It doesn't make it easier to "hack" servers, it's just a list of things that you could use once you're already inside.
It's a pretty niche circumstance. Unless an admin allows users on a server to execute some of these random types of binaries as root, it's not going to be a concern. And, if it wasn't already obvious, distros are almost never configured this way OOTB
I wouldn't say this is the most useful h4x0r tool ever, but I wouldn't say it's particularly niche, either. This kinda stuff is definitely relevant in older large enterprise-type Linux/Unix environments.
But you can't "hack a server" using just these techniques: they would be a (small) part of a chain of exploits.