This script takes in JSON files exported from Telegram chat history and finds credit/debit card information in posts with keyword mentions. This is to be used to search dumps for sensitive data so the victims can be made aware of the breach and the cards can be canceled. This is ONLY created to PREVENT further exploitation.
Accepted cc formats:
0000000000000000|MM|YY|000
0000000000000000|MM|YY|0000
0000000000000000|MM|YYYY|000
0000000000000000|MM|YYYY|0000
The | can also be a :
This script is written in Python 3.12.0.
- Find a Telegram channel with credit/debit card dumps in a format shown above.
- Export chat history as a JSON (machine readable) format by navigating to the top right menu of the Telegram desktop app. Deselect all boxes and change
HTML
toJSON
. Export as many
- Download
telegram-cc-parser.py
. - Run the following command from terminal:
python3 telegram_cc_parser.py [file_or_directory_path] [keyword]
- After a short time, the results will be exported to a
csv
file with the following format:
from-channel-name
: channel name post originated fromfrom-channel-id
: channel IDmessage-id
: unique message ID (to find exact message by appending to Telegram chat URL)date
: MM/DD/YYYYtime
: 00:00:00bin
: first 6 digits of card numbercc-number
: card numberexpiration
: expiration datecvv
: pinlink
: link to message
Please use responsibly! This is an open-source intelligence (OSINT) tool, and as any of these tools, it should be used to counteract criminal activity and protect victim data.
I originally created this for a more narrow use case and didn't intend to share it, but I realized its potential to help a researcher/analyst that stumbles accross it. If you have any suggestions on further features, or if you encounter bugs, please open an issue. Also feel free to contact me directly!
This tool takes in TXT files downloaded from Telegram and parses out credentials using keyword matches. This is to be used to search dumps for sensitive data so the victims can be made aware of the breach and the credentials can be deactivated. This is ONLY created to PREVENT further exploitation.
Enter the path to a directory of TXT files downloaded from the target Telegram channel. The results will be output into a CSV file titled "credentials."