RoseSecurity / Abusing-Roku-APIsLinks
A fun repository on how to externally issue commands to Roku devices utilizing the External Control Protocol (ECP). The repository covers how to enumerate devices, issue commands via "curl," and designing custom scripts to mess with friends and family!
☆288Updated 3 weeks ago
Alternatives and similar repositories for Abusing-Roku-APIs
Users that are interested in Abusing-Roku-APIs are comparing it to the libraries listed below
Sorting:
- Automated capturing of WPA & WPA2 password Hashes.☆160Updated 2 years ago
- Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoc…☆104Updated 2 years ago
- A CLI-tool used to stream CCTV online footage based on URL params☆66Updated 3 years ago
- Hash identification program.☆153Updated 3 years ago
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆226Updated 2 years ago
- Network brute force tool, written in Python. Faster than other existing solutions (including the main leader in the network brute force m…☆401Updated 4 years ago
- Wordlist to crack .zip-file password☆206Updated 3 years ago
- Torrent files for data breaches used in research☆160Updated 3 years ago
- Is grass green, do birds fly, do cats eat bats, do rats shit gnats? A peak inside in corrupted mind☆51Updated 2 weeks ago
- This is an aspiring project aimed at accumulating knowledge from the world of cybersecurity and presenting it in a cogent way, so it is a…☆195Updated last year
- A list of viruses from Windows 3.1, and the 16 bit binaries associated.☆49Updated 3 years ago
- Frack - Keep and Maintain your breach data☆378Updated last year
- Minimalist Asterisk Caller ID Spoofer and Secondary VOIP Line Configuration Built for AWS☆307Updated 5 years ago
- "Try Harder" is a cybersecurity retro game designed to simulate 100 real-world scenarios that will help you prepare for the Offensive Sec…☆214Updated 2 years ago
- Gather information from an email address connected to Office 365☆86Updated 2 years ago
- A targeted DNS cache poisoner☆124Updated 3 years ago
- Hawx Recon Agent is an intelligent, autonomous reconnaissance system powered by a Large Language Model (LLM). Designed for offensive secu…☆28Updated 2 months ago
- A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule☆564Updated last year
- Modular malware framework to build custom payloads, designed for advanced adversary simulation and malware research☆317Updated last month
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆741Updated 3 weeks ago
- Air Script is a powerful Wi-Fi auditing tool with optional email alerts for captured handshakes.☆170Updated 10 months ago
- Jaws is an invisible programming language! Inject invisible code into other languages and files! Created for security research -- see blo…☆234Updated 7 months ago
- A collection of fascinating and bizarre Censys Search Queries☆1,177Updated 3 months ago
- Various wordlists FR & EN - Cracking French passwords☆302Updated last week
- Framework for Rogue Wi-Fi Access Point Attack☆42Updated 9 years ago
- A new generation web interface for Hashcat☆39Updated last year
- Quickly Extracts IP's, Email Addresses, Hashes, Files, Credit Cards, Social Security Numbers and a lot More From Text☆873Updated last year
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare as a hacker …☆280Updated 8 months ago
- ☆522Updated 10 months ago
- WifiForge is a tool developed by Black Hills InfoSec to help train Pentesters on different Wi-Fi attack vectors and Wireless capabilities…☆394Updated last month