PreviewGram is for users that wants get a more private experience with the Telegram's Channel.

Overview

PreviewGram Cover

Private PreviewGram

Run away from Metadata

[ ⚠️ ] - Warning:

USE A VPN TO HIDE YOUR IP IT'S IN TEST

PreviewGram is under LGPL License

Application's theme from UN-GCPDS/qt-material under BSD-2-Clause License.

Why use?

PreviewGram is for users that wants get a more private experience with the Telegram's Channel. It's because:

  • Telegram collects when you see determinate content
  • Groups show publicly who are the followers*
  • The channel owners can see who are them followers
  • Telegram added Group Read Receipts*
  • You must to trust on Telegram's Servers
  • * PreviewGram doesn't protects you against it, because can't view Group Chats.

[ ⚠️ ] - Warning

If you don't enabled Github's JavaScript, go to Telegram Privacy Issues Topic to understand more.

How to install

> pip install -r requirements.txt
> py -m build
> pip install dist/Private\ PreviewGram-1.1.tar.gz

[ ⚠️ ] - Note If you're in another version, change the 1.1 for the current version.

Or Download Last Release

Running without install

  • Clone this project
git clone https://github.com/RickBarretto/PreviewGram.git
pip -m test_application.py

Features

PreviewGram Screenshot

PreviewGram protects you when:

  • Disables JavaScript when Browsing
    • Doesn't store cookies
    • Doesn't run trackers
  • Uses a generic Chrome user-agent
  • Doesn't use Telegram's API
  • Doesn't require a Account

Useful Features:

  • Store locally your favorites Channels
  • Can't open some links

Limitations

PreviewGram isn't the perfection on Earth. Because:

  1. Doesn't use JavaScript
  2. It's limited by the Telegram's Preview Site itself.

So, PreviewGram can't:

  • Hide your IP*
  • Play videos**
  • See Group Chats***
  • Download files directly*** (instead this, do: RMB**** > Copy link address and download on Telegram App)

Tips

  • Always use Vpn or Proxy
  • To open links, do RMB* > Copy link address
  • If you want to watch videos, please use Tor** (or any Browser that you trust)
  • Click on Test privacy! button to test for yourself. It's tested by What Is My Browser***

Extra: Accessing channels through TorBrowser

Go to Accessing via Tor topic.

VPN, Proxy and Tor

Differences

Proxy

Proxy is your online ID, hiding you real IP Address. It's a intermediary between your Web Browser and the internet, a web site for example. (Needs to be configured per-app basis)

VPN

VPN covers 100% of you device traffic, encrypting the connection. It'll hide your real IP Address.

The Onion Route (Tor)

Tor anonymizes your traffic sending it through a series of proxies, this proxies are called Nodes, that encrypts the traffic and sends to destiny using a Exit Node.

Sources:

The Tor's Power

With and Without Tor:

Tor: off / Https: off Tor: off / Https: on Tor: on / Https: on
Tor: off / Https: off Tor: off / Https: on Tor: on / Https: on

Source: When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?

Why PreviewGram doesn't use Tor's Proxy by itself?

Tor have some issues, and aren't recommended to use Tor outside TorBrowser to avoid DNS Leaks and VPN+TOR issues.

Sources:

But What The F 😡 😡 😡 talking about Tor, if PreviewGram doesn't use it???

Because you can Access the channels via Tor

Yep, you don't need this application if you have Tor... 🙃

Accessing via Tor

  1. Create a "Telegram Channels" Folder on Bookmarks
    • Create Folder
  2. To access your favorite channel, put a /s/ between the domain and channel name, example: https://t.me/previewgram to https://t.me/s/previewgram
  3. Save to "Telegram Channels"'s Bookmark Folder
    • Save to BookMark
  4. Access when you want!
  5. Extra: make Tor portable and use the Mobile Tor Browser to use everywhere.

Sources:

Help PreviewGram

If you're a Dev (or not), help PreviewGram forking and making pull requests. Don't afraid to use the Github's Issue Tab to make critics, suggestions, bugs and security reports! 😉


To Do

  • Block telegram.org and other https requests using the webView.page().profile().setUrlRequestInterceptor(interceptor) (Thanks, dbunk!)
  • Channel Categories
  • Open on Tor
  • UI improvements?

Telegram Privacy Issues

As any Social Network app, Telegram suffers with Osint (Open-Source Intelligence), be caution with the information that you exposes publicly about yourself!

