Skip to content
  • About
  • About Me
  • Blogs
  • Home
  • My Journey
  • Privacy Policy
YouTube
Krish
Growing Hacker
  • Home
  • Blogs
  • About
  • My Journey
  • Privacy Policy
YouTube
Krish
Growing Hacker
LinuxTutorial

Learn Now : Filtering Content in Linux with Awk and Sed

Master advanced filtering content in Linux! Part 3 of our hacker series dives deep into the powerful awk and sed commands to manipulate text data like a pro.
KrishSep 29, 2025Sep 29, 2025
LinuxTutorial

Sorting, Slicing and More… in Linux | Filtering Content Part 2

Go beyond just viewing text and master filtering content in Linux by learning to sort, cut, count, and transform output like a pro.
KrishSep 18, 2025Sep 10, 2025
LinuxTutorial

Pagers and More in Linux | Filtering Content Part 1

Struggling with massive text files in the Linux terminal? Learn the essentials of filtering content in Linux using more, less, head, and tail. The first crucial step for any aspiring hacker.
KrishSep 11, 2025Sep 10, 2025
BlogCyber SecurityTutorial

How to Install Wazuh on Raspberry Pi ?

Let's, Install Wazuh server on a raspberry Pi. In this blog, I will give you a step-by-step installation process of Wazuh server on raspberry pi.
KrishSep 7, 2025Sep 8, 2025
TroubleshootingTutorialBlog

How to Fix the Blinking Orange Light on a MI Xiaomi Camera 360

Recently, my Xiaomi Camera 360 (Model No: MJSXJ05CM) stopped working. So, I did what any sane person would do: I tried resetting the camera. It spun 360 degrees and stopped at the Mi logo. I thought, "Yes, problem solved! 😂" But no such luck. The camera's LED just kept blinking orange non-stop.
KrishAug 30, 2025Sep 5, 2025
System Information 3
LinuxTutorial

Information Gathering in Linux | Part 3

Dive into Information Gathering in Linux with System Information Part-3. Learn to explore devices, processes, and more with lsblk, lsusb, lspci, and lsof.
KrishAug 26, 2025Sep 5, 2025
System Information 2
LinuxTutorial

Information Gathering in Linux | Part 2

Take your Linux information gathering skills to the next level! Learn to use ss, ps, who, and w to uncover running processes, active users, and network connections. Essential for any hacker.
KrishAug 10, 2025Aug 9, 2025
System Information 1
TutorialLinux

Information Gathering in Linux | Part 1

Learn how to gather system-level details in Linux using commands like whoami, id, hostname, uname, ifconfig, ip, and netstat. Ideal for beginners in ethical hacking!
KrishAug 9, 2025Sep 5, 2025
LinuxTutorial

Learn Find Now : The Boss of Searching in Linux !!

Learn how to master the find command in Linux with advanced flags like -user, -exec, and how to pair it with the file command. Perfect for ethical hackers in Hindi.
KrishJul 22, 2025Jul 22, 2025
BlogInformative

Cryptography for Network Security and Secure Communication

Cryptography underpins secure communication and network security—protecting your data in transit, beating cyber threats, and shaping a safer online world.
KrishJul 5, 2025Jun 26, 2025
123

Hacking

What is ADB and How To Install it in Windows and Linux ?

adb stands for Android Debug Bridge by which you can get root access to your phone terminal. So lets see how you can install it...

Read More

What is MBR, it's Working and Hacking !!

MBR or Master Boot Record is a partition scheme that has been used for decades. In this blog we will see MBR structure, history and hacking possibilities....

Read More

What is GPT, its Structure and Working !!

GPT or GUID Partition Table is a successor of MBR that comes with a lot of amazing features to protect your data's integrity security and safety...

Read More

Cyber Security

How to Install Wazuh on Raspberry Pi ?

Let's, Install Wazuh server on a raspberry Pi. In this blog, I will give you a step-by-step installation process of Wazuh server on raspberry pi....

Read More

Cloud Network Security Strategies You Are Missing !!

Discover engaging, real-world “Cloud Network Security Strategies” that balance Zero Trust, micro-segmentation, encryption, and compliance...

Read More

How to Build a Resilient Network Security Architecture ?

Network Security isn’t just a buzzword – it’s the foundation of protecting your network and data....

Read More

Hacking Journey

I Changed My Whole Life in 6 Months

Wanted to share my personal update, so here I am with another self blog. It's been 6 months since I wrote an update about my journey,...

Read More

The Beginning

This is my first blog of my journey which I am sharing with you.So, till this point, I have started a YouTube channel named Growing HackerAs you can see above...

Read More
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}