Curated Cybersecurity Essentials

My Trusted Tools and Resources for Hacking and Security

Every hacker and security enthusiast needs the right set of tools. Here’s my curated list of recommended products and resources that are a must-have in your cybersecurity arsenal.

Try Kali Linux: Your new operating system

Kali Linux, a leading Debian-based distribution, is designed for digital forensics and penetration testing. It’s an essential tool for anyone serious about cybersecurity.

Secure Your Online Presence with Proton

Proton VPN & Email services ensures your internet privacy, masking your IP and safeguarding your data from advertisers. Experience unrestricted and secure internet access.

Hashcat: The Ultimate Password Cracker

Hashcat is the tool of choice for password cracking, used by professionals for penetration testing and system security. Explore its powerful capabilities.

how do hackers get hashed passwords

Website Hacking & Penetration Testing

This course includes all necessary information to start your career in the Cybersecurity field. This course aims to teach you how to perform full penetration testing on web applications.

Classes,Virtual Labs & Community

Accelerate Your Career in Cyber Security – Gain the skills businesses are looking for with the industry’s most comprehensive training library.

The Complete Cyber Security Course

Be the good guy: with this course, you’ll become a cybersecurity specialist, by learning how to stop hackers and prevent hacking in general.

install kali linux raspberry pi

A Raspberry Pi for Your Experiments

A Raspberry Pi is the perfect tool for pen testing, or simply to experiment with Kali Linux without reinstalling your main computer.

Here is a kit you can get on Amazon with everything you need. I have plenty of them at home, running various servers and scripts for me.

I have another website that is all about Raspberry Pi: RaspberryTips. If you want to learn more about this device, you’ll love this site.

Upgrade your Computer for Faster Results

If you can afford it, I recommend getting a recent Nvidia GPU for your computer. It will speed up you hacking passwords with Hashcat or similar tools.

A high-end CPU and a fast storage drive are also recommended, while no longer the primary driver of fast results when you have a top tiers GPU.

There are links to products I use and recommend, but feel free to compare them with the latest releases available, as things change quite quickly in this space.

Exploit the Power of Virtual Machines

I use virtual machines when testing for most of the tutorials written on the website.

If you are working in a company or as a security consultant, you can keep your laptop with the tools provided by your IT departement, but run some virtual machines with Kali Linux or whatever your like in the background.

I generally use Hyper-V as my laptop runs on Windows, but you can try VMWare and VirtualBox applications.

Note: This post contains affiliate links. If you use them, I’ll get a small commission.
The commission comes at no additional cost to you.

I recommend these products because I use them myself and I know them.
This is simply a list of what I use and love