Osint Problems:

What is Osint?

Yeah, it's the information era, 500 milions tweets are published every day. Public informations like birthday, complete name, age are available on internet published by its own users. Which in itself poses privacy risks.

"Open-source intelligence (OSINT) is a multi-factor (qualitative, quantitative) methodology for collecting, analyzing and making decisions about data accessible in publicly available sources to be used in an intelligence context." Source: Open-Source Intelligence - Wikiless

So, caution with your public information! 😉

Articles:

Comments
  • Fix Pylint

    Fix Pylint

    • Critical:
      • [x] no-method-argument (E0211)
    • Medium:
      • [x] pointless-statement (W0104)
      • [x] pointless-string-statement (W0105)
      • [x] unnecessary-pass (W0107)
      • [x] unused-import (W0611)
      • [x] unused-variable (W0612)
    • Minor:
      • [x] PEP 257 docstring style checker
      • [x] no-self-use (R0201)
      • [x] trailing-whitespace (C0303)
      • [x] pyflakes
    opened by RickBarretto 1
  • Change `pip` for `pipx` or `poetry`

    Change `pip` for `pipx` or `poetry`

    Change install instructions from pip, on Readme

    Cause

    Pip doesn't use virtual environment by standard, setting packages on a global environment. It's a big problem, and causes conflicts between projects with the same packages but with different versions.

    Solution

    Use Poetry~~or PyEnv~~ for libraries and Poetryor PipXfor Applications.

    Read: Why use Poetry instead PyEnv

    opened by RickBarretto 0
  • Can't compile to `.exe`

    Can't compile to `.exe`

    Can't compile to executable file

    I followed the: Qt supported Libs,

    I tried 4 libraries, but no one could compile my code:

    Libraries

    The causes

    Auto Py to Exe

    Cx Freeze

    • Needs Visual Studio C++ compiler, that I don't will download because it's heavy. ⚒️
    • Repo link

    Fbs

    • The free version of fbs only supports Python 3.5 and 3.6. 😡
    • Repo link

    Nuitka

    bug 
    opened by RickBarretto 1
  • Fix Style code on Readme

    Fix Style code on Readme

    Current issues founded by Codacy:

    • remark-lint

      • [ ] list-item-indent
      • [ ] no-undefined-references
      • [ ] no-consecutive-blank-lines
      • [ ] no-heading-punctuation
    • Markdown Lint

      • [x] MD002 - First heading should be a top-level heading
      • [x] MD007 - Unordered list indentation
      • [x] MD009 - Trailing spaces
      • [x] MD032 - Lists should be surrounded by blank lines
      • [x] MD012 - Multiple consecutive blank lines
      • [x] MD013 - Line length
        • [ ] Change table to a single image
      • [x] MD022 - Headings should be surrounded by blank lines
      • [x] MD026 - Trailing punctuation in heading
      • [x] MD028 - Blank line inside blockquote
      • [x] MD033 - Inline HTML
      • [x] MD041 - First line in a file should be a top-level heading
      • [x] MD047 - Files should end with a single newline character
      • [x] MD006 - Consider starting bulleted lists at the beginning of the line
      • [x] MD043 - Required heading structure
    codacy 
    opened by RickBarretto 0
  • Block Fav Icon Request

    Block Fav Icon Request

    opened by RickBarretto 0
Releases(1.1)
Owner
Learning Python, Html and Css, and ShellScript; Soon learn JS.
RCE Exploit for Gitlab < 13.9.4

GitLab-Wiki-RCE RCE Exploit for Gitlab 13.9.4 RCE via unsafe inline Kramdown options when rendering certain Wiki pages Allows any user with push acc

Enox 52 Nov 09, 2022
Auerswald COMpact 8.0B Backdoors exploit

CVE-2021-40859 Auerswald COMpact 8.0B Backdoors exploit About Backdoors were discovered in Auerswald COMpact 5500R 7.8A and 8.0B devices, that allow a

Ashish Kunwar 1 Nov 24, 2022
Hadoop Yan RPC unauthorized RCE

Vuln Impact On November 15, 2021, A security researcher disclosed that there was an unauthorized access vulnerability in Hadoop yarn RPC. This vulnera

Al1ex 25 Nov 24, 2022
This tool was created in order to automate some basic OSINT tasks for penetration testing assingments.

