The Clipboard Hijacker Payload aims to monitor, capture, and potentially manipulate clipboard data on a target machine.
☆33Nov 7, 2024Updated last year
Alternatives and similar repositories for Clipboard-Hijacker
Users that are interested in Clipboard-Hijacker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple Esp32 DNS Hijack Server, packaged as ESP-IDF component☆18Jan 15, 2020Updated 6 years ago
- PDF Icon File Type Spoofer☆17Jul 8, 2024Updated last year
- Embed and execute SQL in Markdown☆13Mar 21, 2024Updated 2 years ago
- miscellaneous sploit scripts/hacks☆18Feb 3, 2025Updated last year
- Repository for BTC ATM. Goal: Python script that prints out a QR code with bitcoins worth $20☆10Dec 10, 2014Updated 11 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- License Compatible Python2x Python3x Pure Blood v2 A Penetration Testing Framework created for Hackers / Pentester / Bug Hunter Menu We…☆26Oct 1, 2020Updated 5 years ago
- A basic Android background service that connects to a remote server, executes commands, and returns encrypted output. Disguised as a syst…☆22Aug 2, 2025Updated 8 months ago
- all about android reverse engineering☆12Oct 3, 2020Updated 5 years ago
- Bitcoin Generator Balance Check | Crack BTC | Earn And Donate ~BTC Address: ~☆12Dec 13, 2024Updated last year
- Simple JS script that overloads the browser with a huge URL☆13May 27, 2020Updated 5 years ago
- source : https://www.programiz.com/python-programming☆10Jan 12, 2024Updated 2 years ago
- Source code of the Chaos Ransomware, also known as Ryuk and Yashma.☆17Dec 21, 2024Updated last year
- A python program that receive GPS data from android phone and send it to another device wirelessly.☆12Mar 30, 2021Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Global Satellite Assessment Tool (GlobalSAT)☆19Feb 1, 2026Updated 2 months ago
- This is a bitcoin mnemonic generator and WIF converter. It is based on the BIP-0039. It generates 12 mnemonic word list, which can be use…☆15Mar 3, 2023Updated 3 years ago
- Android devices using ADB via the Shodan API. It prompts the user for a command payload, then establishes TCP connections to devices with …☆15Jan 7, 2026Updated 3 months ago
- Stealing session (Steam, Telegram, Epicgames, ProtonVPN, Metamask) files from PC using Powershell, POC☆13Aug 11, 2023Updated 2 years ago
- XTempmail is a place where you can create or check unlimited temporary emails and they will automatically check the inbox.☆14Dec 9, 2025Updated 4 months ago
- Educational tool for simulating Instagram login and 2FA mechanisms. Designed for ethical hacking and cybersecurity training.☆21Jul 29, 2025Updated 8 months ago
- Binance Email Support Clone☆17Mar 20, 2024Updated 2 years ago
- Advanced information gathering & OSINT tool for phone numbers.☆13Oct 9, 2020Updated 5 years ago
- ViperVenom is an open-source cyber offensive tool developed by Itay Funes for pentesters. ViperVenom is a great tool when it comes to pen…☆14Feb 2, 2022Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A powerful command-line tool for Google dorking, enabling users to uncover hidden information and vulnerabilities with advanced search qu…☆33Mar 4, 2026Updated last month
- rootkit that wait user to copy a bitcoin adress then change it with the attacker adress when the victim paste it☆13Oct 25, 2018Updated 7 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆32Oct 21, 2023Updated 2 years ago
- Unified repository for different Metasploit Framework payloads☆16Apr 3, 2017Updated 9 years ago
- Cyber Equipment for Carrying out Pentesting and Server Defense from Hacker Attack Activities☆22Oct 16, 2025Updated 5 months ago
- converts EXE (or other binary) files to VBS scripts☆24Oct 15, 2012Updated 13 years ago
- build frida for android arch : arm, arm64, x86 and x86_64☆44Mar 29, 2026Updated 2 weeks ago
- This is a python program backdoor embeded with a game for reverse connection from the victim to understand the use visit our youtube chan…☆11Dec 20, 2021Updated 4 years ago
- A Collection of Wordlists for Penetration Testing☆35Mar 13, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆26May 25, 2023Updated 2 years ago
- 🔅 Reverse shell written on python3☆14Dec 12, 2020Updated 5 years ago
- How to set up and install Ss7 and Sigtran Adapt☆35May 19, 2024Updated last year
- Hackcom is a place where hackers can communicate safely without being tracked by the authorities.☆21Oct 16, 2025Updated 5 months ago
- 🚀 Builder of Malware Loader☆13Nov 12, 2020Updated 5 years ago
- A WordPress plugin that integrates ChatGPT to your website☆13Nov 20, 2023Updated 2 years ago
- This Discord Rat give you the best way to control victims pc on discord.☆20Aug 20, 2025Updated 7 months ago