Why you can trust ZDNET : ZDNET independently tests and researches products to bring you our best recommendations and advice. When you buy through our links, we may earn a commission. Our process

'ZDNET Recommends': What exactly does it mean?

ZDNET's recommendations are based on many hours of testing, research, and comparison shopping. We gather data from the best available sources, including vendor and retailer listings as well as other relevant and independent reviews sites. And we pore over customer reviews to find out what matters to real people who already own and use the products and services we’re assessing.

When you click through from our site to a retailer and buy a product or service, we may earn affiliate commissions. This helps support our work, but does not affect what we cover or how, and it does not affect the price you pay. Neither ZDNET nor the author are compensated for these independent reviews. Indeed, we follow strict guidelines that ensure our editorial content is never influenced by advertisers.

ZDNET's editorial team writes on behalf of you, our reader. Our goal is to deliver the most accurate information and the most knowledgeable advice possible in order to help you make smarter buying decisions on tech gear and a wide array of products and services. Our editors thoroughly review and fact-check every article to ensure that our content meets the highest standards. If we have made an error or published misleading information, we will correct or clarify the article. If you see inaccuracies in our content, please report the mistake via this form.


Odd and interesting gift ideas for the hobbyist hacker in your life

From hobbyist hackers and programmers to professionals, they will love our picks for tech gifts for hackers.
Written by Charlie Osborne, Contributing Writer on
Reviewed by Amy Lieu

While hackers are often associated with criminal acts, it's important to remember the difference between white hat and black hat activities. These days, with cyberattacks increasing in scope and complexity, we need professional, ethical hackers to help protect the day-to-day services we all use. And we especially need to encourage younger people who are curious about this field.

If you're looking for gifts that will appeal to someone interested in cybersecurity or programming, the hunt can be a challenge. We've rounded up our picks for the top gift options, including books for study or entertainment, high-tech kits, courses, and novelty items for your loved one to enjoy. 

Here are interesting, odd, and fun gift options for the hacker in your life.

Must read:

The best hacker gift ideas

Below are the best hacker gift ideas we've found for 2023. 

  • Price: $350
  • Features: Receives and transmits from 1MHz to 6GHz

One of our top picks for hacker-related gifts is the HackRF One bundle. Available at Hacker Warehouse, this Software-Defined Radio kit can handle signals between 1MHz and 6GHz and is an excellent option for exploring radio frequency systems and communication protocols -- the backbone of modern-day devices. 

  • Price: $19

This Is How They Tell Me the World Ends by Nicole Perlroth should be on the bookshelves of anyone interested in cybersecurity. 

Perlroth, a cybersecurity reporter, explores the role of the US in the digital arms race and includes tales of zero-day exploitation, hacker-for-hire mercenaries, and even how the country's own specialists were duped into working against them.

  • Price: $280
  • Features: 1.5GHz quad-core CPU | 8GB RAM

While the range of potential cybersecurity career paths is vast and not every avenue requires a thorough knowledge of programming, a gift option you could consider focuses on teaching people how to code in a fun way. 

The Raspberry Pi is a single-board, Linux-based computer. There are general-purpose pins and components for learning everything from programming skills to creating home automation controls. When it comes to security, users could explore network scanning, ad blocking, container creation, and more.

The Raspberry Pi 4 8GB starter kit on Amazon comes with a Raspberry Pi device, case, fan, power switch, heat sinks, and more.

  • Price: $8.32 - $12.95
  • Tech specs: IP masking | Avoid geolocation blocks | Servers in 94 countries

VPNs, or virtual private networks, play an integral role in cyber activities. Just ask any hacker. So while your recipient may or may not be subscribed to a membership, it doesn't hurt to cover a couple of months -- or years -- for them as a gift. 

ExpressVPN remains at the top of our best VPNs list and for good reason. It supports a generous number of platforms, including Windows, Linux, iOS, and Android, has over 160 server locations in 94 countries, and does not collect connection or activity logs. 

  • Price: $14

Kevin Mitnick authors The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data, a classic book anyone interested in cybersecurity would appreciate. 

