ProcessusT / RemClipLinks
RemClip is a C# project which permits to steal user clipboard data and send it to a remote web server under attacker control
β13Updated last year
Alternatives and similar repositories for RemClip
Users that are interested in RemClip are comparing it to the libraries listed below
Sorting:
- web based c2 π΄ββ οΈβ15Updated last year
- β13Updated last year
- VBS Crypter, Exe To VBSβ15Updated 3 years ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It providesβ¦β13Updated last year
- Generate Undetectable Metasploit Payload in a simple wayβ37Updated last year
- π§ C# UAC Bypass technique using mock directories π§β28Updated 3 years ago
- This is a working variant of the Mirai IOT botnetβ14Updated 2 years ago
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, aβ¦β26Updated 2 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagemeβ¦β20Updated 3 years ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.β19Updated 2 years ago
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORKβ16Updated 2 years ago
- Generate FUD Droppers that are undetectable by popular AV'sβ32Updated last year
- A PowerShell script that simplifies life and therefore... phishing.β19Updated 3 years ago
- Recon-ng modules for basic OSINT.β11Updated 3 years ago
- A simple script to obfuscate batch(bat) code easilyβ26Updated last year
- WIP Post-exploitation framework tailored for hypervisors.β50Updated last year
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFsβ12Updated 2 years ago
- Here i will upload every prynt stealer stub source code and you will discover that is stormkitty 0_0 (I didnt buy anything from prynt whiβ¦β11Updated 2 years ago
- TCP Data Transfer Tool By ClumsyLulzβ12Updated 2 years ago
- Sample configuration to include as an Asterisk configuration to supplement automated caller ID spoofing capabilities.β27Updated 5 years ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.β15Updated last year
- A powerful reverse shell generatorβ44Updated 3 years ago
- Bypass Windows Defender with py2exe from memory.β37Updated 3 years ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defenderβ22Updated 2 years ago
- CVE-2021-34527 AddPrinterDriverEx() Privilege Escalationβ21Updated 3 years ago
- CVE-2023-1671-POC, based on dnslog platformβ17Updated 2 years ago
- Malware Libraries focused in help Malware Developmentβ27Updated 2 years ago
- β25Updated 2 years ago
- Trojan written in C++ for Windowsβ18Updated last year
- This is a windows maching login page designed using HTML, CSS and JS. This can be used for red teaming or cybersecurity awareness relatedβ¦β18Updated 3 years ago