Mention the use of key derivation functions like PBKDF2 to slow down hashing attempts.
For legitimate recovery, use reputable open-source tools like John the Ripper or Hashcat.
Many sites offering "hacker tools" or "cracked" ZIP recovery software bundle Trojans or spyware.