This audiobook will focus on some of the most dangerous hacker tools that are favourite of both, White Hat and Black Hat hackers. If you attempt to use any of the tools discussed in this audiobook on a network without being authorized and you disturb or damage any systems, that would be considered illegal black hat hacking. So, I would like to encourage all listeners to deploy any tool described in this audiobook for White Hat use only.