messages and files, which adds a layer of security and privacy to communications between the attacker and compromised systems.<\/li>\n\n\n\n<li>Multi-platform Support: Telegram is available on various platforms, including desktop, mobile, and web. This flexibility allows attackers to control compromised systems from virtually anywhere.<\/li>\n\n\n\n<li>Rich Features: Telegram offers a range of features, such as the ability to send files, execute commands, and receive responses, making it a versatile choice for C2 communication.<\/li>\n\n\n\n<li>Reliability: Telegram is a widely used messaging platform with a reputation for reliability and uptime. This can be crucial for maintaining C2 connectivity.<\/li>\n\n\n\n<li>Large User Base: Telegram has a large user base, which can help an attacker blend in with legitimate users and make it more challenging for defenders to distinguish malicious activity.<\/li>\n\n\n\n<li>No Direct IP Connections: Telegram clients connect to Telegram&#8217;s servers, which then relay messages to the recipient. This can help hide the attacker&#8217;s IP address and location.<\/li>\n\n\n\n<li>Evasion of Traditional Detection Methods: Telegram&#8217;s use of HTTPS and TLS encryption for traffic can make it harder for traditional intrusion detection systems (IDS) and intrusion prevention systems (IPS) to inspect or block malicious traffic.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Nightmangle is post-exploitation Telegram Command and Control (C2\/C&amp;C) Agent, created by&nbsp;@1N73LL1G3NC3. It was developed as Proof of Concept (POC), that Telegram API can be used by threat actors for post-exploitation and to control their agents.. Nightmangle uses Telegram as a C2 server to communicate between the attacker and the client. However, it can only set [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":30682,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhfxHEpjQNf1w_r0eHYa77xO18PWuLb2Wc217M9E-C9cQJ9xJ7WPa5xr-u2OFuCTHUMWFQnWWs_yWMpQWHM69vDcwR44ZATQ1w3FRQY5GS4XotjnpgLHX-IaUxg9nhEuhkFUtctCtxVWZtvrtDLdnA5F_xZMZVOAMaO9PD_EJ-Hw_bRuDCOuqdEELgdWA\/s16000\/nightmangle.webp","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[20],"tags":[737,6321,6052,6325,6342],"class_list":["post-30665","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-cybersecurity","tag-informationsecurity","tag-kalilinux","tag-kalilinuxtools","tag-nightmangle"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Nightmangle - Cyber Espionage via Telegram&#039;s C2 Agent Explore<\/title>\n<meta name=\"description\" content=\"Nightmangle is post-exploitation Telegram Command and Control (C2\/C&amp;C) Agent, created by\u00a0@1N73LL1G3NC3.It was developed as Proof of Concept\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/nightmangle\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Nightmangle - Cyber Espionage via Telegram&#039;s C2 Agent Explore\" \/>\n<meta property=\"og:description\" content=\"Nightmangle is post-exploitation Telegram Command and Control (C2\/C&amp;C) Agent, created by\u00a0@1N73LL1G3NC3.It was developed as Proof of Concept\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/nightmangle\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-06T08:57:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-06T08:57:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhfxHEpjQNf1w_r0eHYa77xO18PWuLb2Wc217M9E-C9cQJ9xJ7WPa5xr-u2OFuCTHUMWFQnWWs_yWMpQWHM69vDcwR44ZATQ1w3FRQY5GS4XotjnpgLHX-IaUxg9nhEuhkFUtctCtxVWZtvrtDLdnA5F_xZMZVOAMaO9PD_EJ-Hw_bRuDCOuqdEELgdWA\/s16000\/nightmangle.webp\" \/>\n<meta