For a while now, I’ve been asked by friends what I use often. There are a variety of devices that hackers can purchase to help them carry out activities. These devices can range from basic tools that help with information gathering and analysis, to more advanced tools that can be used for remote attacks and exploitation.
Raspberry Pi – Model B 2019 Quad Core 64 Bit WiFi Bluetooth (4GB) (Amazon)
The Raspberry Pi is a credit-card sized computer that can be used for a wide range of hacking activities. It can be used to create a portable hacking platform that can be used to carry out attacks from anywhere. It can also be used to create custom hacking tools and scripts, and can be used as a low-cost platform for running more advanced tools like Metasploit and Nmap. There are some great Raspberry Pi set up videos, check out Null Byte on Youtube!

Razer BlackShark V2 Pro Wireless Gaming Headset 2023 Edition (Amazon)
During a CTF event, communication is key, and the HyperClear Super Wideband Mic of the BlackShark V2 Pro can help you and your team communicate more effectively. With crystal-clear voice communication, you can coordinate our efforts more efficiently and respond quickly to any challenges or changes in the game. Finally, the long battery life of the BlackShark V2 Pro has up to 70 hours of battery life, making for less charging time. (It also is nice for gaming too!)

Razer Orochi V2 Mobile Wireless Gaming Mouse (Amazon)
To follow up with the headset, a nice mouse is needed to support your ethical hacking activities. Probably not on the top of your list but long nights require a speedy mouse (18K DPI). This one is also ultra lightweight and has two wireless modes. Up to 950hrs Battery Life (means hardly any charging!).

BUFFALO External SSD 1TB (Amazon)
As an ethical hacker, a rugged USB stick is a necessary tool. It needs to be able to withstand a few drops and be quick. Pentesters need to be able to quickly transfer test data and penetration test reports frequently.

Yubico Security Key (Amazon)
OK OK, I know this isn’t related to hacking persay, but I felt the need to call out using Yubi key for everything, including your hacktop (hacking laptop). The Yubico Security Key is an essential tool for ethical hackers who need to protect their online accounts and data from unauthorized access. The YubiKey provides dual verification and supports multiple authentication protocols, making it difficult for attackers to gain access to a hacker’s accounts. It is also heavy duty, shock-resistant, and waterproof, ensuring that it can withstand harsh environments and keep your data safe.

Apple 2023 MacBook Pro Laptop M2 Pro chip with 12‑core CPU and 19‑core GPU (Amazon)
Both MacOS and LinuxOS are optimal choices for hackers. MacOS is really unix under the hood and can do almost anything a Linux can, so why not look sexy when doing it? M2 Pro chips include security features such as secure boot, encrypted storage, and dedicated security processors. The 2023 laptop really amped up the battery life to 24 hours.

Related Links
