Building own VPN for personal use | Selfhosted Private VPN

Enhance your online privacy with a self-hosted OpenVPN or WireGuard VPN. Follow our guide for a secure & reliable setup, ditching public VPNs.

Selfhosted VPN

While commercial VPNs like Mullvad or ProtonVPN etc. offer convenient solutions, several compelling reasons exist to consider a self-hosted VPN. VPNs are primarily sought after for enhancing online privacy, bolstering security, and achieving a degree of anonymity. This guide will demonstrate how to set up and run your own self-hosted VPN solution in just a few simple steps, empowering you with greater control and flexibility over your online experience. 

Advantages of Selfhosted private VPN 

You will have full control unlike a public VPN where the servers and applications are owned and controlled by the VPN provider. This also eliminates the concerns of logging which most of them do. Another advantage is that you’ll get a dedicated IP assuming the server you pick has one. VPN providers often charge extra for a dedicated IP. In general, following are the advantages. 

  • Enhanced Privacy: Your data remains within your network, avoiding third-party servers and potential logging.
  • Greater Control: You dictate the server location, encryption protocols, and user access, offering complete control over your VPN setup.
  • Cost-Effective: After the initial setup, running your own VPN can be cheaper than commercial VPN subscriptions, especially for multiple users.
  • Customization: Tailor the VPN to your specific needs, including choosing the operating system and software that aligns with your preferences.
  • Security: Reduces reliance on external providers, minimizing potential vulnerabilities associated with third-party services.
  • Flexibility: Access your home network and devices securely from anywhere, bypassing geo-restrictions and censorship.
  • Data Ownership: Maintain complete control over your data, ensuring it's not stored or processed by external entities.

Prerequisites for Selfhosting VPN

  • A server with public IPv4, even better if it has IPv6 
  • Supported OS - Ubuntu, Debian, AlmaLinux, Rocky Linux, CentOS and Fedora
  • Basic Linux skills 
  • Wireguard/OpenVPN client app. 

VPN protocols used for Selfhosted VPN 


My recommendation is to use Wireguard protocol. WireGuard is a modern VPN protocol known for its high performance, strong security, and efficiency. It uses advanced cryptographic techniques to ensure secure communication, while its streamlined codebase and modern design contribute to faster speeds and lower resource usage compared to older protocols like OpenVPN and IPSec.


It is a widely used VPN protocol known for its flexibility and robust security features. It supports various encryption standards, making it adaptable to different security requirements. OpenVPN's open-source nature allows for extensive customization and compatibility across platforms. While it may not always match the performance of newer protocols like WireGuard, its long-standing reputation for security and reliability makes it a popular choice for many users and organizations seeking a trusted VPN solution.

Steps to setup private VPN under one minute 

Both the above VPN protocols have well documented installation and configuration steps in their respective sites but it may not be suitable for everyone hence we will use a simple script to set these up. Setting up will take less than a minute provided all prerequisites are met. 

Wireguard VPN tutorial

  • Connect to the server via SSH
  • From terminal, run the below command 

wget -O && bash

Wireguard VPN install
  • Complete the steps one by one. Select the IP. (In case the server has multiple Public IPs, pick one)
  • Select port (leave it default or type any custom port you want, make sure it is not in use and available) 
  • When it asks for a name, type something like myVPN
  • Select the DNS(leave it default if unsure)
Wireguard VPN Tutorial
  • After the above step, press any key to start installation. 
  • Script will automatically install Wireguard and show a QR code which you can scan using Wireguard client app on a device with camera. 
  • It will also generate a Wireguard configuration file at the /root directory with name myVPN.conf that can be imported to any Wireguard client app. 
  • If scanning the QR code is not an option, you can download the configuration file and import it. 
  • Once it is added, just click connect and that’ll be all. 

OpenVPN Tutorial

  • Connect to SSH as before and run the below script and follow the prompts. 

wget -O && bash

  • There will be steps to select IP and Protocol. If you are not sure of an option, follow the default or recommended options. 
  • After selecting Port, DNS, the script will generate an OpenVPN Configuration file at the /root directory with extension .ovpn
  • Copy or download the file and import to OpenVPN client. Enjoy! 

