Six months of design iterations, sourcing headaches, and a broken oscilloscope later — I am pleased to share a hardware module I designed to extend the Flipper ecosystem for RF security research. This write-up covers the motivation, engineering challenges, capabilities, and responsible-disclosure principles behind the project — and a frank look at a vulnerability that is very much alive in the Maldives today. Left: 3D render of final PCB · Right: Altium Designer PCB layout view Why I Built It The trigger was reading the original MouseJack disclosure by Bastille Networks. It made me realize that a class of peripherals most people assume to be harmless — the cheap wireless mouse on your desk — can be weaponized from a car park. I wanted a research platform small enough to carry in a jacket pocket, native to the Flipper Zero ecosystem, and capable of passive scanning, protocol analysis, and controlled lab tests. What I...
First of all what is ngrok?
ngrok exposes local servers behind NATs and firewalls to the public internet over secure tunnels. This can be used by developers who want to run webhooks with https if you dont have a local ssl certificate. For example telegram, Facebook etc use webhook but they only allow ssl.
If you want to know more about the ngrok, <---- please click this link for more information.
The script
after setup the ngrok in the local machine you can run the ngrok command to start the tunnel. in my case i run the ngrok as a service which i have explained in my previous post.
After the service is running you can run the python script or your preferred to fetch the public_url from ngrok which can be use to automate the process. For example Telegram Bot with webhook enable only communicates with https urls so from this method you can get the randomly generated https url to use in such scenarios.
In case if you have a doubt about usage of ngrok and automation please give comment and don't forget to subscribe.
ngrok exposes local servers behind NATs and firewalls to the public internet over secure tunnels. This can be used by developers who want to run webhooks with https if you dont have a local ssl certificate. For example telegram, Facebook etc use webhook but they only allow ssl.
If you want to know more about the ngrok, <---- please click this link for more information.
The script
after setup the ngrok in the local machine you can run the ngrok command to start the tunnel. in my case i run the ngrok as a service which i have explained in my previous post.
After the service is running you can run the python script or your preferred to fetch the public_url from ngrok which can be use to automate the process. For example Telegram Bot with webhook enable only communicates with https urls so from this method you can get the randomly generated https url to use in such scenarios.
In case if you have a doubt about usage of ngrok and automation please give comment and don't forget to subscribe.
Comments