5 Tools Every Hacker Uses - But Why?