Skip to content
  • About
  • About Me
  • Blogs
  • Home
  • My Journey
  • Privacy Policy
YouTube
Krish
Growing Hacker
  • Home
  • Blogs
  • About
  • My Journey
  • Privacy Policy
YouTube
Krish
Growing Hacker
2FA Lock
InformativeHacking

What is 2FA?

Additional layer of security 2FA. Learn how it works and what's the best 2FA method for you social media accounts.
KrishApr 18, 2023Nov 30, 2024
Virtual Machine
InformativeLinuxWindows

Top 4 Best Virtual Machines For Hacking

Discover the top 4 best virtual machine software for seamless virtualization on your computer. In this article, we compare the top leading Virtualization software in the industry
KrishApr 17, 2023Nov 30, 20241 Comment on Top 4 Best Virtual Machines For Hacking
HackingLinuxTutorial

The Easiest Way to Install Kali Linux

There are multiple ways to install Kali Linux, but not all of them are as easy as this one.
KrishApr 12, 2023Nov 30, 2024
Asynchronous programming in python
ProgrammingPython

AsyncIO & Asynchronous Programming | Python

Are you tired of waiting for your code to complete a long-running task before moving on to the...
KrishApr 4, 2023Nov 30, 2024
scenery
BlogInformative

Are You Successful in Life?

Success. It’s the holy grail of modern society. We all chase it, we all want it, but what...
KrishFeb 13, 2023Nov 30, 2024
Bookshelf
BlogInformative

Book Summaries That I Had Read Before completing My School!!!

I want to share some book reviews of those books which I read before completing school.
KrishFeb 11, 2023Nov 30, 2024
Moving DNA gif
Blog

Some Humorous Facts About DNA!!!!!

some random funny stuff about DND which you never knew before from a bio student
KrishFeb 10, 2023Nov 30, 2024
Troubleshooting

Changing grayed-out windows services using Regedit

Having gray boxes when trying to change a service? Change windows services that windows doesn't want you to customize with ease
KrishJan 21, 2023Nov 30, 2024
TroubleshootingInformative

Fixing Kali stuck on “Detecting network hardware”

Hey Yo! What’s up Today we are going to fix kali’s stuck on detecting network hardware. I was...
KrishJan 10, 2023Nov 30, 2024
Krish
Journey

The Beginning

This is my first blog of my journey which I am sharing with you. So, till this point,...
KrishDec 31, 2022Nov 30, 20241 Comment on The Beginning
6789

Hacking

What is ADB and How To Install it in Windows and Linux ?

adb stands for Android Debug Bridge by which you can get root access to your phone terminal. So lets see how you can install it...

Read More

What is MBR, it's Working and Hacking !!

MBR or Master Boot Record is a partition scheme that has been used for decades. In this blog we will see MBR structure, history and hacking possibilities....

Read More

What is GPT, its Structure and Working !!

GPT or GUID Partition Table is a successor of MBR that comes with a lot of amazing features to protect your data's integrity security and safety...

Read More

Cyber Security

How to Install Wazuh on Raspberry Pi ?

Let's, Install Wazuh server on a raspberry Pi. In this blog, I will give you a step-by-step installation process of Wazuh server on raspberry pi....

Read More

Cloud Network Security Strategies You Are Missing !!

Discover engaging, real-world “Cloud Network Security Strategies” that balance Zero Trust, micro-segmentation, encryption, and compliance...

Read More

How to Build a Resilient Network Security Architecture ?

Network Security isn’t just a buzzword – it’s the foundation of protecting your network and data....

Read More

Hacking Journey

I Changed My Whole Life in 6 Months

Wanted to share my personal update, so here I am with another self blog. It's been 6 months since I wrote an update about my journey,...

Read More
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}