Skip to content

Instantly share code, notes, and snippets.

ESP8266 fun, Hacking and Reverse Engineering

Jaz jazeee

ESP8266 fun, Hacking and Reverse Engineering
Block or report user

Report or block jazeee

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
jazeee /
Last active Jul 5, 2019 — forked from StephenBlackWasAlreadyTaken/
DexcomShare Endpoints for the Uploader App

  • these are the calls used by the dexcom uploader app
  • these are in no particular order!
  • User-Agent: Dexcom%20Share/ CFNetwork/672.0.2 Darwin/14.0.0


Read Dexcoms System time clock


jazeee / index.html
Created Mar 17, 2018
Memory Leak Example
View index.html
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "">
<html lang="en">
<button id="test">Click me!</button>
<button id="replace-button">Replace Click me!</button>
jazeee / client.html
Last active Mar 31, 2017 — forked from vitosamson/client.html
foscam streaming
View client.html
<canvas height="720" width="1280" id="canvas"></canvas>
<button id="snapshotBtn">snapshot</button>
var fragments = [];
var frames = [];
var ws = new WebSocket('ws://');
var canvas = document.getElementById('canvas');
var ctx = canvas.getContext('2d');
var reader = new FileReader();
jazeee / Simple Independent and Single Axis Zooming
Last active May 26, 2016 — forked from jgbos/
Simple Independent Axis Zooming and Panning for x, y, or xy
View Simple Independent and Single Axis Zooming
This is the title of the gist (It is first, since it starts with a space in the name)
You can’t perform that action at this time.