Skip to content
  • About
  • About Me
  • Blogs
  • Home
  • My Journey
  • Privacy Policy
YouTube
Krish
Growing Hacker
  • Home
  • Blogs
  • About
  • My Journey
  • Privacy Policy
YouTube
Krish
Growing Hacker
cyber-threats-illustration
BlogCyber Security

Understanding Cyber Threats and Vulnerabilities

Cyber Threats are increasing and criminals to so why not learn about some cool tools and techniques used by hackers?
KrishOct 30, 2023Nov 30, 2024
password-key
BlogCyber Security

Salt, Pepper, and Hashing: Three Ingredients to Secure Passwords

Our password travel on a boat in an open ocean that everyone has access to. We will see how Hashing, peppering and salting actually save us from hackers on the internet..
KrishOct 29, 2023Nov 30, 2024
BlogInformativeCyber Security

Creating and Breaking MD5 Hash

We will see how MD5 is created and why it is not considered secure anymore. How Hackers have managed to Hack the Hashes
KrishOct 1, 2023Nov 30, 2024
Hidden-Microsoft-Partition
BlogInformativeWindows

EFI Partition: What it is and Why it’s Important

EFI or Extensible Firmware Interface is a firmware interface that is used to boot operating systems in computers. Let's see what's inside?
KrishSep 10, 2023Nov 30, 2024
HackingTutorial

What is ADB and How To Install it in Windows and Linux ?

adb stands for Android Debug Bridge by which you can get root access to your phone terminal. So lets see how you can install it
KrishAug 14, 2023Nov 30, 2024
WindowsTutorial

How To Type Hindi Using English in Windows 11

Learn how to type in Hindi without the need for any third-party software on Windows. In this Article I will teach you how you can type English to Hindi effortlessly in Windows
KrishJul 10, 2023Nov 30, 2024
Journey

I Changed My Whole Life in 6 Months

Wanted to share my personal update, so here I am with another self blog. It's been 6 months since I wrote an update about my journey,
KrishJul 5, 2023Nov 30, 2024
Cyber Security

Fundamentals of Cyber Security for Beginners

Being secure is crucial in this world specially online one single mistake can lead to bankruptcy let's look how you can protect yourself online.
KrishJun 27, 2023Nov 30, 2024
power-button
Informative

How do Computers Boot? | Booting Process Explained

Have you ever wondered what happens when you click the power button of you PC How does it boot on How the OS loads. We will explore how your computer starts.
KrishJun 23, 2023Nov 30, 2024
MBR-Structure
HackingInformative

What is MBR, it’s Working and Hacking !!

MBR or Master Boot Record is a partition scheme that has been used for decades. In this blog we will see MBR structure, history and hacking possibilities.
KrishJun 15, 2023Nov 30, 2024
678910

Hacking

How Malicious Chrome Extensions Exposed 900K Users This December ?

Over 900k users were hit by malicious Chrome extensions posing as ChatGPT and DeepSeek tools. We dive deep into the analysis, the C2 exfiltration, and how to secure your browser....

Read More

What is ADB and How To Install it in Windows and Linux ?

adb stands for Android Debug Bridge by which you can get root access to your phone terminal. So lets see how you can install it...

Read More

What is GPT, its Structure and Working !!

GPT or GUID Partition Table is a successor of MBR that comes with a lot of amazing features to protect your data's integrity security and safety...

Read More

Cyber Security

What's Next? Leveraging Your Cyber Security Home Lab for Mastery

Congratulations! If you are reading this, you have likely finished setting up your cyber security home lab....

Read More

How to Install WSL and Docker For Cyber Security Homelab ?

In this part, we are going to install WSL and Docker on our machine. If you don't have a high-configuration computer at your hands,...

Read More

How To Create Your First Virtual Machine In 2025?

In this blog, I'm going to show you how you can create your first virtual machine with VMware. At first, the virtualization concept and the thought of creating your first...

Read More

Hacking Journey

I Changed My Whole Life in 6 Months

Wanted to share my personal update, so here I am with another self blog. It's been 6 months since I wrote an update about my journey,...

Read More

The Beginning

This is my first blog of my journey which I am sharing with you.So, till this point, I have started a YouTube channel named Growing HackerAs you can see above...

Read More
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}