RoseSecurity / Abusing-Roku-APIsLinks
A fun repository on how to externally issue commands to Roku devices utilizing the External Control Protocol (ECP). The repository covers how to enumerate devices, issue commands via "curl," and designing custom scripts to mess with friends and family!
☆287Updated last year
Alternatives and similar repositories for Abusing-Roku-APIs
Users that are interested in Abusing-Roku-APIs are comparing it to the libraries listed below
Sorting:
- Automated capturing of WPA & WPA2 password Hashes.☆160Updated 2 years ago
- Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoc…☆105Updated last year
- A CLI-tool used to stream CCTV online footage based on URL params☆64Updated 3 years ago
- This is a small BASH script to quickly setup all the tools I would want and need on a new machine.☆147Updated 3 years ago
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆219Updated 2 years ago
- Wordlist to crack .zip-file password☆204Updated 3 years ago
- Hash identification program.☆154Updated 3 years ago
- Tryhackme rooms & tools☆65Updated 5 years ago
- A curated reading list about offensive IT security☆144Updated last week
- Gather information from an email address connected to Office 365☆84Updated 2 years ago
- Torrent files for data breaches used in research☆145Updated 3 years ago
- Network brute force tool, written in Python. Faster than other existing solutions (including the main leader in the network brute force m…☆395Updated 4 years ago
- This OSINT Notebook provides an overview of the tools, techniques, and resources that I use for a variety of situations when it comes to …☆354Updated last year
- Modular malware framework to build custom payloads, designed for advanced adversary simulation and malware research☆222Updated last week
- "Try Harder" is a cybersecurity retro game designed to simulate 100 real-world scenarios that will help you prepare for the Offensive Sec…☆199Updated last year
- Spoof emails from any of the +2 Million domains using MailChannels (DEFCON 31 Talk)☆340Updated last year
- ☆148Updated last year
- Log ALPR data using a Motorola vulnerability☆81Updated 7 months ago
- This is an aspiring project aimed at accumulating knowledge from the world of cybersecurity and presenting it in a cogent way, so it is a…☆192Updated last year
- A list of viruses from Windows 3.1, and the 16 bit binaries associated.☆45Updated 3 years ago
- Created for my TryHackMe room☆169Updated 5 years ago
- A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule☆525Updated 10 months ago
- Minimalist Asterisk Caller ID Spoofer and Secondary VOIP Line Configuration Built for AWS☆304Updated 4 years ago
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare as a hacker …☆275Updated 5 months ago
- Frack - Keep and Maintain your breach data☆369Updated 11 months ago
- ☆134Updated 4 years ago
- 🏴☠️ Hacking Guides, Demos and Proof-of-Concepts 🥷☆203Updated 2 months ago
- A (hopefully) actively maintained activity-based-autosorted list of InfoSec Streamers☆245Updated this week
- Jaws is an invisible programming language! Inject invisible code into other languages and files! Created for security research -- see blo…☆234Updated 5 months ago
- DSJAS: Dave Smith Johnson & son. A fake bank for baiting scammers attempting to steal from online banking.☆79Updated 2 weeks ago