A powerful Python script that allows you to scrape messages and media from Telegram channels using the Telethon library. Features include real-time continuous scraping, media downloading, and data export capabilities.
☆333Apr 29, 2026Updated this week
Alternatives and similar repositories for telegram-scraper
Users that are interested in telegram-scraper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Telegram cybersecurity channels.☆20Oct 27, 2025Updated 6 months ago
- Run TTPs, with AI!☆128Feb 23, 2026Updated 2 months ago
- Educational Chrome extensions simulating real-world attacker behavior in the browser. Built for Red Team demos, threat emulation, and adv…☆21Dec 18, 2025Updated 4 months ago
- Common framework for designing a detection and response framework for the most common MFT solutions☆16Aug 4, 2023Updated 2 years ago
- ExchangeHound is a defensive BloodHound OpenGraph collector for on-prem Microsoft Exchange that maps mailbox delegation and Exchange priv…☆68Apr 17, 2026Updated 2 weeks ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- AV/EDR evasion via direct and indirect system calls Windows NT 3.1 through Windows 11 24H2 · x64 · x86 · WoW64 · ARM64☆466Mar 7, 2026Updated last month
- ☆16May 17, 2018Updated 7 years ago
- LLM Agent Skill for YARA rule authoring and review☆53Feb 8, 2026Updated 2 months ago
- A Windows 11 Rootkit. (Exploit has been patched)☆17Sep 7, 2025Updated 7 months ago
- Dark Light Viewer - a tool to conduct change detection over time using VIIRS night lights data.☆42Mar 3, 2026Updated 2 months ago
- ⚙️ Starter backend for building e-commerce applications. Includes auth, products, orders, search, background jobs, and Docker infrastruct…☆46Mar 14, 2026Updated last month
- A tool to check microsofts user real endpoint to get data about a tenant.☆16Feb 6, 2025Updated last year
- Kali Linux Polyglot Harness for Autonomous Pentesting/Cyber Security☆76Apr 21, 2026Updated 2 weeks ago
- A list of OSINT tools & resources for (fraud-)investigators, CTI-analysts, KYC, AML and more.☆742Apr 17, 2026Updated 2 weeks ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- The Big Brother V4.0 is a weaponized OSINT platform featuring username enumeration (473+ platforms), quad-vector visual intelligence, Sky…☆589Mar 26, 2026Updated last month
- About Us☆19Mar 30, 2024Updated 2 years ago
- OSCP prep checklist - study plan, exam structure, tools, and methodology☆68Feb 4, 2026Updated 3 months ago
- Tool to securely and efficiently wipe devices and partiitions for Linux☆160Feb 5, 2026Updated 3 months ago
- Tools for generating and validating IBANs (International Bank Account Numbers)☆10Aug 11, 2020Updated 5 years ago
- A way to maintain long-term access to Windows LAPS for lateral movement in AD via installing an Offensive LAPS RPC backdoor on a DC.☆30Jun 9, 2025Updated 10 months ago
- Website vuln example.☆11Apr 10, 2026Updated 3 weeks ago
- This project is a server-side solution for seamless URL redirection when a QR code is scanned. It redirects users to a specified URL and …☆15Aug 18, 2024Updated last year
- Crawl (~600K) labeled Portable Exe files from Microsoft Cabs☆14Jul 31, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A interactive notebook for the terminal☆32Nov 12, 2024Updated last year
- BlackMail is a tool for creating and sending spoof mail.☆37Nov 16, 2023Updated 2 years ago
- Disposable, ephemeral network infrastructure powered by GitHub Codespaces.☆115Updated this week
- IOCs and notes related to malware☆27Jul 7, 2025Updated 9 months ago
- Hunt for AI coding artifacts containing secrets.☆57Apr 24, 2026Updated last week
- Rust library implementing the Toorani-Beheshti signcryption scheme☆13Aug 15, 2023Updated 2 years ago
- Operation Archive - Saving the history behind Cybercriminal Arrests, Documentation, Raids, Seizures, and more!☆68Oct 17, 2025Updated 6 months ago
- ⌘ BotCommander - A lightweight web interface for managing multiple Python bots☆41Feb 27, 2026Updated 2 months ago
- International Space Station locator made using wheretheiss.at's API and Express.js☆16Dec 20, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Open Database Hunting - Finding potential breaches.☆10Feb 2, 2022Updated 4 years ago
- Reverse shell hecho en Java, donde tendremos el código correspondiente para la máquina cliente (atacante) y para el servidor (víctima)☆12Mar 13, 2024Updated 2 years ago
- Scripts for rapid Windows endpoint "tactical triage" and investigations with Velociraptor and KAPE☆195Apr 1, 2026Updated last month
- Brows is a file manager with a command palette☆40Feb 7, 2025Updated last year
- master-data-management system☆12Jan 7, 2023Updated 3 years ago
- Automatic, fast parsing of browser artifacts☆17Jan 4, 2025Updated last year
- Collection of port scans of the North Korean IPv4 subnets from different vps☆17Nov 25, 2025Updated 5 months ago