uses_
the hardware, software, and tools i actually use. updated when things change.
hardware
MacBook Air 13" M2
Mobile machine. The battery life and weight alone make it worth it. Still wicked fast, if a few years old.
Alienware m15 R3
An old gal but still a decent workhorse. Mostly OSINT work, testing and VMs.
Custom Desktop lab
Dual-boot Kali / Windows. Dedicated to heavier lab work, malware analysis, and anything I don't want near my main drive.
Raspberry Pi 4
Running Pi-hole for network-level ad/tracker blocking. Also doubles as a honeypot when I'm feeling experimental.
YubiKey 5C NFC
Hardware 2FA everywhere it's supported. If you work in security and don't use one of these, no judgment, but also — why not.
operating system & terminal
Kali Linux
For anything offensive. The tooling is pre-loaded and the community is enormous. Yes, you can use other distros. This one's just faster to get going.
macOS +Asahi
Daily driver terminal. Split panes, profiles per context (work / lab / personal). tmux on top for persistence.
Zsh + Oh My Zsh
The git plugin alone pays for the setup time. Powerlevel10k for the prompt because I like knowing my context at a glance.
Neovim daily
I refused to learn it for too long. Now I can't go back. LazyVim config if you're starting out and don't want to configure from scratch.
security tools
Burp Suite Pro daily
The web app testing standard. The community edition works fine for learning; Pro is worth it once you're doing this professionally.
Nmap + Masscan
Nmap for thorough scanning with script engine. Masscan when I need to go fast across large ranges. Usually used together.
Metasploit
Framework for exploitation and post-exploitation. More useful as a learning tool than people give it credit for.
Wireshark + tcpdump
Wireshark for interactive traffic analysis, tcpdump for quick captures over SSH. Both live permanently in my toolkit.
Obsidian notes
All my research, CTF notes, and methodology docs live here. Local-first, markdown-based, and searchable. No subscription needed.
recon & osint
Amass + subfinder
Subdomain enumeration. Run both and compare results — they hit different data sources and the overlap is rarely complete.
Shodan
For passive external recon on infrastructure. The membership is cheap and the dorks are genuinely useful.
theHarvester
Email, domain, and employee enumeration from public sources. Fast starting point before going deeper on a target.
dev & scripting
Python 3 primary
Everything lives here. Automation, tooling, quick scripts, PoC exploits. The security ecosystem is massive.
Bash
For anything that's just gluing commands together. If it's more than 50 lines, I switch to Python.
VS Code
When Neovim isn't the right tool — larger projects, pair programming, or anything with a debugger I actually want to click through.
Docker
For isolated lab environments, running tools without polluting the host, and spinning up vulnerable apps to practice on.
learning & reference
HackTheBox
Primary practice platform. The Pro Labs are the closest thing to a real engagement environment I've found.
TryHackMe
Better for structured learning paths and beginners. I still use it for specific topic refreshers.
PortSwigger Web Academy
The best free web security training that exists. Period. The labs are hands-on and the content is accurate and deep.