This tool was created in order to automate some basic OSINT tasks for penetration testing assingments. The main feature that I haven't seen much anywhere is the downloadd google dork function where t

Tobias 5 May 31, 2022
xp_CAPTCHA(白嫖版) burp 验证码 识别 burp插件

xp_CAPTCHA(白嫖版) 说明 xp_CAPTCHA (白嫖版) 验证码识别 burp插件 安装 需要python3 小于3.7的版本 安装 muggle_ocr 模块(大概400M左右) python3 -m pip install -i http://mirrors.aliyun.com/

算命縖子 588 Jan 09, 2023
Credit Card And SK Checker Written In Python

💳 Credit Card Checker (CC Checker) & Mass SK Checker & Generator 💳

Rimuru Tempest 53 Dec 31, 2022
This is a simple tool to create ZIP payloads using a provided wordlist for the symlink attack (present in some file upload vulnerabilities)

zip-symlink-payload-creator This is a simple tool to create ZIP payloads using a provided wordlist for the symlink attack (present in some file upload

stark0de 6 Aug 18, 2022
A windows post exploitation tool that contains a lot of features for information gathering and more.

Crowbar - A windows post exploitation tool Status - ✔️ This project is now considered finished. Any updates from now on will most likely be new script

29 Nov 20, 2022
Brute-Force-Connected

Brute-Force-Connected Guess the password for Connected accounts the use : Create a new file and put usernames and passwords in it Example : joker:1234

4 Jun 05, 2022
BloodyAD is an Active Directory Privilege Escalation Framework

BloodyAD Framework BloodyAD is an Active Directory Privilege Escalation Framework, it can be used manually using bloodyAD.py or automatically by combi

757 Jan 07, 2023
VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit

Vortex VPN Overall Reconnaissance, Testing, Enumeration and Exploitation Toolkit Overview A very simple Python framework, inspired by SprayingToolkit,

315 Dec 28, 2022
HatSploit native powerful payload generation and shellcode injection tool that provides support for common platforms and architectures.

HatVenom HatSploit native powerful payload generation and shellcode injection tool that provides support for common platforms and architectures. Featu

EntySec 100 Dec 23, 2022
Red Team Toolkit is an Open-Source Django Offensive Web-App which is keeping the useful offensive tools used in the red-teaming together.

RedTeam Toolkit Note: Only legal activities should be conducted with this project. Red Team Toolkit is an Open-Source Django Offensive Web-App contain

Mohammadreza Sarayloo 382 Jan 01, 2023
集成crawlergo、xray、dirsearch、nmap等工具的src漏洞挖掘工具,使用docker封装运行;

tools下有几个工具,所以项目文件比较大,如果下载总是中断的话建议拆开下载各个项目然后直接拷贝dockefile和recon.py即可 0x01 hscan介绍 hscan是什么 hscan是一款旨在使用一条命令替代渗透前的多条扫描命令,通过集成crawlergo扫描和xray扫描、dirsear

102 Jan 04, 2023
This project is for finding a solution to use Security Onion Elastic data with Jupyter Notebooks.

This project is for finding a solution to use Security Onion Elastic data with Jupyter Notebooks. The goal is to successfully use this notebook project below with Security Onion for beacon detection

4 Jun 08, 2022
Brute Force Guess the password for Instgram accounts with python

Brute-Force-instagram Guess the password for Instgram accounts Tool features : It has two modes: 1- Combo system from you 2- Automatic (random) system

45 Dec 11, 2022
OpenSource Poc && Vulnerable-Target Storage Box.

reapoc OpenSource Poc && Vulnerable-Target Storage Box. We are aming to collect different normalized poc and the vulerable target to verify it. Now re

cckuailong 560 Dec 23, 2022
Signatures and IoCs from public Volexity blog posts.

threat-intel This repository contains IoCs related to Volexity public threat intelligence blog posts. They are organised by year, and within each year

Volexity 130 Dec 29, 2022
Execution After Redirect (EAR) / Long Response Redirection Vulnerability Scanner written in python3

Execution After Redirect (EAR) / Long Response Redirection Vulnerability Scanner written in python3, It Fuzzes All URLs of target website & then scan them for EAR

Pushpender Singh 9 Dec 12, 2022
Receive notifications/alerts on the most recent disclosed CVE's.

Receive notifications on the most recent disclosed CVE's.

Ameliorate 7 Nov 24, 2022