This is a simple C++ program that will copy clipboard data and upload it to a webserver of your choice!
☆18Jan 16, 2024Updated 2 years ago
Alternatives and similar repositories for Clipboard-Data-Stealer
Users that are interested in Clipboard-Data-Stealer are comparing it to the libraries listed below
Sorting:
- Fast and clear TryHackMe desktop application for Windows /Linux / MacOS☆12Feb 6, 2021Updated 5 years ago
- Pi-hole Remote Code Execution authenticated Version >= 4.3.2☆11Aug 5, 2020Updated 5 years ago
- 🔗 Source for the Caido plugin store☆16Mar 2, 2026Updated 2 weeks ago
- CTFScore or the "Advanced CTF Scoring System" is a system intended to track the IDS alerts generated during the course of a CTF and provi…☆22Jul 26, 2022Updated 3 years ago
- Zeek package to detect Zerologon☆11Nov 10, 2021Updated 4 years ago
- The docker image for nginx rtmp hls server.☆11Jan 6, 2021Updated 5 years ago
- Open source & free software that measures the compliance of any webpage with the #GDPR by analyzing its source code and its behaviour. #p…☆17Dec 8, 2022Updated 3 years ago
- ☆13Mar 13, 2024Updated 2 years ago
- Node.js server that responds to github webhook post-receive events for easy push-to-deploy☆12Dec 28, 2020Updated 5 years ago
- WPF helper library☆14Apr 6, 2019Updated 6 years ago
- Threat Mitigation Strategies☆28Feb 18, 2026Updated last month
- All the code snippets from my Secure Code Review series on youtube (youtube.com/@muqsitbaig)!☆25Jul 28, 2024Updated last year
- Windows Hardening Powershell Scripts☆24Oct 3, 2025Updated 5 months ago
- Binary exploitation exercises and scripts☆12Mar 15, 2022Updated 4 years ago
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 8 months ago
- BurpSuite Extension for performing scan via CLI.☆14Dec 5, 2017Updated 8 years ago
- This contains scripts, tools, and other programs I show case on my youtube channel.☆22Oct 30, 2025Updated 4 months ago
- Ledger Donjon CTF 2020☆17Nov 16, 2021Updated 4 years ago
- ☆46Nov 5, 2025Updated 4 months ago
- this is a simple shell that has the ability to bypass defenses☆13Mar 8, 2026Updated last week
- Pre-compiled builds for CVE-2021-4034☆26Mar 30, 2022Updated 3 years ago
- Malware Machine Learning☆27Apr 1, 2018Updated 7 years ago
- A Python 3 library to interact with VirusShare API v2.☆17Aug 12, 2020Updated 5 years ago
- MSBuild AL bypass☆17Mar 9, 2023Updated 3 years ago
- ☆11Sep 3, 2023Updated 2 years ago
- A script to download all the challenges and files from a CTFd instance☆26Oct 27, 2024Updated last year
- A Google/Bing Scraping tool for LinkedIn☆93Jul 1, 2023Updated 2 years ago
- ☆19Sep 17, 2025Updated 6 months ago
- ARP Poisoning Tool, it creates entries on target's ARP Table. The things which you need only are Destination IP and MAC address.☆48Jan 17, 2020Updated 6 years ago
- ☆10Mar 11, 2024Updated 2 years ago
- Clone of the original project https://sourceforge.net/projects/sqsh/☆14Dec 8, 2023Updated 2 years ago
- Mirror of ETSI OSM's vim-emu (https://osm.etsi.org/gitweb/?p=osm/vim-emu.git;a=summary)☆19Feb 14, 2021Updated 5 years ago
- Simple TPM utils in Python for generating random numbers & RSA keys☆20Jan 15, 2017Updated 9 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- This vulnerability may allow an unauthenticated attacker with network access to the BIG-IP system through the management port and/or self…☆28May 6, 2022Updated 3 years ago
- IOCTL++ can be used to make DeviceIoControl requests with arbitrary inputs.☆35Oct 28, 2025Updated 4 months ago
- 🔰 Caido Plugin StarterKit☆34Dec 7, 2024Updated last year
- Generate common Reverse Shells for Pentesting☆44May 23, 2021Updated 4 years ago
- Simple yara decompiler☆17Apr 8, 2017Updated 8 years ago