RoseSecurity / Abusing-Roku-APIs
A fun repository on how to externally issue commands to Roku devices utilizing the External Control Protocol (ECP). The repository covers how to enumerate devices, issue commands via "curl," and designing custom scripts to mess with friends and family!
☆237Updated 7 months ago
Related projects: ⓘ
- Automated capturing of WPA & WPA2 password Hashes.☆155Updated last year
- Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoc…☆102Updated 10 months ago
- ☆73Updated this week
- ☆56Updated this week
- A CLI-tool used to stream CCTV online footage based on URL params☆59Updated 2 years ago
- Hash identification program.☆149Updated 2 years ago
- ☆19Updated this week
- Jaws is an invisible programming language! Inject invisible code into other languages and files! Created for security research -- see blo…☆232Updated last year
- Gather information from an email address connected to Office 365☆81Updated last year
- A Python Script exploiting a practical vulnerability in the Bolt E-Scooter app which makes it possible to use the E-Scooters without any …☆20Updated 3 months ago
- Tartarus | STEGANOGRAPHY☆59Updated 3 years ago
- This is a small BASH script to quickly setup all the tools I would want and need on a new machine.☆143Updated 2 years ago
- A targeted DNS cache poisoner☆109Updated last year
- Compilation of the ducky scripts I made. Updated August of 2021☆19Updated 3 years ago
- A curated reading list about offensive IT security☆137Updated last week
- Modular personalized dictionary generator.☆186Updated last month
- Wordlist to crack .zip-file password☆201Updated 2 years ago
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare as a hacker …☆240Updated 11 months ago
- Tryhackme rooms & tools☆60Updated 4 years ago
- ☆133Updated 3 years ago
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆74Updated 2 years ago
- A hacking tool to convert and decode HTML source code☆94Updated 2 years ago
- Network brute force tool, written in Python. Faster than other existing solutions (including the main leader in the network brute force m…☆359Updated 3 years ago
- This is an aspiring project aimed at accumulating knowledge from the world of cybersecurity and presenting it in a cogent way, so it is a…☆175Updated last month
- A USB-based script for Ethical hacking with multiple attacks☆45Updated last year
- DorkScout - Golang tool to automate google dork scan against the entiere internet or specific targets☆230Updated 3 years ago
- Compress a Python script to a command-line one-liner☆72Updated last year
- Quick and dirty scripts for pentesting.☆40Updated 4 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆188Updated 2 years ago
- Automated Recon Script for Hackthebox machines (hackthebox.eu)☆54Updated 4 years ago