Bookmark
Frida • Inject JavaScript to explore native apps on Windows, macOS, GNU/Linux, iOS, Android, and QNX
https://frida.re/, posted 2019 by peter in automation development free hack javascript opensource software testing
Inject your own scripts into black box processes. Hook any function, spy on crypto APIs or trace private application code, no source code needed. Edit, hit save, and instantly see the results. All without compilation steps or program restarts.
Bookmark
Netflix on an NES Is the Best Worst Way to Watch Netflix
gizmodo.com/netflix-on-an-nes-is-the-best-worst-way-to-watch-netfli-1690585053, posted 2015 by peter in hack nintendo retro video
There's no reason you would ever need to rig up an NES to run Netflix. Which is why it's so great that these two delightfully insane Netflix engineers did it for us. Because at long last, we can finally see the House of Cards intro in all the horrific, 8-bit glory absolutely no one ever intended.
Bookmark
Sans Bullshit Sans: leveraging the synergy of ligatures – Pixelambacht
pixelambacht.nl/2015/sans-bullshit-sans/, posted 2015 by peter in font hack howto humor typography
Ever wonder what exactly is inside a font? We know it contains letters — or actually, drawings of letters, but what else is in there? Well, why not crack one open and see, and while we’re there, find a way to make this world a little less buzzwordy?
Bookmark
The Infinite Jukebox
labs.echonest.com/Uploader/index.html, posted 2015 by peter in audio hack music online
This web app lets you upload a favorite MP3 and will then generate a never-ending and ever changing version of the song. Infinite Jukebox uses the Echo Nest analyzer to break the song into beats. It plays the song beat by beat, but at every beat there's a chance that it will jump to a different part of song that happens to sound very similar to the current beat. For beat similarity the uses pitch, timbre, loudness, duration and the position of the beat within a bar. There's a nifty visualization that shows all the possible transitions that can occur at any beat. Built at Music Hack Day Boston 2012.
Bookmark
The Lego calendar is a wall mounted time planner made entirely of Lego.
www.brandingidentitydesign.com/lego-calendar/#.UkygyGRs6oU, posted 2013 by peter in diy hack management planning
The Lego calendar is a wall mounted time planner made entirely of Lego. Take a photo of it with a smartphone all of the events and timings will be magically synchronised to an online, digital calendar. It makes the most of the tangibility of physical objects, and the ubiquity of digital platforms.
Our USB Typewriter circuitry can transform your old manual typewriter into a retro-futuristic marvel. Use a gorgeous vintage typewriter as the computer keyboard for your Mac or PC, or type with ink-on-paper while electronically recording your keystrokes! The USB Typewriter also makes an outstanding keyboard dock for your iPad or tablet PC.
Bookmark
Dishwasher Cooking: Make Your Dinner While Cleaning The Plates : The Salt : NPR
www.npr.org/blogs/thesalt/2013/08/25/214799882/dishwasher-cooking-make-your-dinner-while-cleaning-the-plates, posted 2013 by peter in food hack howto
Dishwasher cooking is best for foods that need to be cooked at low temperatures, Casali says. "After some experiments, I found that it wasn't just a different way to cook — it was a really particular technique," she says. "Something I was looking for years: the way to cook at low temperature at home." § Unfortunately, Casali's book appears to be available only in Italian. But the innovative chef has put together a few how-to on Vimeo, with English subtitles, describing top recipes.
Bookmark
Malone Dot CC · LHBS #1: Intro
malone.cc/posts/lhbs_1.html, posted 2013 by peter in development hack humor
I'm bored. Let's build an entire programming environment around Brainfuck. [...] Why do any of this? Because it's fun, duh. Because re-inventing something is the best way to learn about that something. Also because I don't feel like making websites right now. Stay tuned for more updates.
Bookmark
cortesi - How mitmproxy works
corte.si/posts/code/mitmproxy/howitworks/index.html, posted 2013 by peter in communication development free hack networking reference security software
The text below is now part of the official documentation of mitmproxy. It's a detailed description of mitmproxy's interception process, and is more or less the overview document I wish I had when I first started the project. I proceed by example, starting with the simplest unencrypted explicit proxying, and working up to the most complicated interaction - transparent proxying of SSL-protected traffic1 in the presence of SNI.
Bookmark
Programmer Creates An AI To (Not Quite) Beat NES Games | TechCrunch
techcrunch.com/2013/04/14/nes-robot/, posted 2013 by peter in ai automation emulation game hack video
Programmer and CMU PhD Tom Murphy created a function to “beat” NES games by watching the score. When the computer did things that raised the score it would learn how to reproduce them again and again, resulting, ultimately, in what amounts to a Super Mario Brothers-playing robot. The program, called a “technique for automating NES games,” can take on nearly every NES game, but it doesn’t always win. [Pretty cool. Reminds me of when I hex-edited saved games in Snake in the 1980s to simulate playing the game "perfectly".]