name=\"author\" content=\"Varshini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhfxHEpjQNf1w_r0eHYa77xO18PWuLb2Wc217M9E-C9cQJ9xJ7WPa5xr-u2OFuCTHUMWFQnWWs_yWMpQWHM69vDcwR44ZATQ1w3FRQY5GS4XotjnpgLHX-IaUxg9nhEuhkFUtctCtxVWZtvrtDLdnA5F_xZMZVOAMaO9PD_EJ-Hw_bRuDCOuqdEELgdWA\/s16000\/nightmangle.webp\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Varshini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/nightmangle\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/nightmangle\/\"},\"author\":{\"name\":\"Varshini\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\"},\"headline\":\"Nightmangle &#8211; Cyber Espionage via Telegram&#8217;s C2 Agent ExploredNightmangle\",\"datePublished\":\"2023-10-06T08:57:01+00:00\",\"dateModified\":\"2023-10-06T08:57:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/nightmangle\/\"},\"wordCount\":532,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/nightmangle\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhfxHEpjQNf1w_r0eHYa77xO18PWuLb2Wc217M9E-C9cQJ9xJ7WPa5xr-u2OFuCTHUMWFQnWWs_yWMpQWHM69vDcwR44ZATQ1w3FRQY5GS4XotjnpgLHX-IaUxg9nhEuhkFUtctCtxVWZtvrtDLdnA5F_xZMZVOAMaO9PD_EJ-Hw_bRuDCOuqdEELgdWA\/s16000\/nightmangle.webp\",\"keywords\":[\"cybersecurity\",\"informationsecurity\",\"kalilinux\",\"kalilinuxtools\",\"Nightmangle\"],\"articleSection\":[\"Cyber security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/nightmangle\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/nightmangle\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/nightmangle\/\",\"name\":\"Nightmangle - Cyber Espionage via Telegram's C2 Agent Explore\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/nightmangle\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/nightmangle\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhfxHEpjQNf1w_r0eHYa77xO18PWuLb2Wc217M9E-C9cQJ9xJ7WPa5xr-u2OFuCTHUMWFQnWWs_yWMpQWHM69vDcwR44ZATQ1w3FRQY5GS4XotjnpgLHX-IaUxg9nhEuhkFUtctCtxVWZtvrtDLdnA5F_xZMZVOAMaO9PD_EJ-Hw_bRuDCOuqdEELgdWA\/s16000\/nightmangle.webp\",\"datePublished\":\"2023-10-06T08:57:01+00:00\",\"dateModified\":\"2023-10-06T08:57:14+00:00\",\"description\":\"Nightmangle is post-exploitation Telegram Command and Control (C2\/C&C) Agent, created by\u00a0@1N73LL1G3NC3.It was developed as Proof of Concept\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/nightmangle\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/nightmangle\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhfxHEpjQNf1w_r0eHYa77xO18PWuLb2Wc217M9E-C9cQJ9xJ7WPa5xr-u2OFuCTHUMWFQnWWs_yWMpQWHM69vDcwR44ZATQ1w3FRQY5GS4XotjnpgLHX-IaUxg9nhEuhkFUtctCtxVWZtvrtDLdnA5F_xZMZVOAMaO9PD_EJ-Hw_bRuDCOuqdEELgdWA\/s16000\/nightmangle.webp\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhfxHEpjQNf1w_r0eHYa77xO18PWuLb2Wc217M9E-C9cQJ9xJ7WPa5xr-u2OFuCTHUMWFQnWWs_yWMpQWHM69vDcwR44ZATQ1w3FRQY5GS4XotjnpgLHX-IaUxg9nhEuhkFUtctCtxVWZtvrtDLdnA5F_xZMZVOAMaO9PD_EJ-Hw_bRuDCOuqdEELgdWA\/s16000\/nightmangle.webp\",\"width\":\"1600\",\"height\":\"900\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\",\"name\":\"Varshini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"caption\":\"Varshini\"},\"description\":\"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.