REMY HAX

🐀

Recent Posts

0-Click Wiretapping Bluetooth Headphones

Jan 9, 2026 ¡ 4 mins read

Every few months there’s some sensational news reporting that some high profile individual doesn’t use bluetooth wireless headphones and everyone goes “Wait, what?”. From Taylor Swift’s public appearances featuring exclusive use of wired headphones to former Vice President Kamala Harris on The Late Show with Stephen Colbert stating:

Fixing the Lilygo T Watch S3 Plus LCD

Aug 26, 2025 ¡ 2 mins read

My LILYGO T-Watch S3 Plus (with GPS) arrived with a non-functional LCD. Here’s how I fixed it. First, power off the device using the yellow switch in the back. Then using a PH00 Phillips head screwdriver…

QR Codes You Shouldn't Scan

Aug 6, 2025 ¡ 8 mins read

Number 3 may surprise you! I’m kidding of course, blatant web-based phishing attacks are boring. This blog isn’t about those. Most of these examples will probably surprise you in some way. This blog is about the spiraling mess of URI handlers, auth flows, proof-of-presence, and the complete lack of fuzzed code coverage of the ecosystem as a whole.

Exploiting Erlang OTP With Zip Files: CVE-2025-4748

Jun 17, 2025 ¡ EXTERNAL LINK

There’s a new Erlang OTP vulnerability, CVE-2025-4748. It’s an Absolute Path Traversal vulnerability involving a Zip archive, which I have a lot of practice with. It affects Erlang OTP, which a coworker has already written about recently and noted the necessary steps to set up an environment.

Ghidra Is Best: Android Reverse Engineering

Jun 12, 2025 ¡ 6 mins read

Ghidra is the best Android app RE tool. It just seems like it’s not, because the loader has easily fixed quirks. Let me demonstrate.

AyySSHush: Tradecraft of an Emergent ASUS Botnet

May 28, 2025 ¡ EXTERNAL LINK

Using an AI powered network traffic analysis tool we built called SIFT, GreyNoise has caught multiple anomalous network payloads with zero-effort that are attempting to disable TrendMicro security features in ASUS routers, then exploit vulnerabilities and novel tradecraft in ASUS AiProtection features on those routers.

You Want a VPN for Your Phone, Because Apps.

May 16, 2025 ¡ 7 mins read

VPN: phone, not desktop. WiFi: N/A. These statements are correct. Or at least as correct as is applicable to the general user in the scope of the following contextual blog which generally recommends that:

Graph Theory for Reverse Engineers

May 15, 2025 ¡ 8 mins read

Or “everything actually is a nail, you just need a bigger hammer” Graph Theory is a really neat subject matter relating to the modeling of pairwise relations between objects. When you understand graph theory, everything steadily becomes a graph theory problem, because pretty much anything can be.

Step One: How2 Z3

Apr 4, 2025 ¡ 8 mins read

This article is a long time coming. z3, the constraint solver, is commonly used in crackmes and CTF challenges. Wherever possible, I just lift to angr for symbolic execution and bruteforce that way, since z3 is basically math bruteforce anyways. Regardless:

Talk: Bluetooth Low Energy Unmasked: High-Impact Insights From Scalable Device Hunting

Mar 27, 2025 ¡ 1 min read

Remy shares his experience building custom hardware for a scalable Bluetooth Low Energy (BLE) survey, discussing problems encountered, and providing a replicable solution that the audience can implement for approximately $100 (no soldering required).

See all posts →