RoseSecurity / Abusing-Roku-APIs
A fun repository on how to externally issue commands to Roku devices utilizing the External Control Protocol (ECP). The repository covers how to enumerate devices, issue commands via "curl," and designing custom scripts to mess with friends and family!
☆281Updated last year
Alternatives and similar repositories for Abusing-Roku-APIs
Users that are interested in Abusing-Roku-APIs are comparing it to the libraries listed below
Sorting:
- Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoc…☆104Updated last year
- Automated capturing of WPA & WPA2 password Hashes.☆158Updated 2 years ago
- A CLI-tool used to stream CCTV online footage based on URL params☆63Updated 3 years ago
- A persistent root jailbreak for most Roku devices.☆311Updated 3 years ago
- A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule☆479Updated 7 months ago
- Network brute force tool, written in Python. Faster than other existing solutions (including the main leader in the network brute force m…☆386Updated 3 years ago
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆713Updated 3 months ago
- A collection of fascinating and bizarre Censys Search Queries☆1,099Updated last month
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆76Updated 3 years ago
- Flash the usb rubber ducky program with python!☆54Updated 2 years ago
- WifiForge is a tool developed by Black Hills InfoSec to help train Pentesters on different Wi-Fi attack vectors and Wireless capabilities…☆297Updated this week
- This is an application I am developing to automatically convert powershell scripts into ready to use Ducky scripts☆217Updated 2 years ago
- Hash identification program.☆151Updated 3 years ago
- Gather information from an email address connected to Office 365☆85Updated 2 years ago
- ☆132Updated 4 years ago
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆59Updated 2 years ago
- Wordlist to crack .zip-file password☆202Updated 2 years ago
- Spectrum Router Default Password Wordlist☆70Updated 11 months ago
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆214Updated last year
- Frack - Keep and Maintain your breach data☆350Updated 8 months ago
- Recover old Snaps that have “disappeared” from Snapchat☆431Updated 3 years ago
- Dirty python script to munge dictionary words into password.☆67Updated 5 months ago
- Created for my TryHackMe room☆159Updated 5 years ago
- capNcook - a dark web exploration tool☆69Updated last year
- NMapify is a Python tool that creates mind maps to visualize network layouts using Nmap. It also generates test cases for each identified…☆58Updated last week
- Tryhackme rooms & tools☆62Updated 4 years ago
- A Python tool used to automate the execution of the following tools : Nmap , Nikto and Dirsearch but also to automate the report generati…☆292Updated 2 years ago
- Quick and dirty scripts for pentesting.☆41Updated 4 years ago
- This a notes/handbook i made and gathered from a great resources on the internet. It consist of a very detailed cheat sheets and useful c…☆157Updated 2 years ago
- Traps web spiders☆72Updated 4 years ago