\",\"sameAs\":[\"http:\/\/kalilinuxtutorials.com\",\"https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/\"],\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Nightmangle - Cyber Espionage via Telegram's C2 Agent Explore","description":"Nightmangle is post-exploitation Telegram Command and Control (C2\/C&C) Agent, created by\u00a0@1N73LL1G3NC3.It was developed as Proof of Concept","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/nightmangle\/","og_locale":"en_US","og_type":"article","og_title":"Nightmangle - Cyber Espionage via Telegram's C2 Agent Explore","og_description":"Nightmangle is post-exploitation Telegram Command and Control (C2\/C&C) Agent, created by\u00a0@1N73LL1G3NC3.It was developed as Proof of Concept","og_url":"https:\/\/kalilinuxtutorials.com\/nightmangle\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2023-10-06T08:57:01+00:00","article_modified_time":"2023-10-06T08:57:14+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhfxHEpjQNf1w_r0eHYa77xO18PWuLb2Wc217M9E-C9cQJ9xJ7WPa5xr-u2OFuCTHUMWFQnWWs_yWMpQWHM69vDcwR44ZATQ1w3FRQY5GS4XotjnpgLHX-IaUxg9nhEuhkFUtctCtxVWZtvrtDLdnA5F_xZMZVOAMaO9PD_EJ-Hw_bRuDCOuqdEELgdWA\/s16000\/nightmangle.webp","type":"","width":"","height":""}],"author":"Varshini","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhfxHEpjQNf1w_r0eHYa77xO18PWuLb2Wc217M9E-C9cQJ9xJ7WPa5xr-u2OFuCTHUMWFQnWWs_yWMpQWHM69vDcwR44ZATQ1w3FRQY5GS4XotjnpgLHX-IaUxg9nhEuhkFUtctCtxVWZtvrtDLdnA5F_xZMZVOAMaO9PD_EJ-Hw_bRuDCOuqdEELgdWA\/s16000\/nightmangle.webp","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Varshini","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/nightmangle\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/nightmangle\/"},"author":{"name":"Varshini","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa"},"headline":"Nightmangle &#8211; Cyber Espionage via Telegram&#8217;s C2 Agent ExploredNightmangle","datePublished":"2023-10-06T08:57:01+00:00","dateModified":"2023-10-06T08:57:14+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/nightmangle\/"},"wordCount":532,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/nightmangle\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhfxHEpjQNf1w_r0eHYa77xO18PWuLb2Wc217M9E-C9cQJ9xJ7WPa5xr-u2OFuCTHUMWFQnWWs_yWMpQWHM69vDcwR44ZATQ1w3FRQY5GS4XotjnpgLHX-IaUxg9nhEuhkFUtctCtxVWZtvrtDLdnA5F_xZMZVOAMaO9PD_EJ-Hw_bRuDCOuqdEELgdWA\/s16000\/nightmangle.webp","keywords":["cybersecurity","informationsecurity","kalilinux","kalilinuxtools","Nightmangle"],"articleSection":["Cyber security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/nightmangle\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/nightmangle\/","url":"https:\/\/kalilinuxtutorials.com\/nightmangle\/","name":"Nightmangle - Cyber Espionage via Telegram's C2 Agent Explore","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/nightmangle\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/nightmangle\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhfxHEpjQNf1w_r0eHYa77xO18PWuLb2Wc217M9E-C9cQJ9xJ7WPa5xr-u2OFuCTHUMWFQnWWs_yWMpQWHM69vDcwR44ZATQ1w3FRQY5GS4XotjnpgLHX-IaUxg9nhEuhkFUtctCtxVWZtvrtDLdnA5F_xZMZVOAMaO9PD_EJ-Hw_bRuDCOuqdEELgdWA\/s16000\/nightmangle.webp","datePublished":"2023-10-06T08:57:01+00:00","dateModified":"2023-10-06T08:57:14+00:00","description":"Nightmangle is post-exploitation Telegram Command and Control (C2\/C&C) Agent, created by\u00a0@1N73LL1G3NC3.It was developed as Proof of