XDA Developers on MSN
3 tools I use that make ESP32 development and debugging so much easier
This is one of my most used development tools for ESP32 programming, and I highly recommend using it. Its debugging and ...
Creative-x-Lights's 2-Port ESP32 ETH0 WLED Controller is a WLED Ethernet board supporting 5V–24V LEDs via two terminal blocks ...
XDA Developers on MSN
You'd think this was a real Stream Deck, but this genius DIYer 3D printed it and made it smart home-ready
The Stream Deck utilizes an ESP32 and custom software to assign tasks such as app control, media management, and smart-home integration via Home Assistant and MQTT. While it doesn’t require a PC for ...
Some things are more fun when there are more folks involved, and enjoying time in the pool is one of those activities. Knowing this, [Bert Wagner] started thinking of ways to best coordinate pool ...
The ESP32 Marauder – Double Barrel 5G is a dual-chip hacking and penetration testing tool that supports both 2.4 GHz and 5 GHz Wi-Fi scanning, deauthentication, and can be used for penetration testing ...
Have you ever imagined building a drone so small it could rest comfortably in the palm of your hand, yet powerful enough to soar through the air with precision, all controlled from your smartphone?
Hi! On my project wsing ESP32 I am trying to connect to a MQTT server using SSL. For what I see I need to write the command "mqttClient.setSecure(true);" before setting up the MQTT connection but when ...
Pagers may have largely gone out of fashion in the age of the smartphone, but the T-LoRa Pager from LILYGO puts a modern spin on the class communications device. It’s a portable device with a 2.33 ...
Abstract: This paper presents a novel approach to home automation utilizing the MQTT protocol. The system is implemented using an ESP32 node and a Node-RED server running on a Raspberry Pi, allowing ...
A hot potato: The ESP32 chip, found in over a billion devices worldwide, contains undocumented vendor-specific commands that could potentially be misused to access device memory and manipulate ...
Update 3/9/25: After receiving concerns about the use of the term 'backdoor' to refer to these undocumented commands, we have updated our title and story. Our original story can be found here. The ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results