# Introduction

![](https://894632015-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MiRT0QHotSpofwDFs_w%2Fuploads%2FUWh0q3d1qIgQj4dMpgyj%2Frounded%20social%20preview_v2.png?alt=media\&token=31f1a399-6e23-48a8-b902-463325f3ef25)

{% hint style="danger" %}
**This project is part of** [**The Hacker Recipes**](https://www.thehacker.recipes) **and is a work in progress**. I started it in 2021 and have absolutely no idea when this could be finished (will it ever be?).

The Hacker Tools is focused on documenting and giving tips & tricks on common infosec tools

The 🛠️ emoji is used where work has to be done.
{% endhint %}

This project is aimed at providing technical guides on various hacking tools.

Keep in mind that these guides are maintained by non-omniscient security enthusiasts in their spare time. You will probably find things missing or mistakes.

:mega: Please feel free to contribute, give feedback/suggestions or reach out to me on Twitter ([@\_nwodtuhs](https://twitter.com/_nwodtuhs)), Discord (Shutdown#2539), IRL or whatever you feel appropriate.

{% hint style="success" %}
Almost every tool mentioned in theses notes is installed, and sometimes pre-configured, in [Exegol](https://github.com/ShutdownRepo/Exegol), another project of mine of a docker environment ready to hack on day-to-day engagements. It's not much but I use it on all my engagements. Feel free to use it, to contribute, to give feedback etc.
{% endhint %}
