ESP32 Realtime Fluid Simulation
TheMaMe82
ESP32 Realtime Fluid Simulation
1:01
digital fluid (esp32s3, LCD, touch, accelerometer, dual core) #fluidsimulation #esp32 #programming
TheMaMe82
digital fluid (esp32s3, LCD, touch, accelerometer, dual core) #fluidsimulation #esp32 #programming
0:45
Burning esp32-s3 dev board
TheMaMe82
Burning esp32-s3 dev board
0:29
pushed ESP32-S3 beyond its limits: Fluid Simulation with interpolated density field rendering
TheMaMe82
pushed ESP32-S3 beyond its limits: Fluid Simulation with interpolated density field rendering
0:34
ESP32-S3 Fluid Simulation (Eulerian)
TheMaMe82
ESP32-S3 Fluid Simulation (Eulerian)
1:07
ESP32-S3 PIC/FLIP Fluid Simulation
TheMaMe82
ESP32-S3 PIC/FLIP Fluid Simulation
0:47
RSSI correlation of Google/Apple Exposure Notification
TheMaMe82
RSSI correlation of Google/Apple Exposure Notification
0:41
07 07 scoolio chat google
TheMaMe82
07 07 scoolio chat google
9:12
07 06 case study scoolio realtime monitoring appsflyer
TheMaMe82
07 06 case study scoolio realtime monitoring appsflyer
10:39
07 xx case study insta
TheMaMe82
07 xx case study insta
9:15
Behind the scenes: Spying back on Android Apps
TheMaMe82
Behind the scenes: Spying back on Android Apps
38:08
Neue Luca Lücke: Fremde Schlüsselanhänger einchecken, Kontakdaten für Gesundheitsamt beliebig ändern
TheMaMe82
Neue Luca Lücke: Fremde Schlüsselanhänger einchecken, Kontakdaten für Gesundheitsamt beliebig ändern
6:06
11 Luca Location Betreiber manipuliert QR code um an Nutzerdaten zu kommen
TheMaMe82
11 Luca Location Betreiber manipuliert QR code um an Nutzerdaten zu kommen
16:47
09/10 Unterscheidung "infizierter" und "nicht infizierter" Profile
TheMaMe82
09/10 Unterscheidung "infizierter" und "nicht infizierter" Profile
14:40
08/10 Rekonstruktion Bewegungsprofile: Analyse der Kommunikation ("per device" Check-In / Check-Out)
TheMaMe82
08/10 Rekonstruktion Bewegungsprofile: Analyse der Kommunikation ("per device" Check-In / Check-Out)
26:33
10/10 Zusammenfassung / Ergebnis
TheMaMe82
10/10 Zusammenfassung / Ergebnis
4:01
07/10 Rekonstruktion Bewegungsprofile: Analyse der Kommunikation (vor Check-In)
TheMaMe82
07/10 Rekonstruktion Bewegungsprofile: Analyse der Kommunikation (vor Check-In)
22:26
06/10 Einordnung/Relevanz der vorgenommenen Betrachtung
TheMaMe82
06/10 Einordnung/Relevanz der vorgenommenen Betrachtung
25:49
05/10 App-basierte Check-In Varianten und erste Design-Probleme
TheMaMe82
05/10 App-basierte Check-In Varianten und erste Design-Probleme
19:14
04/10 Prozess: Guest Check-In
TheMaMe82
04/10 Prozess: Guest Check-In
23:44
02/10 Relevante Grundlagen (Kryptographie)
TheMaMe82
02/10 Relevante Grundlagen (Kryptographie)
25:33
03/10 Prozess: Guest Registration
TheMaMe82
03/10 Prozess: Guest Registration
12:34
01/10 Einleitung (Fragestellung)
TheMaMe82
01/10 Einleitung (Fragestellung)
7:06
Luca: checkin to multiple locations (no check-out), for connection errors on *trackable* polling EP
TheMaMe82
Luca: checkin to multiple locations (no check-out), for connection errors on *trackable* polling EP
1:18
LucaApp - Android client TAN verification bypass (verified client-side)
TheMaMe82
LucaApp - Android client TAN verification bypass (verified client-side)
1:30
Enrichment of HTTPS Interception data with data from Binary Instrumentation (German)
TheMaMe82
Enrichment of HTTPS Interception data with data from Binary Instrumentation (German)
14:05
visualizing "apps-tracker-transmitted data" in a single view with Kibana and Vega
TheMaMe82
visualizing "apps-tracker-transmitted data" in a single view with Kibana and Vega
2:13
Realtime visualization of Android App traffic (which data gets exfiltrated to which 3rd party)
TheMaMe82
