RoseSecurity / Abusing-Roku-APIsLinks
A fun repository on how to externally issue commands to Roku devices utilizing the External Control Protocol (ECP). The repository covers how to enumerate devices, issue commands via "curl," and designing custom scripts to mess with friends and family!
☆282Updated last year
Alternatives and similar repositories for Abusing-Roku-APIs
Users that are interested in Abusing-Roku-APIs are comparing it to the libraries listed below
Sorting:
- Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoc…☆104Updated last year
- A CLI-tool used to stream CCTV online footage based on URL params☆63Updated 3 years ago
- Automated capturing of WPA & WPA2 password Hashes.☆160Updated 2 years ago
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆218Updated 2 years ago
- A persistent root jailbreak for most Roku devices.☆320Updated 3 years ago
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆714Updated 5 months ago
- Hash identification program.☆152Updated 3 years ago
- Jaws is an invisible programming language! Inject invisible code into other languages and files! Created for security research -- see blo…☆236Updated 2 months ago
- Modular personalized dictionary generator.☆207Updated 10 months ago
- Network brute force tool, written in Python. Faster than other existing solutions (including the main leader in the network brute force m…☆393Updated 3 years ago
- Gather information from an email address connected to Office 365☆85Updated 2 years ago
- A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule☆492Updated 8 months ago
- ScrapPY is a Python utility for scraping manuals, documents, and other sensitive PDFs to generate wordlists that can be utilized by offen…☆208Updated last month
- Air Script is a powerful Wi-Fi auditing tool with optional email alerts for captured handshakes.☆165Updated 5 months ago
- Turning smart lights into Wifi Hacking implants.☆123Updated 4 months ago
- Tryhackme rooms & tools☆64Updated 5 years ago
- This a notes/handbook i made and gathered from a great resources on the internet. It consist of a very detailed cheat sheets and useful c…☆159Updated 2 years ago
- My personal pretesting recon/low hanging fruit script. Uses Gxss, Dalfox, and a few other scripts to scan all of a domain(and/or subdomai…☆21Updated 6 months ago
- ☆144Updated 10 months ago
- A USB-based script for Ethical hacking with multiple attacks☆51Updated 2 years ago
- This is an aspiring project aimed at accumulating knowledge from the world of cybersecurity and presenting it in a cogent way, so it is a…☆190Updated 10 months ago
- Find exposed API keys based on RegEx and get exploitation methods for some of keys that are found☆335Updated last year
- Compilation of the ducky scripts I made. Updated August of 2021☆19Updated 3 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆197Updated 3 years ago
- ESP8266 based WiFi implant to remotely track the presence of certain people or devices via a simple web interface☆115Updated 3 years ago
- ☆17Updated 4 years ago
- Wordlist to crack .zip-file password☆203Updated 2 years ago
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare as a hacker …☆272Updated 3 months ago
- ☆135Updated 4 years ago
- A compact and portable WiFi reconnaissance suite based on the ESP8266☆114Updated 2 years ago