WHY Are These Hacking Tools Used