Realtime visualization of Android App traffic (which data gets exfiltrated to which 3rd party)
2:31
Frida QuickJS performance test with Pokemon GO (2)
TheMaMe82
Frida QuickJS performance test with Pokemon GO (2)
0:14
Frida QuickJS performance test with Pokemon GO
TheMaMe82
Frida QuickJS performance test with Pokemon GO
0:29
PGO instrumentation and traffic interception
TheMaMe82
PGO instrumentation and traffic interception
1:41
Intercepted HTTPS traffic enriched with application data from a mobile device and track trackers
TheMaMe82
Intercepted HTTPS traffic enriched with application data from a mobile device and track trackers
2:42
Attribute traffic intercepted with mitmproxy to source process on Frida instrumented Android device
TheMaMe82
Attribute traffic intercepted with mitmproxy to source process on Frida instrumented Android device
0:46
Test Kibana Dashboard for Frida hooks (TikTok startup, event generated on-the-fly)
TheMaMe82
Test Kibana Dashboard for Frida hooks (TikTok startup, event generated on-the-fly)
4:06
Request Smuggling custom tool 2/3: While probes are issued, multiple POSTS occur in the web app
TheMaMe82
Request Smuggling custom tool 2/3: While probes are issued, multiple POSTS occur in the web app
0:50
Request Smuggling custom tool 3/3: confirmation stage for possible vulnerabilities
TheMaMe82
Request Smuggling custom tool 3/3: confirmation stage for possible vulnerabilities
1:37
Request Smuggling custom tool 1/3: Auto-intercept POST request, timeout probes (CL/TE TE/CL CL/CL)
TheMaMe82
Request Smuggling custom tool 1/3: Auto-intercept POST request, timeout probes (CL/TE TE/CL CL/CL)
1:57
PoC for unauthenticated LFI on DIR-615, Fw 7.19 (latest for Malaysia)
TheMaMe82
PoC for unauthenticated LFI on DIR-615, Fw 7.19 (latest for Malaysia)
1:53
For discussion with other devs
TheMaMe82
For discussion with other devs
2:21
Use nmap to detect and destroy O.MG cables in blue team controlled WiFi networks
TheMaMe82
Use nmap to detect and destroy O.MG cables in blue team controlled WiFi networks
1:30
BLExy: rework of BLuetooth LE (cloned Logitech MX Anywhere 2S)
TheMaMe82
BLExy: rework of BLuetooth LE (cloned Logitech MX Anywhere 2S)
0:57
BLExy - WebUI dev footage
TheMaMe82
BLExy - WebUI dev footage
2:47
BLExy work in progress demo
TheMaMe82
BLExy work in progress demo
6:36
BLExy test, pushing intercepted BLE traffic to browser SPA via USB (rendered with Quasar)
TheMaMe82
BLExy test, pushing intercepted BLE traffic to browser SPA via USB (rendered with Quasar)
1:05
BLExy development: Proxy BLE connection of a mouse, relay to browser and back (WebHID)
TheMaMe82
BLExy development: Proxy BLE connection of a mouse, relay to browser and back (WebHID)
0:54
BLExy: Research on suitable UI
TheMaMe82
BLExy: Research on suitable UI
1:20
BLExy: Test of BLE proxy at 7.5ms connection interval
TheMaMe82
BLExy: Test of BLE proxy at 7.5ms connection interval
1:13
BLExy test 2
TheMaMe82
BLExy test 2
1:48
BLExy trst
TheMaMe82
BLExy trst
3:07
Wireless remote shell with custom built USB cable on an air-gapped Windows box
TheMaMe82
Wireless remote shell with custom built USB cable on an air-gapped Windows box
1:29
PoC: Bypass of Logitech Unifying patch for CVE-2019-13055
TheMaMe82
PoC: Bypass of Logitech Unifying patch for CVE-2019-13055
2:08
LOGITacker update v0.1.3-beta, device emulation on latets receiver firmware
TheMaMe82
LOGITacker update v0.1.3-beta, device emulation on latets receiver firmware
0:51
LOGITacker tutorial: Using from Android, discover, sniff and store devices
TheMaMe82
LOGITacker tutorial: Using from Android, discover, sniff and store devices
2:38
Extract link encryption key of Logitech wireless devices (vulnerabilitily stays unadressed)
