Skip to content

Instantly share code, notes, and snippets.

View RandomInsano's full-sized avatar

Edwin Amsler RandomInsano

  • AWS Thinkbox
  • Winnipeg, Canada
View GitHub Profile
@RandomInsano
RandomInsano / Logitech MX 5000.md
Created February 16, 2025 16:47
Hacking a Logitech MX 5000 keyboard via Bluetooth HID

What follows is independent research as a fun thing to do on a Saturday night for $8. There’s a ready to use library here: https://github.com/jwrdegoede/mx5000tools The NEWS file is nearly 20 years old!!! 2006! 😃

Wireshark will pick up on more information if the keyboard is powered on cold while it's running. The keyboard's features all operate over HID commands which is great! The special features operate using DATA (0xa) and mostly 0x10 for their "Protocol Code". Setting the user name display is protocol code 0x11. Multi-media keys are also over protocol code 0x10 which I assume lets the Key Point software intercept them and re-map them to the commands the user sets

Protocol codes:

  • 0x01: Keyboard
@RandomInsano
RandomInsano / How To Work with X-Carl.md
Last active March 20, 2022 19:03
Drafts for how to use X-Carl at SkullSpace

Getting started with X-Carl:

WARNING: This is no replacement for getting proper training. It acts as a reminder for those who already have experience with the machine. Also, Carl should be operated as a team and not left unattended while powered on.

  1. When you're done for the day, push the emergency stop (e-stop). This prevents damage to the drive transistors
  2. To power on, twist the e-stop

Using Universal Gcode Sender (UGS)

@RandomInsano
RandomInsano / Thunderbeast
Created October 2, 2021 23:49
Documenting random hacks to my cryptominer
GPU temp at full load: 74
With front door open: 69
With external fan: 63
Tweaks:
* Moved drive trays to create an air channel to GPU from front fans
* Flipped PSU 180 to pull air from inside case (had been painfully hot to the touch)
* Added a simple air baffle on the bottom to increase air pressure
After first tweaks: 70?
@RandomInsano
RandomInsano / kobo-n905.md
Last active March 17, 2019 19:41
How I've customized my Kobo Touch

The Kobo Touch

Personal configuration:

# tail /etc/init.d/rcS
/bin/busybox insmod /drivers/ntx508/usb/gadget/arcotg_udc.ko
/bin/busybox insmod /drivers/ntx508/usb/gadget/g_ether.ko
ifconfig usb0 169.254.1.100
@RandomInsano
RandomInsano / kobo-n416.md
Last active December 29, 2022 22:56
Hacking notes on the very first Kobo (that I bought for $10)
@RandomInsano
RandomInsano / breaduino.md
Last active February 10, 2019 20:42
Hacking a breadmaker to accept G-code

Breaduino - Hacking Breadmakers from the 2000s

Notice: This project is incredibly dumb both due to the fact that there are high voltages at play, but also because it has the potential to burn your house down and everyone in it. Treat this as a curiosity and don't try to replicate it.

Background

The original plan for this project was to make a system to mix waste 3D printer filament that I could pour into moulds. I don't believe now that either maker is safe up to 200°C let alone the 250°C required for ABS as bread does not require that sort of heat. I purchased two bread makers from Value Village (aka Savers) for under $16 CAD total. One is branded as CounterCraft and the other is a Black and Decker model that was popular around the turn of the millenium.

All that said, having a temperature controlled mixer can have many uses. Including baking bread!

@RandomInsano
RandomInsano / xr11.md
Last active December 30, 2018 18:58
Hackin’ notes on the Xfinity XR11
@RandomInsano
RandomInsano / 0000-new-comms.md
Last active March 10, 2022 21:27
A new way to communicate via SPI/I2C/1wire
  • Feature Name: new_peripheral_communication
  • Start Date: 2018-10-14
  • RFC PR: (leave this empty)
  • Rust Issue: (leave this empty)

Summary

Here we propose a new interface which allows thread-safe sharing of a single I2C or SPI bus by moving ownership and control of this bus from device driver to a bus master. This includes device selection (address or enable line) and bus frequency. This keeps driver implementation simple, removing the need to select/deselect devices in the driver code.

@RandomInsano
RandomInsano / ntc-chp-files.md
Last active June 16, 2018 23:31
Trying to reverse engineer NTC's CHIP image files

The first 4MB of the file is a mystery, but the UBIFS seems to be stored uncompressed in the file and the UBIFS system is also uncompressed. You can find config files and others in the dump

UBIFS header starts with hex 31 18 10 06. I found this at offset 0x6593A, but I'm having trouble because the chip doesn't come with the nandsim kernel module.

I'm trying to follow these tutorials to mount and extract the root file system:

The partitions for UBIFS on the CHIP are the following: