Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Suggestion for future hacking #4

Open
hansmbakker opened this issue Jun 14, 2020 · 2 comments
Open

Suggestion for future hacking #4

hansmbakker opened this issue Jun 14, 2020 · 2 comments

Comments

@hansmbakker
Copy link

Cool that you reverse engineered the protocol this way!

If you would be interested in seeing more of what the windows app does, and if the app you got with your engraver is based on .Net, you might try using ILSpy to decompile it.

@ewanm89
Copy link

ewanm89 commented Jul 4, 2022

The one I've looked at was all win32 API, and going via the protocol sniffing the comms seems to be much easier. I ran a serial port monitor and came to some of the same conclusions of how it is working. I then found this project that had the details more fleshed out.

Biggest issue is the ammount of chinese in the app I have it has a settings panel that is not translated for example.

@RBEGamer
Copy link
Owner

RBEGamer commented Jul 4, 2022

The software of mine was .Net and I made a Visual Studio project out of it. But the code was also Chinese and Google translate was not very useful. I figured out that the main window contains much more hidden buttons.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants