Don’t take it personally, it’s just a direction I haven’t seen many researchers/pen testers use. I’ve seen most run it on a virtual machine or a second computer and modify Ubuntu/Debian to better suit their needs and a primary computer/os for business transactions etc.
I can’t speak for hackers but from anecdotal evidence it seems like they can do their work on most systems but hacking hardware is just easier on Linux in general.