Concept","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/nightmangle\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/nightmangle\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhfxHEpjQNf1w_r0eHYa77xO18PWuLb2Wc217M9E-C9cQJ9xJ7WPa5xr-u2OFuCTHUMWFQnWWs_yWMpQWHM69vDcwR44ZATQ1w3FRQY5GS4XotjnpgLHX-IaUxg9nhEuhkFUtctCtxVWZtvrtDLdnA5F_xZMZVOAMaO9PD_EJ-Hw_bRuDCOuqdEELgdWA\/s16000\/nightmangle.webp","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhfxHEpjQNf1w_r0eHYa77xO18PWuLb2Wc217M9E-C9cQJ9xJ7WPa5xr-u2OFuCTHUMWFQnWWs_yWMpQWHM69vDcwR44ZATQ1w3FRQY5GS4XotjnpgLHX-IaUxg9nhEuhkFUtctCtxVWZtvrtDLdnA5F_xZMZVOAMaO9PD_EJ-Hw_bRuDCOuqdEELgdWA\/s16000\/nightmangle.webp","width":"1600","height":"900"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa","name":"Varshini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","caption":"Varshini"},"description":"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.","sameAs":["http:\/\/kalilinuxtutorials.com","https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/"],"url":"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhfxHEpjQNf1w_r0eHYa77xO18PWuLb2Wc217M9E-C9cQJ9xJ7WPa5xr-u2OFuCTHUMWFQnWWs_yWMpQWHM69vDcwR44ZATQ1w3FRQY5GS4XotjnpgLHX-IaUxg9nhEuhkFUtctCtxVWZtvrtDLdnA5F_xZMZVOAMaO9PD_EJ-Hw_bRuDCOuqdEELgdWA\/s16000\/nightmangle.webp","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":30608,"url":"https:\/\/kalilinuxtutorials.com\/awesome-command-and-control\/","url_meta":{"origin":30665,"position":0},"title":"Awesome Command And Control","author":"Varshini","date":"October 4, 2023","format":false,"excerpt":"A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assessments. If you'd like to\u00a0contribute\u00a0to this list, simply open a PR with your additions. Maintained by\u00a0@tcostam. If you have contributions but can't pull request, give me a shout at twitter. Table Of Contents\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc8vcyb8ZLSimS20xiQLPU-c5s6BGpapTb2JjRZItKLqcyKzkOujWOraWQz91OYA4luq2tciF14CKi1kVByxILh-uHYEnwAPXLeJLzA20qxvdIwAKaVqTP3QWwDkOz9rRcbIYVSWh8-7nELAGXpqDgIUm77Bs7SCQl_9Lx5qD1MfpIq-p485Lecx5_aj3B\/s16000\/Untitled%20design%20%2814%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc8vcyb8ZLSimS20xiQLPU-c5s6BGpapTb2JjRZItKLqcyKzkOujWOraWQz91OYA4luq2tciF14CKi1kVByxILh-uHYEnwAPXLeJLzA20qxvdIwAKaVqTP3QWwDkOz9rRcbIYVSWh8-7nELAGXpqDgIUm77Bs7SCQl_9Lx5qD1MfpIq-p485Lecx5_aj3B\/s16000\/Untitled%20design%20%2814%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc8vcyb8ZLSimS20xiQLPU-c5s6BGpapTb2JjRZItKLqcyKzkOujWOraWQz91OYA4luq2tciF14CKi1kVByxILh-uHYEnwAPXLeJLzA20qxvdIwAKaVqTP3QWwDkOz9rRcbIYVSWh8-7nELAGXpqDgIUm77Bs7SCQl_9Lx5qD1MfpIq-p485Lecx5_aj3B\/s16000\/Untitled%20design%20%2814%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc8vcyb8ZLSimS20xiQLPU-c5s6BGpapTb2JjRZItKLqcyKzkOujWOraWQz91OYA4luq2tciF14CKi1kVByxILh-uHYEnwAPXLeJLzA20qxvdIwAKaVqTP3QWwDkOz9rRcbIYVSWh8-7nELAGXpqDgIUm77Bs7SCQl_9Lx5qD1MfpIq-p485Lecx5_aj3B\/s16000\/Untitled%20design%20%2814%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc8vcyb8ZLSimS20xiQLPU-c5s6BGpapTb2JjRZItKLqcyKzkOujWOraWQz91OYA4luq2tciF14CKi1kVByxILh-uHYEnwAPXLeJLzA20qxvdIwAKaVqTP3QWwDkOz9rRcbIYVSWh8-7nELAGXpqDgIUm77Bs7SCQl_9Lx5qD1MfpIq-p485Lecx5_aj3B\/s16000\/Untitled%20design%20%2814%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc8vcyb8ZLSimS20xiQLPU-c5s6BGpapTb2JjRZItKLqcyKzkOujWOraWQz91OYA4luq2tciF14CKi1kVByxILh-uHYEnwAPXLeJLzA20qxvdIwAKaVqTP3QWwDkOz9rRcbIYVSWh8-7nELAGXpqDgIUm77Bs7SCQl_9Lx5qD1MfpIq-p485Lecx5_aj3B\/s16000\/Untitled%20design%20%2814%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":32759,"url":"https:\/\/kalilinuxtutorials.com\/meta-sploit-telegram-ms-tl\/","url_meta":{"origin":30665,"position":1},"title":"Meta Sploit Telegram (MS-TL) : Unleashing Remote Control Capabilities Through Telegram","author":"Varshini","date":"April 15, 2024","format":false,"excerpt":"Explore the cutting-edge capabilities of Meta Sploit Telegram (MS-TL), a powerful Telegram bot designed for remote PC control. This article guides you through the installation process and demonstrates how to effectively commandeer computers via simple Telegram commands. Unlock the potential of MS-TL and transform your approach to remote system management.