RoseSecurity / Abusing-Roku-APIs
A fun repository on how to externally issue commands to Roku devices utilizing the External Control Protocol (ECP). The repository covers how to enumerate devices, issue commands via "curl," and designing custom scripts to mess with friends and family!
☆278Updated last year
Alternatives and similar repositories for Abusing-Roku-APIs:
Users that are interested in Abusing-Roku-APIs are comparing it to the libraries listed below
- A CLI-tool used to stream CCTV online footage based on URL params☆64Updated 3 years ago
- Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoc…☆104Updated last year
- Jaws is an invisible programming language! Inject invisible code into other languages and files! Created for security research -- see blo…☆236Updated 3 weeks ago
- A persistent root jailbreak for most Roku devices.☆308Updated 3 years ago
- Automated capturing of WPA & WPA2 password Hashes.☆159Updated 2 years ago
- Spectrum Router Default Password Wordlist☆69Updated 10 months ago
- A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule☆473Updated 6 months ago
- A list of various routers default WPA key space☆71Updated 7 years ago
- Hash identification program.☆152Updated 3 years ago
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆76Updated 3 years ago
- A Python Script exploiting a practical vulnerability in the Bolt E-Scooter app which makes it possible to use the E-Scooters without any …☆38Updated 10 months ago
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆713Updated 3 months ago
- WMI virus, because funny☆278Updated 2 months ago
- WifiForge is a tool developed by Black Hills InfoSec to help train Pentesters on different Wi-Fi attack vectors and Wireless capabilities…☆284Updated last week
- ☆133Updated 4 years ago
- The DC801 Badge Platform for DC28+☆58Updated 3 weeks ago
- This a notes/handbook i made and gathered from a great resources on the internet. It consist of a very detailed cheat sheets and useful c…☆157Updated 2 years ago
- Turning smart lights into Wifi Hacking implants.☆117Updated 2 months ago
- Wordlist to crack .zip-file password☆201Updated 2 years ago
- NMapify is a Python tool that creates mind maps to visualize network layouts using Nmap. It also generates test cases for each identified…☆58Updated last week
- A targeted DNS cache poisoner☆118Updated 2 years ago
- ☆449Updated last year
- [RELEASED] A CLI tool for large-scale password recovery operations using AWS☆29Updated last year
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆102Updated 2 years ago
- collection of pentesting and network security documents☆16Updated 2 years ago
- Gather information from an email address connected to Office 365☆85Updated 2 years ago
- This is an application I am developing to automatically convert powershell scripts into ready to use Ducky scripts☆217Updated 2 years ago
- Traps web spiders☆71Updated 4 years ago
- Air Script is a powerful Wi-Fi auditing tool with optional email alerts for captured handshakes.☆162Updated 3 months ago
- All Useful Linux Commands (For OSCP & daily pen-testing usage)☆214Updated 2 years ago