RoseSecurity / Abusing-Roku-APIsLinks
A fun repository on how to externally issue commands to Roku devices utilizing the External Control Protocol (ECP). The repository covers how to enumerate devices, issue commands via "curl," and designing custom scripts to mess with friends and family!
☆291Updated 3 months ago
Alternatives and similar repositories for Abusing-Roku-APIs
Users that are interested in Abusing-Roku-APIs are comparing it to the libraries listed below
Sorting:
- Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoc…☆105Updated 2 years ago
- Automated capturing of WPA & WPA2 password Hashes.☆160Updated 2 years ago
- A CLI-tool used to stream CCTV online footage based on URL params☆66Updated 3 years ago
- Hash identification program.☆153Updated 3 years ago
- Jaws is an invisible programming language! Inject invisible code into other languages and files! Created for security research -- see blo…☆234Updated 10 months ago
- Gather information from an email address connected to Office 365☆89Updated 2 years ago
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆224Updated 2 years ago
- A targeted DNS cache poisoner☆124Updated 3 years ago
- A Python Script exploiting a practical vulnerability in the Bolt E-Scooter app which makes it possible to use the E-Scooters without any …☆61Updated last year
- Wordlist to crack .zip-file password☆207Updated 3 years ago
- MacStealer: Wi-Fi Client Isolation Bypass☆523Updated last month
- Frack - Keep and Maintain your breach data☆382Updated last year
- Network brute force tool, written in Python. Faster than other existing solutions (including the main leader in the network brute force m…☆413Updated 4 years ago
- Torrent files for data breaches used in research☆171Updated 4 years ago
- A list of viruses from Windows 3.1, and the 16 bit binaries associated.☆53Updated 4 years ago
- This is an aspiring project aimed at accumulating knowledge from the world of cybersecurity and presenting it in a cogent way, so it is a…☆199Updated last year
- A curated reading list about offensive IT security☆146Updated 4 months ago
- Recover old Snaps that have “disappeared” from Snapchat☆432Updated 4 years ago
- This OSINT Notebook provides an overview of the tools, techniques, and resources that I use for a variety of situations when it comes to …☆359Updated last year
- Tryhackme rooms & tools☆64Updated 5 years ago
- ☆37Updated 2 years ago
- A collection of fascinating and bizarre Censys Search Queries☆1,200Updated last month
- Network, recon and offensive-security tool for Linux.☆316Updated last year
- Search twitter by address. Due to the ongoing situation at twitter this repository is not currently being maintained.☆29Updated 4 years ago
- Log ALPR data using a Motorola vulnerability☆83Updated last year
- "Try Harder" is a cybersecurity retro game designed to simulate 100 real-world scenarios that will help you prepare for the Offensive Sec…☆220Updated 2 years ago
- Various wordlists FR & EN - Cracking French passwords☆309Updated this week
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆748Updated 3 months ago
- WifiForge is a tool developed by Black Hills InfoSec to help train Pentesters on different Wi-Fi attack vectors and Wireless capabilities…☆425Updated 2 weeks ago
- Repository containing useful links for all things Physical Security. Please contribute!☆97Updated 4 years ago