This is a simple C++ program that will copy clipboard data and upload it to a webserver of your choice!
☆18Jan 16, 2024Updated 2 years ago
Alternatives and similar repositories for Clipboard-Data-Stealer
Users that are interested in Clipboard-Data-Stealer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Fast and clear TryHackMe desktop application for Windows /Linux / MacOS☆12Feb 6, 2021Updated 5 years ago
- Browser passwords stealer☆13Sep 3, 2022Updated 3 years ago
- ☆121Sep 13, 2023Updated 2 years ago
- ☆52Mar 13, 2026Updated 3 weeks ago
- A Python based Recon Tool to search for Storage Buckets☆11Jan 21, 2023Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Pi-hole Remote Code Execution authenticated Version >= 4.3.2☆11Aug 5, 2020Updated 5 years ago
- 🔗 Source for the Caido plugin store☆17Mar 13, 2026Updated 3 weeks ago
- CTFScore or the "Advanced CTF Scoring System" is a system intended to track the IDS alerts generated during the course of a CTF and provi…☆22Jul 26, 2022Updated 3 years ago
- Zeek package to detect Zerologon☆11Nov 10, 2021Updated 4 years ago
- The docker image for nginx rtmp hls server.☆11Jan 6, 2021Updated 5 years ago
- EasyCTF IV☆10Feb 21, 2018Updated 8 years ago
- ☆14Mar 13, 2024Updated 2 years ago
- Node.js server that responds to github webhook post-receive events for easy push-to-deploy☆12Dec 28, 2020Updated 5 years ago
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 9 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- BurpSuite Extension for performing scan via CLI.☆14Dec 5, 2017Updated 8 years ago
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆32Sep 15, 2025Updated 6 months ago
- Ledger Donjon CTF 2020☆17Nov 16, 2021Updated 4 years ago
- A Unified Platform for Evaluating SAST Tools for Android☆20Mar 30, 2025Updated last year
- ☆45Nov 5, 2025Updated 5 months ago
- ☆11Apr 1, 2025Updated last year
- this is a simple shell that has the ability to bypass defenses☆13Mar 8, 2026Updated last month
- Malware Machine Learning☆27Apr 1, 2018Updated 8 years ago
- MSBuild AL bypass☆17Mar 9, 2023Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆11Sep 3, 2023Updated 2 years ago
- Bot to create MISP events from data in Slack☆17Jan 10, 2024Updated 2 years ago
- ☆14Dec 24, 2023Updated 2 years ago
- Quickly generate snort rules for IOCs☆18Oct 21, 2015Updated 10 years ago
- ☆19Sep 17, 2025Updated 6 months ago
- Juice Jacking / Automatic Android Rooting based on Intel Edison using dirty c0w☆11Nov 16, 2016Updated 9 years ago
- ☆10Mar 11, 2024Updated 2 years ago
- Clone of the original project https://sourceforge.net/projects/sqsh/☆14Dec 8, 2023Updated 2 years ago
- Mirror of ETSI OSM's vim-emu (https://osm.etsi.org/gitweb/?p=osm/vim-emu.git;a=summary)☆19Feb 14, 2021Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- IOCTL++ can be used to make DeviceIoControl requests with arbitrary inputs.☆35Oct 28, 2025Updated 5 months ago
- Generate common Reverse Shells for Pentesting☆44May 23, 2021Updated 4 years ago
- SafeCrypt is an academic ransomware simulation suite developed for Red Team engagements. It demonstrates modern malware techniques includ…☆34Oct 3, 2025Updated 6 months ago
- The script that automatically posts random names to a scam website, featured in one of my videos on YouTube.☆26May 13, 2020Updated 5 years ago
- Guillotine - Security Headers Finder HTTP☆13Apr 25, 2024Updated last year
- ExecEvasion is a lightweight execution-evasion toolkit that generates command variants designed to bypass naive filters and WAF rules by …☆50Jan 31, 2026Updated 2 months ago