On this page, I’ll give you my recommend products and tools for your work. You need the best tools, the best hardware and the best sources to learn new things.
I’ll update this page as often as possible to keep you updated with my latest recommendation.
Decrypt MD5 like a Pro: Increase your success rate, use the best tools, build your own database.
Fast GPU for brute force
What I love: With over 50000MH/s on HashCat, the GeForce RTX 2080 Ti is currently the best GPU for brute-forcing passwords. If you didn’t decrypt your hashes on MD5Online, you’ll probably get it very fast with this monster.
Alternative: As this beast is pretty expensive, you can use its little sister to make a decent job with Hashcat or any other tool. It’ll be much slower, but it’s good enough if you can’t put the money on the other model, just be a bit more patient.
Fast Hard Drive
What I Love: When you work with dictionaries and rainbow table, you need a fast hard drive. SSDs are exactly what you need. They are way faster than classic SATA drives, and are no longer so expensive. You can find cheap solution starting at $50 that will highly increase your Hashcat usage efficiency.
What I love: CPU is no longer the most effective way to crack passwords and MD5 hashes in general. The problem currently is that GPU are expensive and often hard to find. Cryptominers are buying any good enough GPU, and we have nothing left for other usages, would it be gaming or hash cracking.
Anyway, a great CPU can already give you good results for much less than an high-end GPU. Make sure to take a look at this offer if you want to get started on a budget. I give you a link to an i9 processor because they are my favorites, but obviously any other model or brand will work. Just make sure to think about the price/results rate before ordering yours.
What I love: The Raspberry Pi is the perfect tool for pen testing. Mr. Robot fan? Here is your new favorite device. You can install Kali Linux on it and enjoy all the included tools. This complete kit includes anything you need.
You can also use it to run scripts sending hashes to our API. It’s a cheap and stable device, perfect for that kind of work.
Alternative: If the latest model is too expensive for you, you can grab the Raspberry Pi Zero here, which is the cheapest model available currently. Less powerful but might be enough depending on how you want to use it. It’s even better for pen test as it’s half the size of the other one (a USB key basically)
HashCat is the fastest software to crack passwords. It’s available for any operating system, any platform (CPU or GPU), and most of all, it’s free!
I often use it to crack MD5 hashes guys are sending me. The success rate is pretty high if you have a decent GPU (see above). You can find a tutorial here on how to use it.
Nobody can see through the tunnel and get their hands on your internet data. NordVPN gives you peace of mind each time you use the Internet.
In our passion, we can’t be sure if the websites we use are safe or not. So, it’s always better to take some precaution. There is a promotion running on NordVPN, so it’s worth it for your security.
Kali Linux is a well-known penetration testing distribution. Its includes all the tool needed for your tasks: AirCrack-NG, Metasploit, Hydra, Nmap, …
In fact, you can even install it on Raspberry Pi (see above) and run all these tools on your credit card computer. It’s cheap and very efficient.
(check this tutorial on how to install it)
ProtonMail is an easy to use secure email service with built-in end-to-end encryption and state-of-the-art security features. Based in Switzerland.
Website Hacking & Penetration Testing
This course includes all necessary information to start your career in the Cybersecurity field. This course aims to teach you how to perform full penetration testing on web applications.
In this course you’ll learn everything you need to know about website hacking (SQL injection, PHP, exploits, etc.), the hacking tools that might be useful and the strategies to use. Check it now!
Windows Passwords and Account Hacking
This course focuses on Windows hacking and password hacking. If you are doing pen testing especially on computers, you might learn many things.
This course is for anyone in or pursuing a career in it. This course will give the tools to complete your IT tasks faster and easier. Check it here!
The Complete Cyber Security Course : Hackers Exposed!
This one take the opposite direction. You’ll become a cybersecurity specialist, by learning how to stop hackers and prevent hacking in general.
This course covers the fundamental building blocks of your required skill set – You will understand the threat and vulnerability landscape through threat modeling and risk assessments. All the details here.
Note: This post contains affiliate links. If you use them, I’ll get a small commission.
The commission comes at no additional cost to you.
I recommend these products because I use them myself and I know them.
This is simply a list of what I use and love