\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEipL38LnaO9k6BUFCw8ZGNss_0EfPVkb3kkGPrtV4k8OS8MPm1VDV_Qtohs6yGmwYfZ_JHyQnw0pcsBKpXxqZazLj6vB8BdgwcDtAbAuCwS2pPY9mXV7g9hHVUeWoZbvrEAAD6N2kGb-pBePmXHw_qXL8gIUOXKmYA8EXq-yE5_GDzWsKPecMeyVK0gvmGe\/s16000\/Meta%20Sploit%20Telegram%20%28MS-TL%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEipL38LnaO9k6BUFCw8ZGNss_0EfPVkb3kkGPrtV4k8OS8MPm1VDV_Qtohs6yGmwYfZ_JHyQnw0pcsBKpXxqZazLj6vB8BdgwcDtAbAuCwS2pPY9mXV7g9hHVUeWoZbvrEAAD6N2kGb-pBePmXHw_qXL8gIUOXKmYA8EXq-yE5_GDzWsKPecMeyVK0gvmGe\/s16000\/Meta%20Sploit%20Telegram%20%28MS-TL%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEipL38LnaO9k6BUFCw8ZGNss_0EfPVkb3kkGPrtV4k8OS8MPm1VDV_Qtohs6yGmwYfZ_JHyQnw0pcsBKpXxqZazLj6vB8BdgwcDtAbAuCwS2pPY9mXV7g9hHVUeWoZbvrEAAD6N2kGb-pBePmXHw_qXL8gIUOXKmYA8EXq-yE5_GDzWsKPecMeyVK0gvmGe\/s16000\/Meta%20Sploit%20Telegram%20%28MS-TL%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEipL38LnaO9k6BUFCw8ZGNss_0EfPVkb3kkGPrtV4k8OS8MPm1VDV_Qtohs6yGmwYfZ_JHyQnw0pcsBKpXxqZazLj6vB8BdgwcDtAbAuCwS2pPY9mXV7g9hHVUeWoZbvrEAAD6N2kGb-pBePmXHw_qXL8gIUOXKmYA8EXq-yE5_GDzWsKPecMeyVK0gvmGe\/s16000\/Meta%20Sploit%20Telegram%20%28MS-TL%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEipL38LnaO9k6BUFCw8ZGNss_0EfPVkb3kkGPrtV4k8OS8MPm1VDV_Qtohs6yGmwYfZ_JHyQnw0pcsBKpXxqZazLj6vB8BdgwcDtAbAuCwS2pPY9mXV7g9hHVUeWoZbvrEAAD6N2kGb-pBePmXHw_qXL8gIUOXKmYA8EXq-yE5_GDzWsKPecMeyVK0gvmGe\/s16000\/Meta%20Sploit%20Telegram%20%28MS-TL%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEipL38LnaO9k6BUFCw8ZGNss_0EfPVkb3kkGPrtV4k8OS8MPm1VDV_Qtohs6yGmwYfZ_JHyQnw0pcsBKpXxqZazLj6vB8BdgwcDtAbAuCwS2pPY9mXV7g9hHVUeWoZbvrEAAD6N2kGb-pBePmXHw_qXL8gIUOXKmYA8EXq-yE5_GDzWsKPecMeyVK0gvmGe\/s16000\/Meta%20Sploit%20Telegram%20%28MS-TL%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":6416,"url":"https:\/\/kalilinuxtutorials.com\/telegra-csharp-c2\/","url_meta":{"origin":30665,"position":2},"title":"Telegra Csharp C2 : Command and Control for C# Writing","author":"R K","date":"September 5, 2019","format":false,"excerpt":"Telegra Csharp C2 is a tool for command and control for C# Writing. TelegramBotClient allows you to use a proxy for Bot API connections. VirusTotal check result Don't pass it on to Virus Total anymore. I've tried it for you. Install Nuget download these package using System.IO;using Telegram.Bot;using Telegram.Bot.Args;using Telegram.Bot.Types.InputFiles;using\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":8533,"url":"https:\/\/kalilinuxtutorials.com\/telegram-scraper\/","url_meta":{"origin":30665,"position":3},"title":"TeleGram-Scraper : Telegram Group Scraper Tool","author":"R K","date":"January 24, 2020","format":false,"excerpt":"TeleGram-Scraper is a telegram group scraper tool to fetch all information about group members. How To Install & Setup API ( Termux ) https:\/\/youtu.be\/I8oR9tuYyrU API Setup Go to http:\/\/my.telegram.org and log in. Click on API development tools and fill the required fields. put app name you want & select