TheMaMe82
Extract link encryption key of Logitech wireless devices (vulnerabilitily stays unadressed)
1:17
Logitech SPOTLIGHT presentation clicker: wireless remote code execution 2
TheMaMe82
Logitech SPOTLIGHT presentation clicker: wireless remote code execution 2
0:10
Logitech SPOTLIGHT: Wireless Remote Code Execution after one-time physicall access
TheMaMe82
Logitech SPOTLIGHT: Wireless Remote Code Execution after one-time physicall access
1:25
Unifying remote shell deployed via keystroke injection vulnerability
TheMaMe82
Unifying remote shell deployed via keystroke injection vulnerability
1:38
CVE-2019-13052 LOGITacker: Demo live decryption of Unifying keyboard after sniffed pairing
TheMaMe82
CVE-2019-13052 LOGITacker: Demo live decryption of Unifying keyboard after sniffed pairing
1:50
LOGITacker: Bypassing latest keystroke injection protection of Logitech MX Anywhere 2S
TheMaMe82
LOGITacker: Bypassing latest keystroke injection protection of Logitech MX Anywhere 2S
1:29
LOGITacker - sniff pairing and inject keystrokes with scripting
TheMaMe82
LOGITacker - sniff pairing and inject keystrokes with scripting
2:57
Logitech: Running a backdoor shell communicating only through a Unifying dongle
TheMaMe82
Logitech: Running a backdoor shell communicating only through a Unifying dongle
2:01
Unifying PoC 3: dump AES keys and addresses from dongle in less than a second + live RF decryption
TheMaMe82
Unifying PoC 3: dump AES keys and addresses from dongle in less than a second + live RF decryption
2:42
CVE-2019-13053: attack on Unifying - keystroke injection (fully patched, encrypted device)
TheMaMe82
CVE-2019-13053: attack on Unifying - keystroke injection (fully patched, encrypted device)
1:44
P4wnP1 A.L.O.A. test relative mouse move from 5 concurrent HIDScript jobs
TheMaMe82
P4wnP1 A.L.O.A. test relative mouse move from 5 concurrent HIDScript jobs
2:20
P4wnP1 A.L.O.A. - USB Mass storage from webclien desktop view
TheMaMe82
P4wnP1 A.L.O.A. - USB Mass storage from webclien desktop view
2:23
P4wnP1 A.L.O.A. workflow demo
TheMaMe82
P4wnP1 A.L.O.A. workflow demo
5:14
P4wnP1 work-in-progress web client tests (desktop version)
TheMaMe82
P4wnP1 work-in-progress web client tests (desktop version)
5:37
P4wnP1 streaming log events to browser via gRPC in high frequency
TheMaMe82
P4wnP1 streaming log events to browser via gRPC in high frequency
0:32
P4wnP1 webfrontend tests HIDScript (mouse + keyboard)
TheMaMe82
P4wnP1 webfrontend tests HIDScript (mouse + keyboard)
6:06
P4wnP1 Rework: Extend boilerplate code for gRPC web-client for dynamic USB gadget reconfiguration
TheMaMe82
P4wnP1 Rework: Extend boilerplate code for gRPC web-client for dynamic USB gadget reconfiguration
2:01
P4wnP1 rework spoiler (screencast from remote CLI test)
TheMaMe82
P4wnP1 rework spoiler (screencast from remote CLI test)
7:57
Demo of upcoming HIDScript language for P4wnP1 rework
TheMaMe82
Demo of upcoming HIDScript language for P4wnP1 rework
1:48
P4wnP1 WiFi covert channel demo
TheMaMe82
P4wnP1 WiFi covert channel demo
3:29
Backdoor  Windows lockscreen with P4wnP1
TheMaMe82
Backdoor Windows lockscreen with P4wnP1
1:41
Stealing saved webpage credentials with P4wnP1
TheMaMe82
Stealing saved webpage credentials with P4wnP1
2:04
[tutorial] How to connect P4wnP1 to Internet
TheMaMe82
[tutorial] How to connect P4wnP1 to Internet
5:05
Crack open locked Windows machines - P4wnP1 LockPicker payload demo
TheMaMe82
Crack open locked Windows machines - P4wnP1 LockPicker payload demo
1:03
Beyond BadUSB and BashBunny... P4wnP1 covert HID channel demo (enable captions for comments)
TheMaMe82
Beyond BadUSB and BashBunny... P4wnP1 covert HID channel demo (enable captions for comments)
7:41