If you’re looking for holiday gifts that will appeal to someone interested in cybersecurity or programming, the hunt can be a challenge. We’ve rounded up our picks for the top gift options, including books for study or entertainment, stocking stuffers, high-tech kits, and more for your loved one to enjoy.  Here are interesting, odd, and fun gift options for the hacker in your life throughout the 2022 holiday season. Must read:

The best cheap tech gifts for under $100The best cheap tech gifts under $75The best cheap tech gifts under $50The best cheap tech gifts under $25

The best hacker gift ideas for the holidays

Below are 12 hacker gift ideas I found for the holiday season this year. 

Other gifts for hackers to consider

Need more gift ideas?

Check out our ZDNET Recommends directory or Holiday Gifts hub for some more inspiration.  Perlroth, a cybersecurity reporter, explores the role of the U.S. in the digital arms race and includes tales of zero-day exploitation, hacker-for-hire mercenaries, and even how the country’s own specialists were duped into working against them. The Raspberry Pi is a single-board, Linux-based computer. There are general-purpose pins and components for learning everything from programming skills to creating home automation controls. When it comes to security, users could explore network scanning, ad blocking, container creation, and more. ExpressVPN remains at the top of our best VPNs list and for good reason. It supports a generous number of platforms, including Windows, Linux, iOS, and Android, has over 160 server locations in 94 countries, and does not collect connection or activity logs.  In fact, Mitnick is a convicted hacker who was once on the FBI’s Most Wanted list but has turned into an acclaimed security consultant and chief hacking officer of the security training company KnowBe4. He explores modern surveillance methods and how we can limit the impact on our privacy and security. At the time of writing, the cabled version is in stock. Powered by USB and suitable for Linux and Windows machines, the extender can be used to enhance your range when using network sniffing tools, such as those on Kali Linux. Monitor mode, a key feature for monitoring network traffic, is supported. This device is available together with AC Tactical, containing 2.4 & 5GHz support via a Wi-Fi adapter, a carry case, a keychain, and skins. You can also select add-ons including Kismet modules and extra antennas.   There are many entry-level courses (as well as free options) out there, but we recommend starting with CompTIA’s A+ or Network+. Network+, in particular, might not seem like the right choice on the surface, but today’s cybersecurity professionals must have a thorough understanding of networking fundamentals to understand defense.  However, not every gift has to have a hands-on educational purpose in mind, so we’ve also included interesting reads on the industry. This could include a computer network, old tech equipment, or a website’s backend control system.  Hacking, in itself, doesn’t automatically mean unauthorized entry. There are companies out there that ask for ethical hackers to test their software for weaknesses and will reward them financially for their findings. It is only when a hacker uses their skills for unauthorized and criminal purposes, theft, or destruction that it becomes illegal. This could include breaking into a network to deploy malware or stealing confidential information. Job roles include penetration testers who try to find weaknesses in software and networks; bug bounty hunters who privately disclose vulnerabilities to companies; consultants, network defense experts, and more. Also: The 6 best ethical hacking certifications: Hone your skills