RoseSecurity / Abusing-Roku-APIsLinks
A fun repository on how to externally issue commands to Roku devices utilizing the External Control Protocol (ECP). The repository covers how to enumerate devices, issue commands via "curl," and designing custom scripts to mess with friends and family!
☆288Updated last month
Alternatives and similar repositories for Abusing-Roku-APIs
Users that are interested in Abusing-Roku-APIs are comparing it to the libraries listed below
Sorting:
- Automated capturing of WPA & WPA2 password Hashes.☆160Updated 2 years ago
- Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoc…☆104Updated 2 years ago
- Hash identification program.☆153Updated 3 years ago
- A CLI-tool used to stream CCTV online footage based on URL params☆66Updated 3 years ago
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆226Updated 2 years ago
- Network brute force tool, written in Python. Faster than other existing solutions (including the main leader in the network brute force m…☆405Updated 4 years ago
- Gather information from an email address connected to Office 365☆86Updated 2 years ago
- Frack - Keep and Maintain your breach data☆377Updated last year
- Log ALPR data using a Motorola vulnerability☆83Updated 10 months ago
- ☆149Updated last year
- Wordlist to crack .zip-file password☆207Updated 3 years ago
- Minimalist Asterisk Caller ID Spoofer and Secondary VOIP Line Configuration Built for AWS☆309Updated 5 years ago
- Torrent files for data breaches used in research☆162Updated 3 years ago
- ☆523Updated 10 months ago
- Is grass green, do birds fly, do cats eat bats, do rats shit gnats? A peak inside in corrupted mind☆53Updated last week
- DSJAS: Dave Smith Johnson & son. A fake bank for baiting scammers attempting to steal from online banking.☆86Updated 4 months ago
- A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule☆570Updated last year
- "Try Harder" is a cybersecurity retro game designed to simulate 100 real-world scenarios that will help you prepare for the Offensive Sec…☆216Updated 2 years ago
- A list of viruses from Windows 3.1, and the 16 bit binaries associated.☆51Updated 3 years ago
- ☆133Updated 4 years ago
- Jaws is an invisible programming language! Inject invisible code into other languages and files! Created for security research -- see blo…☆234Updated 8 months ago
- Spoof emails from any of the +2 Million domains using MailChannels (DEFCON 31 Talk)☆341Updated 2 years ago
- The DC801 Badge Platform for DC28+☆59Updated 3 weeks ago
- Extract Windows Wi-Fi Passwords to Remote URL☆272Updated 3 years ago
- A list of various routers default WPA key space☆78Updated 8 years ago
- Air Script is a powerful Wi-Fi auditing tool with optional email alerts for captured handshakes.☆171Updated 3 weeks ago
- DHCP starvation attack☆86Updated 9 months ago
- A reconnaissance tool for capturing and displaying SSIDs from device's Preferred Network List.☆164Updated 4 months ago
- its like a tricorder, for your wireless world.☆116Updated last year
- Tryhackme rooms & tools☆65Updated 5 years ago