other\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/I8oR9tuYyrU\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":31556,"url":"https:\/\/kalilinuxtutorials.com\/telegram-nearby-map\/","url_meta":{"origin":30665,"position":4},"title":"Telegram Nearby Map: How to Find Nearby Users and Their Approximate Locations","author":"Varshini","date":"December 20, 2023","format":false,"excerpt":"Have you ever wondered if you could find Telegram users close and get a sense of where they are? You can with Telegram Nearby Map! Today, we're going to talk about how this smart tool uses OpenStreetMap and Telegram to help you find people nearby. We'll show you how to\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgJOukwqlGsnWjDUjux5SzxFy_CPmXxLVCCpl4u5p2QAq-UdivGhQC3jyThEPiLnpGH2kl1TBsKOI3KZkN5LjmhiwwPUQr_R3NZwXxF0L1Nv-b-F_haHjAr_PnPpRHTs_fT9EyAT15W5_FDA3mf8DMcvoiT6WDSALRjlVTbz3QpztI36G-yRFYOpYvnYA\/s16000\/Telegram%20Nearby%20Map.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgJOukwqlGsnWjDUjux5SzxFy_CPmXxLVCCpl4u5p2QAq-UdivGhQC3jyThEPiLnpGH2kl1TBsKOI3KZkN5LjmhiwwPUQr_R3NZwXxF0L1Nv-b-F_haHjAr_PnPpRHTs_fT9EyAT15W5_FDA3mf8DMcvoiT6WDSALRjlVTbz3QpztI36G-yRFYOpYvnYA\/s16000\/Telegram%20Nearby%20Map.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgJOukwqlGsnWjDUjux5SzxFy_CPmXxLVCCpl4u5p2QAq-UdivGhQC3jyThEPiLnpGH2kl1TBsKOI3KZkN5LjmhiwwPUQr_R3NZwXxF0L1Nv-b-F_haHjAr_PnPpRHTs_fT9EyAT15W5_FDA3mf8DMcvoiT6WDSALRjlVTbz3QpztI36G-yRFYOpYvnYA\/s16000\/Telegram%20Nearby%20Map.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgJOukwqlGsnWjDUjux5SzxFy_CPmXxLVCCpl4u5p2QAq-UdivGhQC3jyThEPiLnpGH2kl1TBsKOI3KZkN5LjmhiwwPUQr_R3NZwXxF0L1Nv-b-F_haHjAr_PnPpRHTs_fT9EyAT15W5_FDA3mf8DMcvoiT6WDSALRjlVTbz3QpztI36G-yRFYOpYvnYA\/s16000\/Telegram%20Nearby%20Map.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgJOukwqlGsnWjDUjux5SzxFy_CPmXxLVCCpl4u5p2QAq-UdivGhQC3jyThEPiLnpGH2kl1TBsKOI3KZkN5LjmhiwwPUQr_R3NZwXxF0L1Nv-b-F_haHjAr_PnPpRHTs_fT9EyAT15W5_FDA3mf8DMcvoiT6WDSALRjlVTbz3QpztI36G-yRFYOpYvnYA\/s16000\/Telegram%20Nearby%20Map.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgJOukwqlGsnWjDUjux5SzxFy_CPmXxLVCCpl4u5p2QAq-UdivGhQC3jyThEPiLnpGH2kl1TBsKOI3KZkN5LjmhiwwPUQr_R3NZwXxF0L1Nv-b-F_haHjAr_PnPpRHTs_fT9EyAT15W5_FDA3mf8DMcvoiT6WDSALRjlVTbz3QpztI36G-yRFYOpYvnYA\/s16000\/Telegram%20Nearby%20Map.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":5503,"url":"https:\/\/kalilinuxtutorials.com\/tourmaline-telegram-bot\/","url_meta":{"origin":30665,"position":5},"title":"Tourmaline : Telegram Bot Framework For Crystal","author":"R K","date":"June 27, 2019","format":false,"excerpt":"Tourmaline is a Telegram Bot (and hopefully soon Client) API framework for Crystal. Based heavily off of\u00a0Telegraf\u00a0this Crystal implementation allows your Telegram bot to be written in a language that's both beautiful and fast. Benchmarks coming soon. Installation Add this to your application's\u00a0shard.yml: dependencies: tourmaline: github: watzon\/tourmaline version: ~> 0.7.0\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/30665","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=30665"}],"version-history":[{"count":8,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/30665\/revisions"}],"predecessor-version":[{"id":30681,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/30665\/revisions\/30681"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/30682"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=30665"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=30665"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=30665"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}