The Clipboard Hijacker Payload aims to monitor, capture, and potentially manipulate clipboard data on a target machine.
☆34Nov 7, 2024Updated last year
Alternatives and similar repositories for Clipboard-Hijacker
Users that are interested in Clipboard-Hijacker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A simple and efficient tool to automatically change your IP address using Tor network at regular intervals.☆102Apr 9, 2025Updated last year
- PDF Icon File Type Spoofer☆17Jul 8, 2024Updated last year
- This tool is used to hack microphone of target device.☆42Mar 15, 2026Updated last month
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆20Jun 22, 2023Updated 2 years ago
- regex Hunter- Fast website endpoint sensitive data and Leaks JS files endpoint API Key Scraper☆12Jun 8, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- miscellaneous sploit scripts/hacks☆18Feb 3, 2025Updated last year
- PhantomCrawler is a Python-based web testing and research tool that simulates website interactions from multiple proxy IP addresses to an…☆79Jan 6, 2026Updated 4 months ago
- License Compatible Python2x Python3x Pure Blood v2 A Penetration Testing Framework created for Hackers / Pentester / Bug Hunter Menu We…☆26Oct 1, 2020Updated 5 years ago
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- A basic Android background service that connects to a remote server, executes commands, and returns encrypted output. Disguised as a syst…☆22Aug 2, 2025Updated 9 months ago
- all about android reverse engineering☆12Oct 3, 2020Updated 5 years ago
- A Simple RedLineStealer☆13Aug 30, 2023Updated 2 years ago
- AI Powered penetration testing Platform for offensive security research☆81May 1, 2026Updated last week
- Simple JS script that overloads the browser with a huge URL☆13May 27, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- An automated bitcoin wallet collider that brute forces random wallet addresses☆13Aug 13, 2024Updated last year
- Global Satellite Assessment Tool (GlobalSAT)☆20Feb 1, 2026Updated 3 months ago
- Stealing session (Steam, Telegram, Epicgames, ProtonVPN, Metamask) files from PC using Powershell, POC☆14Aug 11, 2023Updated 2 years ago
- sms bomber in django☆14May 28, 2021Updated 4 years ago
- Upgrading jsleak with a CI/CD and new rules☆17May 6, 2023Updated 3 years ago
- Advanced information gathering & OSINT tool for phone numbers.☆13Oct 9, 2020Updated 5 years ago
- ViperVenom is an open-source cyber offensive tool developed by Itay Funes for pentesters. ViperVenom is a great tool when it comes to pen…☆14Feb 2, 2022Updated 4 years ago
- A powerful command-line tool for Google dorking, enabling users to uncover hidden information and vulnerabilities with advanced search qu…☆34Mar 4, 2026Updated 2 months ago
- A tool to get anyone's IP, device details and exact location on google maps along with latitude and longitude by sharing a link with the …☆21May 4, 2020Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- USB Rubber Ducky Script for capture saved wifi passwords☆81Jan 10, 2022Updated 4 years ago
- rootkit that wait user to copy a bitcoin adress then change it with the attacker adress when the victim paste it☆13Oct 25, 2018Updated 7 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆32Oct 21, 2023Updated 2 years ago
- Blockchain web page clone - I cloned the blockchain website to combine my html and css information☆10Mar 3, 2023Updated 3 years ago
- Unified repository for different Metasploit Framework payloads☆16Apr 3, 2017Updated 9 years ago
- DepthSearch is a deep web OSINT tool that enables powerful, anonymous searches across deep web search engines. It features proxy support,…☆25Oct 26, 2024Updated last year
- Cyber Equipment for Carrying out Pentesting and Server Defense from Hacker Attack Activities☆23Oct 16, 2025Updated 6 months ago
- converts EXE (or other binary) files to VBS scripts☆24Oct 15, 2012Updated 13 years ago
- This is a python program backdoor embeded with a game for reverse connection from the victim to understand the use visit our youtube chan…☆11Dec 20, 2021Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A Collection of Wordlists for Penetration Testing☆38Mar 13, 2026Updated last month
- 🔅 Reverse shell written on python3☆14Dec 12, 2020Updated 5 years ago
- How to set up and install Ss7 and Sigtran Adapt☆37May 19, 2024Updated last year
- Can Large Language Models Solve Security Challenges? We test LLMs' ability to interact and break out of shell environments using the Over…☆13Aug 21, 2023Updated 2 years ago
- Hackcom is a place where hackers can communicate safely without being tracked by the authorities.☆21Oct 16, 2025Updated 6 months ago
- 🚀 Builder of Malware Loader☆12Nov 12, 2020Updated 5 years ago
- Talking Santa-GPT with Speech Recognition☆15Dec 28, 2023Updated 2 years ago