Adding/removing users, uninstalling VPN

Run the respective script again to add more users or remove it completely from the server. 


While it is so easy to run the script and create VPNs, you shouldn’t trust scripts available online and run them blindly on your server. Make sure they are trusted and from a reputed source. In this case, all the code is opensource and available on GitHub. Check WireGuard and OpenVPN. Also big thanks to Nyr who created and maintains this script. 



Ad Network,3,adb,1,adblocker,1,Adblocker alternative,1,Adobe Flash Zero Day,1,Adware,1,Android,2,Android Reverse Engineering,1,Android vulnerability,3,Anonymous,1,Anonymous Browsing,2,Apple Hacking,2,Arp Poisoning,1,authentication bypass,1,Automated Tank Guage,1,Automatic Footprinting tool,1,backdoor credentials,1,BadWinmail,1,Banking trojan,1,bcmon,1,Best Adblocker,1,Best free cloud storage,1,Best Password Manager,1,Best TOR Alternative,1,Best VPN Provider,1,best VPN Rating,1,Bettercap,1,Bettercap tutorial,1,BitTorrent,1,BitTorrent Protocols,1,Browse safely,1,Car Hacking,1,Carbanak,1,ChatGPT,1,CIA,1,Circuit Fingerprinting.,2,cleartext cloud API,1,CloudFlare,2,Cobalt Strike,1,Covert Pentesting,1,Cracking Encryption,1,Cracking HTTPS,1,crapware,1,Credential Stealing,1,Credentials Sniffing,1,CreeHack,1,CryptDB,1,cryptography,2,cSploit,1,CSRF,1,custom recovery,1,Cydia,1,cygwin,1,Cypher System,1,Data Breach,1,Data Exfiltration,1,DDoS,2,DDoS Attack,3,Decrypting Tor traffic,1,Deep Web,1,DEF CON 23,2,disk encryption,1,DLL Injection Attacks,1,Dnstool,1,download torrents directly,2,DrDoS,1,DriveDroid,1,DuckHunter HID,1,Elevation Of Privilege,1,encryption,2,Ettercap,1,Exitmap,1,Exploitation,2,Fanny Worm,1,Financial APT,1,Flash Alternative,1,Forgot Windows Password.,1,fraud,1,Free Cloud Storage,1,Free LastPass Premium,1,Free Uptobox Premium Account,1,Free VPN,1,Free Zbigz Premium Account,2,Freedom App,1,GasPot,1,GenAI,1,GitHub,1,Giveaways,4,Hack Android,3,Hack Android Games,2,Hack Android In-App Purchase Non Root,1,Hack Cave,18,Hack Clash Of Clans,1,Hack Email,1,Hack Outlook,1,Hack Subway Surfer,1,Hack WiFi Android Without bcmon,1,Hack Windows 10,1,hacking android,6,hacking android pattern lock,1,Hacking Android PIN,1,Hacking Android Through Sound Waves,1,Hacking Cloudflare,1,Hacking CryptDB,1,Hacking electronics,1,Hacking embedded systems,1,Hacking Fridge,1,Hacking Gmail,1,Hacking IoT,1,Hacking KeePass,1,Hacking News,3,Hacking PayPal,1,Hacking Refrigerator,1,Hacking Team,1,Hacking tools,3,Hacking Tricks Android,5,Hacking WiFi With Android,3,Hacking Windows,4,Hacking Windows Password,1,HardSploit,1,HID Attack,1,Homomorphic Encryption,1,Honeypot,1,HORNET,3,How to hack baby monitors,1,How to hack gmail?,1,How to hack IoTs,1,How to hack MAC OS X,1,How To Hack WhatsApp,1,how to install kali nethunter on any android device,1,How Tor Works,1,HTML5,1,ICS,1,Immobilizer,1,Increase Download Speed,1,Information Gathering,1,Install NetHunter,1,Install NetHunter for any Device,1,Internet Of Things,1,Internet Privacy,2,Introduction To Penetration Testing,1,iOS 9,2,iOS hacked,1,IoT,3,IoT Security Audit Tool,1,Jailbreaking,1,Kali Linux,2,kali linux nethunter for android,1,Kali