Tel0ader is a multi-threaded Telnet command execution loader It connects to Telnet-enabled devices using pre-obtained credentials and executes a user-supplied command or payload across multiple hosts concurrently.
β οΈ Tel0ader does not brute-force credentials, does not bypass authentication, and does not perform honeypot detection. Credential discovery must be handled separately. (https://github.com/CirqueiraDev/botnet-exploits/blob/main/bruteforce/brute.py)
- Python 3.8+
- Valid Telnet credentials
- Explicit authorization to test targets
Targets must be provided via a file, one per line, using the following format:
IP:PORT USER:PASSWORD
18.181.177.7:23 root:root
221.1.120.79:23 admin:adminpython loader.py -l targets.txt -t 20 -c "uname -a" -o results.txt| Flag | Description |
|---|---|
-l, --list |
File containing target list (required) |
-t, --threads |
Number of concurrent threads (default: 10) |
-c, --command |
Command to execute after login (default: uname -a) |
-o, --output |
File to save results |
--timeout |
Connection timeout in seconds (default: 10) |
-
Loads targets from file
-
Parses
host,port,username, andpassword -
Creates a thread pool
-
For each target:
- Connects via Telnet
- Handles common login prompts
- Authenticates with provided credentials
- Executes the supplied command
- Captures output
- Disconnects cleanly
-
Aggregates results and prints a summary
-
Optionally writes results to disk
- Successful connections are marked with
[+] - Failures are marked with
[-] - Errors include timeout, refusal, or disconnect reasons
This tool is for authorized testing only.
The author assumes no liability for misuse.
Assumes standard Telnet login prompts
- No shell detection ($ vs # is best-effort)
- ASCII command encoding only
- No retry logic
- No per-target command variation
- These are intentional design choices to keep the tool simple and auditable.
tel0ader v1 Developed by @Syn2Much