Flashing Android on the MK809III: A Story of Fake Bricks
Recovering an RK3188 Android stick from a corrupted bootloader using Mask ROM mode, rkflashtool, and Rockchip's upgrade_tool
> cat article.md
██████╗ ███████╗ ██╗ ██╗███╗ ██╗ ██████╗ ████████╗███████╗███████╗
██╔══██╗██╔════╝██╗ ██╔╝██╔╝████╗ ██║██╔═══██╗╚══██╔══╝██╔════╝██╔════╝
██████╔╝█████╗ ╚═╝ ██╔╝██╔╝ ██╔██╗ ██║██║ ██║ ██║ █████╗ ███████╗
██╔══██╗██╔══╝ ██╗ ██╔╝██╔╝ ██║╚██╗██║██║ ██║ ██║ ██╔══╝ ╚════██║
██║ ██║███████╗╚═╝ ██╔╝██╔╝ ██║ ╚████║╚██████╔╝ ██║ ███████╗███████║
╚═╝ ╚═╝╚══════╝ ╚═╝ ╚═╝ ╚═╝ ╚═══╝ ╚═════╝ ╚═╝ ╚══════╝╚══════╝
Notes from (reverse) engineering
Recovering an RK3188 Android stick from a corrupted bootloader using Mask ROM mode, rkflashtool, and Rockchip's upgrade_tool
> cat article.mdA deep dive into reverse engineering a Chinese IoT camera, bypassing cloud dependencies, and building a local streaming solution with multi-camera support
> cat article.mdA beginner-friendly introduction to reverse engineering I prepared for my company's offsite learning lab
> cat article.mdHow I built a low-cost, energy self-sufficient IoT device to educate people about phishing attacks using captive portals, reverse engineering, and solar power
> cat article.mdModifying the firmware of a budget Smart TV to run SS-IPTV
> cat article.mdGetting root shell access on the Sagemcom F@ST 5302 router via UART
> cat article.md