Pi Zero W, Micro USB Cable, and USB Power Bank


To complete this project you will need a Raspberry Pi Zero W, a micro SD Card (I used a 32 GB Samsung EVO Select), a case, a micro USB cable (a sturdy one is preferable), and optionally a USB battery bank. You will also need a computer to configure the…

You can configure PiHole many ways, this guide focuses on privacy and performance.

Can you guess which is the PiHole?


PiHole is a popular DNS level ad block that can also protect against tracking and telemetry. It’s fairly light weight, so any Raspberry Pi with an Ethernet port will support it. I would not recommend a Pi…

Another Pi Zero W Hacking Gadget for Physical Penetration Testing

Why wouldn’t you want to plug a small computer into a bigger computer?


This project requires a Raspberry Pi Zero W, a USB-A Addon Board, and a Micro SD Card. You’ll also need a computer to configure the SD Card and Pi. …

Fun and adventure with the $10 Raspberry Pi

My “Go bag” with a Pi Zero, USB cable, and USB battery bank.

Why Are We Revisiting This?

The Raspberry Pi Zero is very flexible and can provide a lot of capabilities for the low end of the Raspberry Pi range. We’re going to look at adding more capabilities and what you actually get with them. …

Using Prometheus and Grafana to visualize your environment

Everyone loves dashboards

Why Would You Do This?

If you have a few Raspberry Pis doing this and that, having a centralized location to monitor them is a nice thing to have. I have a Pihole and Jellyfin, as well as a file server and a utility server that I…

Tor is under attack, and it affects all users

The Issue with Exit Relays

A significant portion of Tor exit relays have been observed performing malicious activities on traffic. This is primarily in the form of MITM proxy attacks. nusenu has written several articles about malicious exit relays on Tor, I highly recommend you follow him and read his work. His latest story contends…

A plug-in USB Ethernet gadget that routes all your traffic over Tor

Raspberry Pi Zero W with Zero Dongle

Why Would You Do This?

Because the Pi Zero W can be used as an Ethernet gadget, using Tor and iptables you can create a device that acts as a Tor modem. All traffic routing though the adaptor will route through the Tor network. This is a very convenient and fun way to use Tor…

Improving the tool, looking deeper into the exploit, and defending against it.

Back in black
This article is informational only.  Do not break the law.

Making the Tool Better

The thing I hated the most about the original password thief was how it looked. Compared to commercial products, it was amateurish and obviously nefarious. Jill Bryant said on Linux Weekly Daily Wednesday, “If you spray paint the clear acrylic…

Because cron and unattended-upgrades don’t work

WSL is a Great Tool for the Windows Development Environment

The Windows Subsystem for Linux lets developers run a GNU/Linux environment — including most command-line tools, utilities, and applications — directly on Windows, unmodified, without the overhead of a traditional virtual machine or dualboot setup.

I’m a big fan of WSL and Windows Terminal

I’m leaving the house more and I want to bring my music with me, without ads or tracking.

Jellyfin has provided me with a good replacement for music streaming services

Why do this?

I actually don’t use Spotify, I have used Apple Music for my streaming music needs. I was an iPhone user, jumped ship, but still subscribed to Apple Music because of all the…


Infrastructure architect. Security dev and researcher. Infosec nerd. Linux enthusiast. All opinions and views are my own. Polite, professional, prepared.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store