Deep Tech: Trail Camera Firmware Hacking 6 — 3rd Party Reverse Engineering Tools
3rd Party tools and their usage in reverse engineering trail camera firmware. Part of series.
Continue reading →3rd Party tools and their usage in reverse engineering trail camera firmware. Part of series.
Continue reading →What happens between the time that a trail camera “triggers”, takes its first image, and goes back to sleep? Part 5 in a series of on trail camera hacking.
Continue reading →The business considerations which prevent most trail camera manufacturers from offering customized firmware. Part 3 of series on reverse engineering Browning trail cameras
Continue reading →This post will focus on the requirements on tools and a tool flow for reverse engineering and hacking trail camera firmware. It is the second part of a multi-part series.
Continue reading →New features for recent generations of Browning Recon Force and Spec Ops trail cameras via loadable (non-factory) firmware
Continue reading →A wildfire is about the worst case scenario for camera trappers. In many parts of the US, fires are a real risk to camera sets. This was certainly the case in Oregon. In the summer of 2020, several major fires … Continue reading →
The Browning Elite HP5 series trail cameras have a rich set of features. But, like all computer firmware, it’s not perfect. Based on some Facebook feedback, and our own experience, I identified several small additions of interest to the camera … Continue reading →
Steps for converting a trail camera with an IR flash to a white flash for color night time photos and videos
Continue reading →