/CryptoClipboardExploitDemo

CryptoClipboardExploitDemo showcases how clipboard hijacker malware alters crypto wallet addresses in transactions. An educational tool to demonstrate and study this cyber threat.

Primary LanguagePython

CryptoClipboardExploitDemo 🛡️

About the Project

CryptoClipboardExploitDemo is an educational tool 🎓 designed to demonstrate how clipboard hijacker malware 🕵️‍♂️ can manipulate cryptocurrency wallet addresses during transactions. This project aims to raise awareness 🚨 about this type of cyber threat and demonstrate preventive measures.

Disclaimer

This content is for educational purposes only 🏫. The demonstration and code provided are intended to enhance cybersecurity awareness and should not be used for malicious purposes.

Features

  • Simulation Script: script.py simulates the behavior of Clipboard Hijacker Malware.
  • Build Script: setup.py uses cx_Freeze to convert the Python script into C code format, preparing it for compilation.

Getting Started 🚀

These instructions will get you a copy of the project up and running on your local machine for development and testing purposes.

Prerequisites

  • Python 3.x 🐍
  • cx_Freeze 🧊
  • NSIS 📦

Installation and Building

  1. Clone the repo:
    git clone https://github.com/aron-tn/CryptoClipboardExploitDemo.git
  2. Install the required packages:
    pip3 install cx_Freeze
  3. Build the executable:
    py -3 setup.py build
  4. Compile with NSIS to create a single executable file.

Usage

After building, run the generated executable 🖥️ to see how clipboard data can be monitored and altered for cryptocurrency addresses.

Video Tutorial

For a comprehensive walkthrough of the CryptoClipboardExploitDemo project, check out our video tutorial on YouTube. This video provides a step-by-step guide on how the clipboard hijacker malware operates, demonstrating the actual process of how cryptocurrency wallet addresses can be manipulated during transactions.

The video also covers the following key topics:

  • Understanding the Threat: Learn about the mechanics behind clipboard hijacking and why it poses a significant risk to cryptocurrency holders.
  • Prevention Strategies: Discover practical steps and measures you can take to protect your digital assets from this type of cyber threat.
  • Project Demonstration: See the CryptoClipboardExploitDemo in action, showing how the scripts and tools we've developed can be used to simulate and study clipboard hijacker malware.

Watching this tutorial will give you valuable insights into both the threat itself and our project's approach to demonstrating and mitigating it.

Watch the video

Contributing

Contributions to this project are welcome 🤝, especially from those in the cybersecurity community. To contribute:

  1. Fork the project 🍴
  2. Create your feature branch (git checkout -b feature/AmazingFeature)
  3. Commit your changes (git commit -m 'Add some AmazingFeature')
  4. Push to the branch (git push origin feature/AmazingFeature)
  5. Open a Pull Request

License

Distributed under the MIT License 📄. See LICENSE for more information.

Contact

Telegram - @aron_tn
Email - aron.tn.official@gmail.com

Acknowledgments

  • Hat tip to anyone whose code was used 👒
  • Inspiration 💡
  • etc.