RoseSecurity / Abusing-Roku-APIsLinks
A fun repository on how to externally issue commands to Roku devices utilizing the External Control Protocol (ECP). The repository covers how to enumerate devices, issue commands via "curl," and designing custom scripts to mess with friends and family!
☆282Updated last year
Alternatives and similar repositories for Abusing-Roku-APIs
Users that are interested in Abusing-Roku-APIs are comparing it to the libraries listed below
Sorting:
- Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoc…☆104Updated last year
- A CLI-tool used to stream CCTV online footage based on URL params☆63Updated 3 years ago
- Automated capturing of WPA & WPA2 password Hashes.☆159Updated 2 years ago
- Gather information from an email address connected to Office 365☆85Updated 2 years ago
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆714Updated 4 months ago
- Wordlist to crack .zip-file password☆203Updated 2 years ago
- Jaws is an invisible programming language! Inject invisible code into other languages and files! Created for security research -- see blo…☆236Updated 2 months ago
- Hash identification program.☆151Updated 3 years ago
- Network brute force tool, written in Python. Faster than other existing solutions (including the main leader in the network brute force m…☆390Updated 3 years ago
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆217Updated last year
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆59Updated 2 years ago
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆76Updated 3 years ago
- This a notes/handbook i made and gathered from a great resources on the internet. It consist of a very detailed cheat sheets and useful c…☆158Updated 2 years ago
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare as a hacker …☆272Updated 3 months ago
- A Python Script exploiting a practical vulnerability in the Bolt E-Scooter app which makes it possible to use the E-Scooters without any …☆42Updated 11 months ago
- ☆133Updated 4 years ago
- A targeted DNS cache poisoner☆120Updated 2 years ago
- A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule☆486Updated 7 months ago
- Dirty python script to munge dictionary words into password.☆68Updated 6 months ago
- Find exposed API keys based on RegEx and get exploitation methods for some of keys that are found☆336Updated last year
- Compilation of the ducky scripts I made. Updated August of 2021☆19Updated 3 years ago
- Framework for Rogue Wi-Fi Access Point Attack☆42Updated 9 years ago
- Recover old Snaps that have “disappeared” from Snapchat☆430Updated 3 years ago
- Tryhackme rooms & tools☆64Updated 5 years ago
- WifiForge is a tool developed by Black Hills InfoSec to help train Pentesters on different Wi-Fi attack vectors and Wireless capabilities…☆303Updated last week
- Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!☆1,618Updated 2 weeks ago
- DSJAS: Dave Smith Johnson & son. A fake bank for baiting scammers attempting to steal from online banking.☆76Updated 9 months ago
- A collection of awesome API Security tools and resources. The focus goes to open-source tools and resources that benefit all the communit…☆35Updated 2 years ago
- Torrent files for data breaches used in research☆127Updated 3 years ago
- Frack - Keep and Maintain your breach data☆354Updated 9 months ago