The Clipboard Hijacker Payload aims to monitor, capture, and potentially manipulate clipboard data on a target machine.
☆31Nov 7, 2024Updated last year
Alternatives and similar repositories for Clipboard-Hijacker
Users that are interested in Clipboard-Hijacker are comparing it to the libraries listed below
Sorting:
- A simple and efficient tool to automatically change your IP address using Tor network at regular intervals.☆54Apr 9, 2025Updated 10 months ago
- This is a python program backdoor embeded with a game for reverse connection from the victim to understand the use visit our youtube chan…☆11Dec 20, 2021Updated 4 years ago
- ViperVenom is an open-source cyber offensive tool developed by Itay Funes for pentesters. ViperVenom is a great tool when it comes to pen…☆14Feb 2, 2022Updated 4 years ago
- PDF Icon File Type Spoofer☆17Jul 8, 2024Updated last year
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Jun 22, 2023Updated 2 years ago
- converts EXE (or other binary) files to VBS scripts☆22Oct 15, 2012Updated 13 years ago
- Simple python file that sends victim ip,host name,location etc.., to your mail address☆14Jan 8, 2023Updated 3 years ago
- 🚀 Builder of Malware Loader☆13Nov 12, 2020Updated 5 years ago
- 🔅 Reverse shell written on python3☆14Dec 12, 2020Updated 5 years ago
- License Compatible Python2x Python3x Pure Blood v2 A Penetration Testing Framework created for Hackers / Pentester / Bug Hunter Menu We…☆26Oct 1, 2020Updated 5 years ago
- ADR is a trojan that retrieves all information on the computer and all data stored in applications using chormuim. It recovers cookies, t…☆27Sep 5, 2023Updated 2 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆23Jun 15, 2020Updated 5 years ago
- HackMKV - Generate Malacious Video.MKV To Remotely Hack Computer Via Video Files.☆12Jun 11, 2024Updated last year
- ✔A script that turns off Windows Defender☆23May 21, 2022Updated 3 years ago
- PhantomCrawler is a Python-based web testing and research tool that simulates website interactions from multiple proxy IP addresses to an…☆74Jan 6, 2026Updated last month
- A Cross Platform multifunctional (Windows/Linux/Mac) Remote Adminstration Tools.☆24Jan 1, 2021Updated 5 years ago
- ip-keyloger☆10Jan 9, 2026Updated last month
- recover Firefox and more browsers logins☆49Nov 23, 2021Updated 4 years ago
- A framework for backdooring Microsoft Nuget packages.☆10Jan 9, 2024Updated 2 years ago
- Mini Wordress Exploiter using CVE2020☆30Dec 25, 2020Updated 5 years ago
- Управление компьютером через телеграмм бота☆34Jul 1, 2021Updated 4 years ago
- Stealer written on C#, logs will be sent to Discord Webhook.☆26Jan 27, 2022Updated 4 years ago
- MappingInjection via csharp☆40Nov 19, 2021Updated 4 years ago
- Disable Windows Defender All Version☆31Jan 5, 2021Updated 5 years ago
- Shell to bypass cmd usage restrictions on Windows.☆30Apr 2, 2021Updated 4 years ago
- PowerShell tool to enumerate existing exclusions in Windows Defender as low privileged user☆11Oct 14, 2024Updated last year
- A bot which automates the process of finding betting odds by web scrapping and then calculates to see if there is an Arbitrage Opportunit…☆10Jul 1, 2022Updated 3 years ago
- source : https://www.programiz.com/python-programming☆10Jan 12, 2024Updated 2 years ago
- GUI Tool to Generate Android Payloads.☆10May 20, 2020Updated 5 years ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆13Dec 20, 2022Updated 3 years ago
- A Modern, stable and advanced login system.☆13Oct 13, 2021Updated 4 years ago
- A Deep Reinforcement Learning Library for Automated Trading in Quantitative Finance. NeurIPS 2020. Please star. 🔥☆12Mar 13, 2023Updated 2 years ago
- ☆11Aug 24, 2021Updated 4 years ago
- Source code of the Chaos Ransomware, also known as Ryuk and Yashma.☆18Dec 21, 2024Updated last year
- steal cookie for chrome and mozilla firefox, use another extension to login with the cookie stealed☆31Mar 25, 2021Updated 4 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆32Oct 21, 2023Updated 2 years ago
- cross-platform C2 framework in python 2☆38May 19, 2022Updated 3 years ago
- A Python backdoor for spying on Windows machines☆10Apr 21, 2022Updated 3 years ago
- About C# loader that copies a chunk at the time of the shellcode in memory in a suspended process, rather that all at once☆13Jul 14, 2022Updated 3 years ago