kienmarkdo / Telegram-OSINT-for-Cyber-Threat-Intelligence-Analysis

An OSINT tool tailored for comprehensive collection, analysis, and interpretation of cyber threat intelligence from Telegram channels and groups.
1 stars 0 forks source link

Collect list of entities by their channel IDs #30

Closed kienmarkdo closed 5 months ago

kienmarkdo commented 5 months ago

Users should be able to specify in the CLI arguments which specific channels they want to collect from.

They can obtain these IDs by running

python scrape.py --get-entities

The command above would return metadata on all entities, such as the ID of the entity. From there, the user/threat analyst can note down the IDs of the entities that they want to run the collection on, then specify that in the CLI arguments.

python scrape.py --get-messages --get-participants --entities   # throw error as no entity IDs were specified
python scrape.py --get-messages --get-participants --entities <id1> <id2> <id3> ...  # collect messages and participants in the entities whose IDs are specified
kienmarkdo commented 5 months ago

Completed in https://github.com/kienmarkdo/Telegram-OSINT-and-Graph-Based-Analysis-of-Criminal-Activity/commit/0b1fe99e3e8ec2bfca3fc162c9860307547a41b1