RoseSecurity / Abusing-Roku-APIs
A fun repository on how to externally issue commands to Roku devices utilizing the External Control Protocol (ECP). The repository covers how to enumerate devices, issue commands via "curl," and designing custom scripts to mess with friends and family!
☆275Updated last year
Alternatives and similar repositories for Abusing-Roku-APIs:
Users that are interested in Abusing-Roku-APIs are comparing it to the libraries listed below
- Automated capturing of WPA & WPA2 password Hashes.☆158Updated 2 years ago
- Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoc…☆103Updated last year
- A CLI-tool used to stream CCTV online footage based on URL params☆63Updated 3 years ago
- Hash identification program.☆152Updated 3 years ago
- A targeted DNS cache poisoner☆117Updated 2 years ago
- Tryhackme rooms & tools☆62Updated 4 years ago
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆59Updated 2 years ago
- Gather information from an email address connected to Office 365☆85Updated last year
- A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule☆447Updated 4 months ago
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆210Updated last year
- Concept script to demonstrate how to exfiltrate data inside of ping packets☆88Updated last year
- Wordlist to crack .zip-file password☆201Updated 2 years ago
- An easy but powerful hack of the standard copy-paste behaviour of any browser☆64Updated 3 years ago
- Network brute force tool, written in Python. Faster than other existing solutions (including the main leader in the network brute force m…☆382Updated 3 years ago
- ☆143Updated 6 months ago
- ESP8266 wardriving scripts & Jupyter Notebook data visualization tools☆164Updated last year
- NMapify is a Python tool that creates mind maps to visualize network layouts using Nmap. It also generates test cases for each identified…☆57Updated last year
- This is a small BASH script to quickly setup all the tools I would want and need on a new machine.☆146Updated 2 years ago
- Xfinity / Comcast Wordlist Generator☆59Updated last year
- Jaws is an invisible programming language! Inject invisible code into other languages and files! Created for security research -- see blo…☆235Updated 2 years ago
- Find exposed API keys based on RegEx and get exploitation methods for some of keys that are found☆334Updated last year
- ScrapPY is a Python utility for scraping manuals, documents, and other sensitive PDFs to generate wordlists that can be utilized by offen…☆206Updated last month
- collection of pentesting and network security documents☆16Updated 2 years ago
- This a notes/handbook i made and gathered from a great resources on the internet. It consist of a very detailed cheat sheets and useful c…☆155Updated 2 years ago
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆101Updated last year
- Instructions on how to create your very own Pwnbox, originally created by HTB☆401Updated 2 years ago
- ☆518Updated last month
- 3D printable design to adapt Lishi 6-pin picks for use in 5-pin locks☆76Updated 8 months ago
- Check the README file below to see how amazing this is! (NO ROOT IS NEEDED!)☆156Updated this week
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆707Updated last month