NetHunter,4,Kali NetHunter Nexus 5x,1,Kali NetHunter Sony,1,kali nethunter windows installer,1,KeeFarce,1,Kemoge,1,LastPass Premium Giveaway,1,LastPass Premium Subscription 2016,1,lenavo,1,LinkedIn,1,Lizard Squad,1,Lizard Stressor,1,LLama3,1,LSE,1,Mabouia,1,Mac OS X Hacking,1,Malicious JavaScript,1,Malware,4,Man In The Middle Attack,4,MANA Wireless Toolkit,1,Megamos Crypto Transponder,1,MITM,5,Mount Manager Bug,1,Mozilla Firefox,1,MSOffice,1,Netflix,2,Netflix Stethoscope tool,1,NetHunter Devices,1,nethunter install guide,1,NetHunter Nexus 5x,1,NetHunter Tutorial Nexus 5x,1,nethunter tutorial pdf,1,Nord VPN,1,nsISpeculativeConnect,1,NTP Vulnerability,1,Offensive Security,1,Office Exploit,1,OLE,1,Onion Encryption,1,Onion Routing,1,OpenSource,2,Outlook Exploit,1,Overt,1,Penetration Testing,1,Penetration Testing Tutorial,1,Penetration Testing With KaliLinux,1,Penetration Testing With Metasploit,1,Pentest Report,1,Phases Of PenTesting,1,Phishing,1,PINlogger,1,Post Exploitation,1,PowerMemory,1,PowerShell,1,pre-fetch,1,Prevent In-App purchase hacks,1,Privacy,1,Private VPN,1,privilege escalation,2,Python,1,Quantum Cryptographic Communication,1,quantum physics,1,ransomware,2,read forbes with adblock,1,read toi with adblock,1,Reaver,1,Reflected File Download Vulnerability,1,Reflective,1,Reflective DDoS Attack,1,Remote Code Execution,2,Remote exploit,2,remove ads toi,1,RfA,1,RFD,1,RFID,1,RIFFLE Tor Alternative,1,RIPv1 Protocol,1,Root Nexus 5x,1,Rooting,2,Rootkit,1,Router Keygen,1,SCADA,1,SEA,1,Searchsploit,1,Security News,40,Security Tools,5,Selfhosted,2,Shodan,1,SilverPush,1,Sleepy Puppy,1,Smartphone Sensor hack,1,Smartphones,4,Smartphones hacking,1,soft and hard brick,1,speculative connect API,1,SpiderFoot,1,Sponsored,1,StageFright,2,StageFright 2.0,1,stethoscope tool implimentation,1,Stored XSS,2,StuxNet,1,Superfish,1,surveillance,1,Task hijacking Attack,1,TCP injection.,1,The Basics Of Penetration Testing,1,The Hacking Team,1,Threat Modeling,1,Tor,3,TOR Alternative,4,Tor Exit Relay,1,Tor Guard,1,Tor Hacked,3,torrent to direct converter,2,torrent to IDM,1,tow factor authentication,1,Trend Micro,1,Tutorial,10,TWRP,1,TWRP Nexus 5x,1,Types Of Pentest,1,Types Of XSS Vulnerability,1,uBlock,1,Unlock Bootloader guide,1,Unlock Bootloader Nexus 5x,1,unlock pattern lock android,2,User Focused security,1,VPN Reviews,1,Vulnerability,3,Vulnerability Analysis,1,Vulnerability scanners,1,What is Kali NetHunter,1,WhatsApp Encryption,1,WhatsApp Hacking,1,Whatsapp phishing,1,WhatsApp Vulnerability.,1,WikiLeaks,1,Windows Backdoor,1,Windows Debuggers,1,XcodeGhost,1,Xss,3,XSS Scanner,1,XTEA,1,Zbigz cookie generator,1,Zbigz premium account no survey,1,Zimperium,1,
Hack Cave | Hacks unveiled: Building own VPN for personal use | Selfhosted Private VPN
Building own VPN for personal use | Selfhosted Private VPN
Enhance your online privacy with a self-hosted OpenVPN or WireGuard VPN. Follow our guide for a secure & reliable setup, ditching public VPNs.
Hack Cave | Hacks unveiled
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share to a social network STEP 2: Click the link on your social network Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy Table of Content