The rabbit hole of features and clever hacks in [chiprobot]’s NEMA17 3D Printed Linear Actuator is pretty deep. Not only can it lift 2kg+ of mass easily, it is mostly 3D printed, and uses commonplace hardware like a NEMA 17 stepper motor and a RAMPS board for motion control.
The main 3D printed leadscrew uses a plug-and-socket design so that the assembly can be extended easily to any length desired without needing to print the leadscrew as a single piece. The tip of the actuator even integrates a force sensor made from conductive foam, which changes resistance as it is compressed, allowing the actuator some degree of feedback. The force sensor is made from a 3M foam earplug which has been saturated with a conductive ink. [chiprobot] doesn’t go into many details about his specific method, but using conductive foam as a force sensor is a fairly well-known and effective hack. To top it all off, [chiprobot] added a web GUI served over WiFi with an ESP32. Watch the whole thing in action in the video embedded below.
[chiprobot] is no stranger to DIY linear actuators, you can see his gearmotor version and stepper version on Thingiverse. He’s certainly stepped it up in terms of power and size with this Hackaday Prize Entry.
One of the best feature of the ESP8266 is it’s ability to self-host a web server, allowing for fairly complicated user interactions. The dEEbugger by [S-March] is a nifty little ESP8266 based device with a plethora of features in a small package.
The USB-powered device has a web user interface that enables it to be used as a low bandwidth oscilloscope, I2C terminal, or UART terminal. As an scope, you may connect to it via your tablet and then use it as a remote voltage monitor. There is a peak detection feature which is a nice touch and gives the entire project a premium feel.
The serial terminal on an ESP8266 is not something new yet it is helpful in disconnecting the console window from the bench. The I2C terminal is where the device really shines as it can scan for connected devices on the connected bus. This bus pirate like feature is useful for beginners as the software can scan the registers addresses of the devices as well.
[S-March] has made the schematic in PDF format as well as the entire code for the project available on GitHub so go right ahead and make it your own. We have had an ESP8266 based VT Terminal device in the past and merging the two would make for an excellent maker tool.
I admit to being a tiny bit obsessed with monitoring utility bills and gathering data on my usage patterns blow-by-blow. The energy monitoring has reduced my electricity bills, so I wanted to have a go at the water usage. Granted a lot of the water bill is fixed supply costs and sewerage charges which I can’t do much about.
A while ago I made some pulse counting breakouts with the DS1682+ RTC. I have finally got a chance to put them to good use interfacing with my mechanical water meter. The water meter has a spinning permanent magnet and in principle this can trigger a reed switch and generate pulses for accumulation by the RTC.
It is powered by USB, it can also be powered by the router USB port.
It’s built on a pretty old ESP-01 board.
It has two led, one is the ESP-01 WiFi connection status embedded one, the other is connected to the GPIO2 port, and it’s used for the DNS update status.
In a move that would induce ire in Lord Helmet, [Kedar Nimbalkar] has hacked together a simple — yet effective — WiFi jammer that comes with a handful of features certain to frustrate whomever has provoked its wrath.
The jammer is an ESP8266 development board — running some additional custom code — accessed and controlled by a cell phone. From the interface, [Nimbalkar] is able to target a WiFi network and boot all the devices off the network by de-authenticating them. Another method is to flood the airspace with bogus SSIDs to make connecting to a valid network a drawn-out affair.
This kind of signal interruption is almost certainly illegal where you live. It does no permanent damage, but once again raises the existing deauth exploit and SSID loophole. [Nimbalkar]’s purpose in building this was for educational purposes and to highlight weaknesses in 802.11 WiFi protocols. The 802.11w standard should alleviate some of our fake deauth woes by using protected frames. Once the device authenticates on a network it will be able to detect fake deauth packets.
We featured a more targeted version of this hack that can be done using a PC — even targeting itself! And more recently there was a version that can target specific devices by jumping on the ACK.