In fact, Mitnick is a convicted hacker who was once on the FBI's Most Wanted list but has become an acclaimed security consultant and chief hacking officer of the security training company KnowBe4. He explores modern surveillance methods and how we can limit the impact on our privacy and security.

  • Price: $44
  • Features: Monthly subscription

You could also check out HackerBoxes, a monthly subscription box full of interesting gadgets and tools for those interested in programming, DIY electronics, and hacking. Past boxes have included Capture the Flag projects, radio-over-internet kit, novelty items, and proximity detection gadgets. 

  • Price: $80
  • Features: Penetration software tools

An interesting gift for researchers and penetration testers, the Shark Jack is a portable tool for network reconnaissance and wired network auditing. The kit comes with both attack and arm switches. DuckyScript payloads can also be developed in bash and by using Linux tools. 

At the time of writing, the cabled version is in stock.

  • Price: $25

The Art of Attack: Attacker mindset for security professionals, authored by Maxie Reynolds, is an excellent read and would be a great gift to give. In order to defend against attacks, it helps to enter the mentality of an attacker and think like them. Offensive security professionals know this, and anyone interested in pen testing or defense can learn from experts already in the field. 

  • Price: $65
  • Features: Monitor mode | 2.4GHz 300Mbps/5GHz 867Mbps

The ALFA wireless extender is a useful accessory for those learning about wireless networks and could be a useful addition to any emerging hacker's arsenal. 

Powered by USB and suitable for Linux and Windows machines, the extender can be used to enhance your range when using network sniffing tools, such as those on Kali Linux. Monitor mode, a key feature for monitoring network traffic, is supported.

  • Price: $200
  • Features: A recon dashboard | automated pentests

The Wi-Fi Pineapple, Mark VII, is a piece of kit designed for wireless security assessments and auditing. Among its features is a dashboard for active and passive monitoring, a rogue access point facility for conducting Man-in-the-Middle (MiTM) attacks, and report generation.

This device is available together with AC Tactical, containing 2.4 & 5GHz support via a Wi-Fi adapter, a carry case, a keychain, and skins. You can also select add-ons, including Kismet modules and extra antennas.  

  • Price: $358

If you're looking for a gift for someone interested in cybersecurity as a career but who is not sure where to begin, signing them up for a qualification is a great place to start. 

There are many entry-level courses (as well as free options) out there, but we recommend starting with CompTIA's A+ or Network+. Network+, in particular, might not seem like the right choice on the surface, but today's cybersecurity professionals must have a thorough understanding of networking fundamentals to understand defense. 

Other gifts for hackers to consider

How did we choose these hacker gift ideas?

It can be a challenge to find specialist gifts -- whether the field you're interested in is cybersecurity or otherwise -- so we examined products that would appeal to the widest customer base available. Or, at the least, products that will keep the hackers in your life busy, learning, and out of mischief. 

However, not every gift has to have a hands-on educational purpose in mind, so we've also included interesting reads on the industry.

Is hacking illegal?

There is a misconception that all hacking is illegal. However, hacking is simply identifying weaknesses in services or a device -- whether it is a PC, smartphone, or another physical object -- and software, including apps, and attempting to exploit them.

This could include a computer network, old tech equipment, or a website's backend control system. 

Hacking, in itself, doesn't automatically mean unauthorized entry. There are companies out there that ask for ethical hackers to test their software for weaknesses and will reward them financially for their findings.

It is only when a hacker uses their skills for unauthorized and criminal purposes, theft, or destruction that it becomes illegal. This could include breaking into a network to deploy malware or stealing confidential information.

What types of ethical hackers are out there?

Ethical hackers are individuals who go into the cybersecurity field for 'white hat' purposes and to defend against cybercriminals. 

Job roles include penetration testers who try to find weaknesses in software and networks; bug bounty hunters who privately disclose vulnerabilities to companies; consultants, network defense experts, OSINT intelligence and investigation experts, and more. 

I want to learn about hacking but where do I start?

If you're interested in learning how to hack -- and stay within the realms of the law while you're doing so -- you can begin by checking out free resources including YouTube and Coursera. Alternatively, you can begin by earning a few certifications in the field.

Also: The 6 best ethical hacking certifications: Hone your skills

Editorial standards