RoseSecurity / Abusing-Roku-APIs
A fun repository on how to externally issue commands to Roku devices utilizing the External Control Protocol (ECP). The repository covers how to enumerate devices, issue commands via "curl," and designing custom scripts to mess with friends and family!
☆271Updated last year
Alternatives and similar repositories for Abusing-Roku-APIs:
Users that are interested in Abusing-Roku-APIs are comparing it to the libraries listed below
- Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoc…☆103Updated last year
- Automated capturing of WPA & WPA2 password Hashes.☆157Updated last year
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆708Updated this week
- Wordlist to crack .zip-file password☆201Updated 2 years ago
- A CLI-tool used to stream CCTV online footage based on URL params☆62Updated 2 years ago
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆76Updated 3 years ago
- This is a small BASH script to quickly setup all the tools I would want and need on a new machine.☆146Updated 2 years ago
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆189Updated last year
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆59Updated 2 years ago
- All Useful Linux Commands (For OSCP & daily pen-testing usage)☆209Updated 2 years ago
- Compress a Python script to a command-line one-liner☆76Updated 2 years ago
- This a notes/handbook i made and gathered from a great resources on the internet. It consist of a very detailed cheat sheets and useful c…☆155Updated 2 years ago
- A curated reading list about offensive IT security☆138Updated 4 months ago
- Hash identification program.☆151Updated 2 years ago
- Automated Recon Script for Hackthebox machines (hackthebox.eu)☆54Updated 4 years ago
- ☆132Updated 3 years ago
- A targeted DNS cache poisoner☆116Updated 2 years ago
- Gather information from an email address connected to Office 365☆83Updated last year
- "Bob the Smuggler": A tool that leverages HTML Smuggling Attack and allows you to create HTML files with embedded 7z/zip archives. The to…☆504Updated 8 months ago
- Jaws is an invisible programming language! Inject invisible code into other languages and files! Created for security research -- see blo…☆235Updated 2 years ago
- A collection of fascinating and bizarre Censys Search Queries☆983Updated this week
- ☆516Updated last week
- NMapify is a Python tool that creates mind maps to visualize network layouts using Nmap. It also generates test cases for each identified…☆56Updated last year
- A Proof-of-Concept Layer 2 Denial of Service Attack that disrupts low level operations of Programmable Logic Controllers within industria…☆31Updated 3 years ago
- A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule☆428Updated 3 months ago
- This is an application I am developing to automatically convert powershell scripts into ready to use Ducky scripts☆200Updated 2 years ago
- A script that I made to get the essentials I use for various reasons on Kali Linux.☆55Updated 2 years ago
- PasteBomb C2-less RAT☆316Updated 2 months ago
- A USB-based script for Ethical hacking with multiple attacks☆47Updated last year
- DorkScout - Golang tool to automate google dork scan against the entiere internet or specific targets☆235Updated 3 years ago