https://github.com/ferozomer/clipboard-hijacker-payload
The Clipboard Hijacker Payload is a proof-of-concept tool designed to monitor, capture, and potentially manipulate clipboard data on a target machine
https://github.com/ferozomer/clipboard-hijacker-payload
clipboard-monitoring flask penetration-testing powershell python
Last synced: 2 months ago
JSON representation
The Clipboard Hijacker Payload is a proof-of-concept tool designed to monitor, capture, and potentially manipulate clipboard data on a target machine
- Host: GitHub
- URL: https://github.com/ferozomer/clipboard-hijacker-payload
- Owner: ferozomer
- License: mit
- Created: 2025-01-03T02:14:22.000Z (5 months ago)
- Default Branch: main
- Last Pushed: 2025-01-03T18:09:53.000Z (5 months ago)
- Last Synced: 2025-01-25T19:12:31.066Z (4 months ago)
- Topics: clipboard-monitoring, flask, penetration-testing, powershell, python
- Language: PowerShell
- Homepage:
- Size: 8.79 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Clipboard Hijacker Payload
A PowerShell-based clipboard monitoring script that logs clipboard changes locally and sends the clipboard data to a specified server endpoint for further processing.
## Features
- Monitors the clipboard for changes.
- Logs clipboard content locally with timestamps.
- Sends clipboard data to a server endpoint using HTTP POST requests.
- Tracks and prevents duplicate logs for unchanged clipboard content.
- Provides robust error handling and logging.## Requirements
- Windows operating system.
- PowerShell (version 5.0 or higher).
- Server endpoint capable of receiving HTTP POST requests.## Installation
1. Clone the repository or download the script file `ClipboardMonitor.ps1`.
2. Ensure PowerShell is installed on your system.
3. Modify the configuration variables in the script:
- Replace `` in `$webhook_url` with the IP or domain of your server.
- Set a valid file path for the `$log_file` variable to store clipboard logs.## Usage
1. Open PowerShell as an administrator.
2. Run the script:
```powershell
PowerShell -ExecutionPolicy Bypass -File .\ClipboardMonitor.ps1## NOTE: This script is intended solely for educational purposes