RoseSecurity / Abusing-Roku-APIsLinks
A fun repository on how to externally issue commands to Roku devices utilizing the External Control Protocol (ECP). The repository covers how to enumerate devices, issue commands via "curl," and designing custom scripts to mess with friends and family!
☆289Updated last year
Alternatives and similar repositories for Abusing-Roku-APIs
Users that are interested in Abusing-Roku-APIs are comparing it to the libraries listed below
Sorting:
- A CLI-tool used to stream CCTV online footage based on URL params☆65Updated 3 years ago
- Automated capturing of WPA & WPA2 password Hashes.☆160Updated 2 years ago
- Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoc…☆105Updated last year
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆218Updated 2 years ago
- Hash identification program.☆154Updated 3 years ago
- Gather information from an email address connected to Office 365☆84Updated 2 years ago
- Minimalist Asterisk Caller ID Spoofer and Secondary VOIP Line Configuration Built for AWS☆303Updated 5 years ago
- The DC801 Badge Platform for DC28+☆58Updated last week
- ☆523Updated 8 months ago
- Wordlist to crack .zip-file password☆204Updated 3 years ago
- "Try Harder" is a cybersecurity retro game designed to simulate 100 real-world scenarios that will help you prepare for the Offensive Sec…☆205Updated 2 years ago
- WifiForge is a tool developed by Black Hills InfoSec to help train Pentesters on different Wi-Fi attack vectors and Wireless capabilities…☆358Updated this week
- A targeted DNS cache poisoner☆121Updated 2 years ago
- Spoof emails from any of the +2 Million domains using MailChannels (DEFCON 31 Talk)☆341Updated 2 years ago
- Torrent files for data breaches used in research☆149Updated 3 years ago
- Frack - Keep and Maintain your breach data☆372Updated last year
- Network brute force tool, written in Python. Faster than other existing solutions (including the main leader in the network brute force m…☆396Updated 4 years ago
- DSJAS: Dave Smith Johnson & son. A fake bank for baiting scammers attempting to steal from online banking.☆82Updated last month
- ☆148Updated last year
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆106Updated 2 years ago
- Turning smart lights into Wifi Hacking implants.☆130Updated 7 months ago
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆734Updated last month
- Framework for Rogue Wi-Fi Access Point Attack☆42Updated 9 years ago
- Modular malware framework to build custom payloads, designed for advanced adversary simulation and malware research☆306Updated last week
- Jaws is an invisible programming language! Inject invisible code into other languages and files! Created for security research -- see blo…☆234Updated 5 months ago
- its like a tricorder, for your wireless world.☆111Updated last year
- Autofill Phishing☆76Updated 3 weeks ago
- A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule☆535Updated 11 months ago
- A list of viruses from Windows 3.1, and the 16 bit binaries associated.☆46Updated 3 years ago
- ☆133Updated 4 years ago