Awesome Features

The application has three big components: dashboards where data coming from the ECU can be displayed in various formats, a tuning section and data log file viewers.

  • Fully customizable dashboards

    Customize the dashboards with any indicators you want to see

  • Display GPS / Accelerometer data

    Android sensors on your device are used to display useful GPS geolocation data (including speed) as well as triple axis accelerometer data (including g-force)

  • Head-up display

    Display the app in your windshield to see it at a glance

  • Multiple data log files viewers

    Look at the data you just data logged on your phone or tablet using the build-in time series, maps or scatter plot log viewers

  • Real-time tuning

    Tune on the fly using supported real-time tuning hardware or edit a binary file to program a chip later

  • Responsive support

    We try to answer email from our customers as fast as we can, more often than not, we will answer within 24 hours

How It Works

The application uses ADX and XDF files which are files from TunerPro (Windows software). These files can be found on various sites such as TunerPro Web site itself, GearHead EFI forums as well as your cars enthusiasts forums related to your specific vehicle.

gaster pwndfu gaster pwndfu

Here is the easy steps that you can follow that will get you going

Steps

  • Find the ADX file for your vehicle. This is often the hardest part. Once your've found it, the rest is easy!

  • Install the ALDLdroid application from Google Play

  • Use the Import Data stream feature of the application to import your ADX file.

  • Connect the ALDL cable to your vehicle diagnostic port. Hit the Connect to ECU menu in the application and watch the data come in!

Hardware Supported

The application supports various hardware that can be wired or connected wirelessly to your Android device. Here is what is currently supported:

Data logging

Wired connection (USB) and wireless (Bluetooth) are both supported by the app. For Bluetooth, we suggest the Red Devil River adapters (or the 1320 electronics if you can find one used) and for USB, any FTDI (USB chip) based cable will do. :obd2allinone should have what you need.

Chip programming

It is possible to program chip for your ECU using the Moates BURN1 (discontinued), BURN2 as well as AutoProm.

Real-time tuning

For real-time tuning, the application currently support the Moates hardware as well. That is the Ostrich as well as the AutoProm.

NVRAM ECU

If you ECU is equipped with an NVRAM module for real-time tuning, that is also supported for some ECU. Mainly Australian ECUs at this point and more can be added as required.

gaster pwndfu

Application Screenshots

Some of the features described above can be seen on the screenshots below.

Customer Video

We love to see what our customers do with our application so here a video of Boosted & Built Garage and his pretty awesome setup.

Gaster — Pwndfu

In the context of USB-based devices (like smartphones, tablets, and game consoles), DFU mode is a special, low-level boot state. When a device is in DFU mode, its main operating system is not running; instead, it is waiting to receive new firmware directly over a USB connection. For security researchers and homebrew developers, gaining control during DFU mode is a golden opportunity. If you can exploit a vulnerability in the DFU process, you can install custom code before the main OS—and its security measures—ever loads.

The answer lies in the work of the developer (also known as #ktemkin). In 2018, Temkin and the team at ReSwitched discovered a critical, unpatchable hardware vulnerability in the Nvidia Tegra X1 chip—the same chip that powers the first-generation Nintendo Switch. This vulnerability, which became known as Fusée Gelée , allowed attackers to bypass all software security by sending a malformed USB packet during the Switch's early boot process.

The term "Pwndfu" was popularized by the iOS jailbreak community. Tools like checkm8 used a Pwndfu mode to exploit a bootrom vulnerability in certain Apple devices, allowing for permanent, unpatachable jailbreaks. The concept was so powerful that when similar low-level USB vulnerabilities were discovered on other hardware, the name "Pwndfu" stuck. Here is where the term takes a sharp turn into niche fandom. Gaster is a character from the video game Undertale (and its sequel-like chapter, Deltarune ), created by Toby Fox. In the game's lore, W.D. Gaster was the Royal Scientist before the character Alphys. He met a mysterious end by falling into his own creation—the CORE—and was "shattered across time and space." He is described as being "forgotten" and existing only in the game's code, inaccessible through normal gameplay. References to Gaster are hidden, requiring datamining or specific, glitchy interactions. gaster pwndfu

To exploit Fusée Gelée, an attacker needs to put the Switch into a special recovery mode (RCM) and then send a specific payload over USB. The tool they created to do this was named . However, the community quickly noticed something: the process of sending that USB exploit looked and behaved almost exactly like putting an iOS device into Pwndfu mode.

It is crucial to note that this exploit only works on (those manufactured before July 2018). Nintendo later fixed the vulnerability in hardware revisions (the "Mariko" units) and the Switch Lite. Therefore, "Gaster Pwndfu" is a relic of a specific, exploitable moment in gaming hardware history. Conclusion: More Than a Meme "Gaster Pwndfu" is a fascinating example of how technical communities develop their own layered language. It is not just a random mashup of words; it is a efficient piece of insider shorthand. "Gaster" evokes the hidden, broken, and foundational nature of the exploit. "Pwndfu" precisely describes the method of compromise at the firmware level. Together, they form a term that is both technically descriptive and culturally resonant for those who understand its dual origins. In the context of USB-based devices (like smartphones,

The name "Gaster" has become a shorthand in internet culture for anything that is hidden, broken, debug-related, or exists outside the normal boundaries of a system. It is the patron saint of unused content, memory glitches, and the raw, unfiltered code beneath the game's surface. So, why would a Nintendo Switch hacking tool combine a hardware exploitation term ("Pwndfu") with a reference to a mysterious Undertale character?

For the homebrew enthusiast, the name is a respectful nod to the developers who found a way to shatter the Switch's security "across time and space." For the Undertale fan, it is a reminder that even in the most locked-down commercial hardware, there are forgotten corners of code waiting to be discovered. And for everyone else, it stands as a colorful example of how the worlds of gaming, security research, and internet humor can collide to create something truly unique. If you can exploit a vulnerability in the

In the sprawling, often cryptic world of console homebrew, few phrases sound as simultaneously arcane and intriguing as "Gaster Pwndfu." To the uninitiated, it might evoke a dark spell from a fantasy novel or a lost piece of internet folklore. In reality, it is a very specific piece of technical jargon from the Nintendo Switch hacking scene. This essay aims to demystify the term by breaking it down into its two components—"Gaster" and "Pwndfu"—and explaining their combined role in the history of Switch modding. Part 1: The "Pwndfu" Lineage To understand "Gaster Pwndfu," we must first understand "Pwndfu." The term is a piece of hacker wordplay: "Pwn" (slang for "to own" or "to compromise") + "DFU" (Device Firmware Upgrade).

Contact Us

Subscribe to our email newsletter for useful tips and resources.