RoseSecurity / Abusing-Roku-APIsLinks
A fun repository on how to externally issue commands to Roku devices utilizing the External Control Protocol (ECP). The repository covers how to enumerate devices, issue commands via "curl," and designing custom scripts to mess with friends and family!
☆289Updated last year
Alternatives and similar repositories for Abusing-Roku-APIs
Users that are interested in Abusing-Roku-APIs are comparing it to the libraries listed below
Sorting:
- Automated capturing of WPA & WPA2 password Hashes.☆160Updated 2 years ago
- Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoc…☆103Updated last year
- A CLI-tool used to stream CCTV online footage based on URL params☆65Updated 3 years ago
- Hash identification program.☆154Updated 3 years ago
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆218Updated 2 years ago
- Compilation of the ducky scripts I made. Updated August of 2021☆19Updated 4 years ago
- ☆520Updated 8 months ago
- Is grass green, do birds fly, do cats eat bats, do rats shit gnats? A peak inside in corrupted mind☆46Updated last week
- Network brute force tool, written in Python. Faster than other existing solutions (including the main leader in the network brute force m…☆397Updated 4 years ago
- Framework for Rogue Wi-Fi Access Point Attack☆42Updated 9 years ago
- ☆470Updated last year
- Gather information from an email address connected to Office 365☆85Updated 2 years ago
- Minimalist Asterisk Caller ID Spoofer and Secondary VOIP Line Configuration Built for AWS☆301Updated 5 years ago
- The DC801 Badge Platform for DC28+☆58Updated last week
- "Try Harder" is a cybersecurity retro game designed to simulate 100 real-world scenarios that will help you prepare for the Offensive Sec…☆206Updated 2 years ago
- Wordlist to crack .zip-file password☆205Updated 3 years ago
- Torrent files for data breaches used in research☆155Updated 3 years ago
- ESP8266 wardriving scripts & Jupyter Notebook data visualization tools☆170Updated 2 years ago
- Log ALPR data using a Motorola vulnerability☆82Updated 8 months ago
- A list of viruses from Windows 3.1, and the 16 bit binaries associated.☆47Updated 3 years ago
- Tryhackme rooms & tools☆65Updated 5 years ago
- Tool for using wireless signals to see if you're being followed.☆667Updated 7 months ago
- A list of various routers default WPA key space☆74Updated 7 years ago
- Jaws is an invisible programming language! Inject invisible code into other languages and files! Created for security research -- see blo…☆234Updated 6 months ago
- Turning smart lights into Wifi Hacking implants.☆129Updated 8 months ago
- This is an application I am developing to automatically convert powershell scripts into ready to use Ducky scripts☆225Updated 3 years ago
- This is an aspiring project aimed at accumulating knowledge from the world of cybersecurity and presenting it in a cogent way, so it is a…☆193Updated last year
- A curated reading list about offensive IT security☆144Updated 3 weeks ago
- Modular malware framework to build custom payloads, designed for advanced adversary simulation and malware research☆314Updated 2 weeks ago
- This is a small BASH script to quickly setup all the tools I would want and need on a new machine.☆147Updated 3 years ago