SkillAgentSearch skills...

GhostShell

Covert C2 tool using Telegram Bot API as communication channel, command delivery is implemented by transfering emojis

Install / Use

/learn @s0ld13rr/GhostShell
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

GhostShell

image

GhostShell is a stealthy command execution tool that leverages Telegram and emoji encoding to send commands to a remote agent while maintaining a low profile. The agent decodes the commands and executes them on the target machine, sending responses back to the operator.

Features

  • 🔥 Stealth Mode – Uses emoji encoding for obfuscation.
  • 🎭 Telegram-based Communication – No direct network exposure.
  • 📸 Screenshots & Webcam Capture – Retrieve visual data remotely.
  • 📁 File Management – View, download, and upload files.
  • 💻 System Commands Execution – Run shell commands remotely.

Installation

  1. Clone the repository:
    git clone https://github.com/your-repo/GhostShell.git
    cd GhostShell
    
  2. Install dependencies:
    pip install -r requirements.txt
    
  3. Configure your API credentials in console.py:
    API_ID = "your_api_id"
    API_HASH = "your_api_hash"
    CHAT_ID = your_chat_id
    
  4. Run the agent on the target machine:
    python agent.py
    
  5. Start the command console:
    python console.py
    

Usage

  1. Launch the console:
    python console.py
    
  2. Enter your commands (e.g., whoami, screenshot, downloadFile <path>).
  3. The response will be received in your terminal.
  4. Type exit to quit.

Examples

image

Encoded command send from Telegram account to C2 agent.

image

Usage of console.py to send commands to Bot.

Disclaimer

This tool is intended for educational and security research purposes only. Unauthorized use is strictly prohibited. The developers are not responsible for any misuse of this software.


GhostShell 🕶️👻 - Stay in the shadows!

Related Skills

View on GitHub
GitHub Stars4
CategoryDevelopment
Updated4mo ago
Forks0

Languages

Python

Security Score

72/100

Audited on Nov 11, 2025

No findings