Meet Bjorn, the Easy to Build Hacking Tool!

Channel: The Cyber Mentor Format: YouTube tutorial / hardware build walkthrough Published: 2025-05-16 Sponsor: TCM Security Academy (the creator’s own paid course platform — featured at the midroll)

Summary

The Cyber Mentor walks through building Bjorn, an open-source automated network pentesting device that runs on a Raspberry Pi Zero 2W with an e-paper display HAT. Total parts cost ~$60–80 with no soldering required (if you buy the WH variant). Walks through hardware assembly, OS flash, install script, web UI, attack modules, and a live brute-force demo against the creator’s own intentionally-vulnerable home Raspberry Pi.

Why this source is in the wiki: it’s not an AI tool, but it’s directly relevant to anyone self-hosting AI infrastructure (local Ollama, Archon OS, Supabase, Open WebUI, home-lab GPU rigs). Bjorn shows you what an attacker on your LAN sees — and is therefore a defensive auditing tool for self-hosters who want to know whether their stack is exposed. See bjorn for the entity page with the defensive framing.

Key Points

  • ~$60–80 hardware: Pi Zero 2W (or WH for pre-soldered), 2.13” e-paper display HAT (V4 confirmed working), microSD card. WH variant means no soldering iron needed.
  • Plug-and-play assembly: line up the e-paper HAT connectors with the Pi headers and push. Done.
  • Raspberry Pi OS 64-bit flashed via Raspberry Pi Imager — set hostname bjorn, username bjorn, SSH via password or public key in advanced settings before flashing
  • Auto-install script from the Bjorn GitHub README — pick “full installation” + your e-paper version. Takes 10–15 minutes.
  • Web UI on port 8000 of the Pi’s IP for config + results
  • Five tabs in the web UI: Config (scan intervals, port ranges, nmap speed), Network (discovered IPs/hostnames/MACs/ports), Net KB (per-host attack log, the most useful view), Credentials (successful brute-force results), Manual mode (override the scheduler)
  • One-time Net KB init: Settings → “Create Live Status Actions and Net KB” before that tab works
  • Brute-force demo result: TCM’s own home Pi with default admin:admin SSH gets popped within minutes — pedagogical point about home network defaults
  • Hardware capabilities beyond demo: many more attack modules than shown; the Pi can run scans on configurable schedules indefinitely
  • Tamagotchi mode: the Viking mascot on the e-paper display “levels up” as the device picks up targets — gimmicky but charming

Sponsorship & Bias Notes

Sponsor: TCM Security Academy (the creator’s own paid courses, including the PIPA — Practical IoT Pentest Associate cert). Disclosed openly midroll. Not added to the wiki per sponsorship rule.

Product placement / affiliations: Amazon affiliate links in the description for the Pi + e-paper hardware. Standard YouTube monetization pattern. The hardware recommendations are sound (Pi Zero 2W is the right choice; the WH variant matters for no-solder builds).

Comparison bias: None observed. TCM does not compare Bjorn to commercial pentesting tools (Burp Suite, Metasploit, etc.) — this is a “build a fun cheap hardware tool” walkthrough, not a serious tooling comparison.

Editorial accuracy note: TCM corrects himself on screen — when he sees the “AI mode” toggle, he notes “I don’t actually think there is any AI involved in this,” which is accurate. The “AI” label in Bjorn’s UI just means automatic scheduling, not machine learning.

Notable Quotes

“Bridge the gap between classroom learning and real-world cybersecurity.” — TCM Security Academy midroll

Connected Pages

See Also