RoseSecurity / Abusing-Roku-APIsLinks
A fun repository on how to externally issue commands to Roku devices utilizing the External Control Protocol (ECP). The repository covers how to enumerate devices, issue commands via "curl," and designing custom scripts to mess with friends and family!
☆289Updated this week
Alternatives and similar repositories for Abusing-Roku-APIs
Users that are interested in Abusing-Roku-APIs are comparing it to the libraries listed below
Sorting:
- Automated capturing of WPA & WPA2 password Hashes.☆160Updated 2 years ago
- Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoc…☆104Updated last year
- A CLI-tool used to stream CCTV online footage based on URL params☆65Updated 3 years ago
- Hash identification program.☆154Updated 3 years ago
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆220Updated 2 years ago
- A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule☆555Updated last year
- Modular malware framework to build custom payloads, designed for advanced adversary simulation and malware research☆316Updated last month
- The DC801 Badge Platform for DC28+☆58Updated this week
- Default Router WPA KeySpace Wordlists☆123Updated 8 years ago
- ☆521Updated 9 months ago
- ☆149Updated last year
- Tryhackme rooms & tools☆65Updated 5 years ago
- Gather information from an email address connected to Office 365☆85Updated 2 years ago
- Wordlist to crack .zip-file password☆206Updated 3 years ago
- A list of various routers default WPA key space☆75Updated 7 years ago
- Network brute force tool, written in Python. Faster than other existing solutions (including the main leader in the network brute force m…☆396Updated 4 years ago
- This is a small BASH script to quickly setup all the tools I would want and need on a new machine.☆148Updated 3 years ago
- Compress a Python script to a command-line one-liner☆77Updated 2 years ago
- ☆133Updated 4 years ago
- Quick and dirty scripts for pentesting.☆41Updated 5 years ago
- A list of viruses from Windows 3.1, and the 16 bit binaries associated.☆47Updated 3 years ago
- A targeted DNS cache poisoner☆123Updated 3 years ago
- Bash script to automate setup of Linux router useful for IoT device traffic analysis and SSL mitm☆455Updated last month
- WifiForge is a tool developed by Black Hills InfoSec to help train Pentesters on different Wi-Fi attack vectors and Wireless capabilities…☆382Updated 2 weeks ago
- Minimalist Asterisk Caller ID Spoofer and Secondary VOIP Line Configuration Built for AWS☆302Updated 5 years ago
- Compilation of the ducky scripts I made. Updated August of 2021☆19Updated 4 years ago
- Password cracking research using the Have I Been Pwned (HIBP) dataset to evaluate the effectiveness of the PassGPT Large Language Model (…☆63Updated last year
- Dirty python script to munge dictionary words into password.☆71Updated 10 months ago
- An easy but powerful hack of the standard copy-paste behaviour of any browser☆61Updated 3 years ago
- Spoof emails from any of the +2 Million domains using MailChannels (DEFCON 31 Talk)☆340Updated 2 years ago