A Tour of Open MongoDB Instances

Earlier last month, a security researcher called Victor Gevers sent out a tweet stating that he had stumbled upon a number of open MongoDB databases hosting what was apparantly logged chats from a number of Chinese applications such as Weixin (WeChat) and QQ:

Around 364 million online profiles and their …

Read more

An Exploration of Cellular Automata and Graph Based Game Systems: Part 3
Moving to Graphs

Read more

An Exploration of Cellular Automata and Graph Based Game Systems: Part 2
Grid Based Fluid Systems

Read more

Note to Self: Fast Android Screen Capture

Getting a reliable, real-time screen of an Android device is more challenging than one might think, e.g. for the purpose of training a reinforcement learning agent.

This post describes a basic approach:

adb shell screencap -p

Sadly, adb mangles binary output and has a tendency to convert \n to …

Read more

Bypassing Android Cert Pinning Using a Rooted Emulator (AVD)

A while ago I was interested in performing some HTTPS MITM analysis on an Android app, without having to rely on a real device but instead using an Android Virtual Device, or in other words: an emulated device. It turns out that this is surprisingly tricky with a lot of …

Read more

Note to Self: Using Tesseract to Extract Subtitles

Say you have video such as this one on Facebook. Most of these come with hardcoded subtitles, which we’d like to extract (for whatever reason).

Opening the page in Chrome and inspecting the network requests quickly uncovers the media URL:

https://video-bru2-1.xx.fbcdn.net/v/t42.9040-2/10000000_703970666457205_4416008794480312320_n …

Read more

« Prev Page 2 of 12 Next »