Hey, I've wrote this script just for people like you. I understand that you want to hack. Thing is, there is no one click hack tool/script. So, if you want to keep learning, continue. Hacking takes time, curiousity, thinking, and seriousness. Now, continue. Hacking consists of several things.
Exploits are what make hackers go. XSS - Exploits It's what deanonymizes tor users. It's what helps hackers go farther. It's what hacking is for the most part. Not all exploits are breaking code. Some links for exploits are...
Kali Linux is an OffSec OS. OffSec, Offensive Security, Hacking. Kali offers tons of tools, such as metasploit. Kali can operate as a functional main-os but it's better to not keep it as a main os. It's very unstable, and is a pain to use sometimes. Also, do not add Kali repositories to any other operating system. It will break your other OS. But. Kali Linux is a good operating system for a virtual machine. It's good for hacking. It has tools for...
Custom scripts/tools are what make you go from skid, no decent hacker. I personally write scripts to encrypt files, and for information gathering and doxing. A custom script can be the difference from a script that almost-just almost works and actually does work because you coded it to fit your needs. Kali might not have everything you need. But, when you can code, you do.
The big thing. Crypto. Encryption. Ciphers. First off in crypto. You need a vpn. A vpn will hide what you are doing from other hackers, your ISP, and the gov't. The gov't, obviously, doesn't like hackers. They will arrest you if you are caught doing things you shouldn't and you will be put away doing hard time for a long time. You need a vpn that does not log. Logging can include:
Some other things to keep in mind is good opsec, never admit to anything, don't act cocky.
BE SURE TO VISIT CRYPTO'S PAGE