RoseSecurity / Abusing-Roku-APIsLinks
A fun repository on how to externally issue commands to Roku devices utilizing the External Control Protocol (ECP). The repository covers how to enumerate devices, issue commands via "curl," and designing custom scripts to mess with friends and family!
☆285Updated last year
Alternatives and similar repositories for Abusing-Roku-APIs
Users that are interested in Abusing-Roku-APIs are comparing it to the libraries listed below
Sorting:
- Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoc …☆105Updated last year
- A CLI-tool used to stream CCTV online footage based on URL params☆64Updated 3 years ago
- Automated capturing of WPA & WPA2 password Hashes.☆160Updated 2 years ago
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆218Updated 2 years ago
- Gather information from an email address connected to Office 365☆85Updated 2 years ago
- Wordlist to crack .zip-file password☆204Updated 2 years ago
- "Try Harder" is a cybersecurity retro game designed to simulate 100 real-world scenarios that will help you prepare for the Offensive Sec…☆195Updated last year
- Torrent files for data breaches used in research☆135Updated 3 years ago
- WifiForge is a tool developed by Black Hills InfoSec to help train Pentesters on different Wi-Fi attack vectors and Wireless capabilities…☆318Updated 2 weeks ago
- ☆145Updated 11 months ago
- A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule☆502Updated 9 months ago
- ☆522Updated 6 months ago
- Modular Windows malware framework for red teamers to build custom payloads, designed for advanced adversary simulation and authorized mal…☆143Updated last week
- Hash identification program.☆153Updated 3 years ago
- Frack - Keep and Maintain your breach data☆362Updated 10 months ago
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆104Updated 2 years ago
- A targeted DNS cache poisoner☆121Updated 2 years ago
- Bash script to automate setup of Linux router useful for IoT device traffic analysis and SSL mitm☆390Updated 11 months ago
- Minimalist Asterisk Caller ID Spoofer and Secondary VOIP Line Configuration Built for AWS☆302Updated 4 years ago
- DSJAS: Dave Smith Johnson & son. A fake bank for baiting scammers attempting to steal from online banking.☆76Updated 11 months ago
- Network brute force tool, written in Python. Faster than other existing solutions (including the main leader in the network brute force m…☆394Updated 3 years ago
- The DC801 Badge Platform for DC28+☆58Updated last month
- A (hopefully) actively maintained activity-based-autosorted list of InfoSec Streamers☆240Updated this week
- Various wordlists FR & EN - Cracking French passwords☆288Updated this week
- Framework for Rogue Wi-Fi Access Point Attack☆42Updated 9 years ago
- A curated reading list about offensive IT security☆142Updated last week
- A useful wordlist made from French Canadian leaked passwords!☆69Updated 4 years ago
- This is an aspiring project aimed at accumulating knowledge from the world of cybersecurity and presenting it in a cogent way, so it is a…☆191Updated 11 months ago
- NMapify is a Python tool that creates mind maps to visualize network layouts using Nmap. It also generates test cases for each identified…☆57Updated 2 months ago
- ☆134Updated 4 years ago