100%
Anish Kumar

M
a
k
i
n
g
g
o
o
d
c
o
d
e
s
i
n
c
e
2
0
2
4

Passionate ethical hacker
dedicated to uncovering
vulnerabilities and fortifying
digital landscapes with
innovative security solutions.
Passionate ethical hacker
dedicated to uncovering
vulnerabilities and fortifying
digital landscapes with
innovative security solutions.

Fixer

Fixer

Solving daily technical problems enhances my skills for future challenges

Fixer

Solving daily technical problems enhances my skills for future challenges

Visual

Visual

I search the internet for references and then combine them to create my own work.

Visual

I search the internet for references and then combine them to create my own work.

Hunter

Hunter

I'm passionate about bug bounty hunting, using various tools and my unique approach to find vulnerabilities

Hunter

I'm passionate about bug bounty hunting, using various tools and my unique approach to find vulnerabilities

Learner

Learner

I'm constantly learning to upskill my knowledge, utilizing free time for technical work and expanding my expertise in cybersecurity.

Learner

I'm constantly learning to upskill my knowledge, utilizing free time for technical work and expanding my expertise in cybersecurity.

Tutorial

Tutorial

I thought I’d make millions of $ from Youtube but I didn’t

Tutorial

I thought I’d make millions of $ from Youtube but I didn’t

anishalx work anishalx work-mobile
Proficient in Python scripting,
JavaScript, Bash, mastering
Linux tools & BurpSuite for
advnced bug bounty, Pentest.
Proficient in Python scripting,
JavaScript, Bash, mastering
Linux tools & BurpSuite for
advnced bug bounty, Pentest.
Python

Developed multiple Python tools

Experienced

Python

Networking Automation Tools

Experienced

Bash

Utilized Bash for scripting

Intermediate

Bash

Scripting Task Automation

Intermediate

c++

Built mini projects

Basic

c++

System-Level Programming

Basic

JS

Creating payloads with JavaScript

Basic

JS

Payload Creation Scripts

Basic

Proficient in Kali Linux, Burp Suite
Performing expert pentesting and
vulnerability detection
Proficient in Kali Linux, Burp Suite
Performing expert pentesting and
vulnerability detection
anishalx planet

Nmap

Nmap

Nmap

Utilized Nmap for comprehensive network and domain scanning, mastering essential commands during my Z Security course.

Burp Suite

Burp Suite

Burp Suite

Daily utilize Burp Suite to uncover website vulnerabilities, solve labs, and engage in bug bounty programs.

Metasploit

Metasploit

Metasploit

Mastered Metasploit and its commands for monitoring target machines during my Z Security courses.

Wireshark

Wireshark

Wireshark

Learned Wireshark to analyze and sniff target networks by creating my own lab for man-in-the-middle attacks.

kali linux

kali linux

kali linux

Utilizing Kali Linux daily as my primary OS, I've conducted pentesting and mastered numerous tools and commands.

Maltego

Maltego

Maltego

Learned Maltego during my Z Security course to gather OSINT and information about targets effectively.

Video Player is loading.
Current Time 0:00
Duration 0:37
Loaded: 0.00%
Stream Type LIVE
Remaining Time 0:37
 
1x
    • Chapters
    • descriptions off, selected
    • captions off, selected
      • anishalx Project MacIP
      • anishalx Project GhostARP
      • anishalx Project Netscanner

      Robust solution for
      seamless MAC/IP
      adress management.

      Robust solution for
      seamless MAC/IP
      adress management.

      MacIP changer

      Source

      Live Demo

      Swift ARP spoofing
      for advanced
      network intercet

      Swift ARP spoofing
      for advanced
      network intercet

      GhostARP

      Source

      Live Demo

      Swift Python
      tool for network
      device scan

      Swift Python
      tool for network
      device scan

      Netscanner

      Source

      Live Demo

      anishalx banner-bottom anishalx banner-bottom-mobile

      MY MOTTO

      E
      x
      p
      e
      r
      t
      h
      a
      c
      k
      e
      r
      p
      i
      o
      n
      e
      r
      i
      n
      g
      l
      e
      a
      d
      e
      r

      Buy Me A Coffee

      Anish Alx

      H
      i
      d
      i
      n
      g
      b
      a
      d
      c
      o
      d
      e
      s
      i
      n
      c
      e
      2
      0
      2
      2

      Relentless in pursuit of digital flaws, I manipulate systems, exploit hidden flaws, and relentlessly hunt vulnerabilities in the shadows of cyberspace.

      Fixer

      Solving daily technical problems enhances my skills
      for future challenges

      Fixer

      Solving daily technical problems enhances my skills
      for future challenges

      Visual

      I search the internet for references and then combine them to create my own work.

      Visual

      I search the internet for references and then combine them to create my own work.

      Hunter

      I'm passionate about bug bounty hunting, using various tools and my unique approach to find vulnerabilities

      Hunter

      I'm passionate about bug bounty hunting, using various tools and my unique approach to find vulnerabilities

      Learner

      I'm constantly learning to upskill my knowledge, utilizing free time for technical work and expanding my expertise in cybersecurity.

      Learner

      I'm constantly learning to upskill my knowledge, utilizing free time for technical work and expanding my expertise in cybersecurity.

      Tutorial

      I thought I’d make millions of $ from Youtube
      but I didn’t

      Tutorial

      I thought I’d make millions of $ from Youtube
      but I didn’t

      Harnessing the dark web’s secrets, I breach systems, exploit vulnerabilities, and dominate bug bounties with exactitude.
      Python

      Networking Automation Tools

      Experienced

      Python

      Networking Automation Tools

      Experienced

      Bash

      Scripting Task Automation

      Intermediate

      Bash

      Scripting Task Automation

      Intermediate

      c++

      System-Level Programming

      Basic

      c++

      System-Level Programming

      Basic

      JS

      Payload Creation Scripts

      Basic

      JS

      Payload Creation Scripts

      Basic

      Mastering the dark arts of cybersecurity with Metasploit, Wireshark for stealthy exploits.

      Nmap

      Utilized Nmap for comprehensive network and domain scanning, mastering essential commands during my Z Security course.

      Nmap

      Utilized Nmap for comprehensive network and domain scanning, mastering essential commands during my Z Security course.

      Burp Suite

      Daily utilize Burp Suite to uncover website vulnerabilities, solve labs, and engage in bug bounty programs.

      Burp Suite

      Daily utilize Burp Suite to uncover website vulnerabilities, solve labs, and engage in bug bounty programs.

      Metasploit

      Mastered Metasploit and its commands for monitoring target machines during my Z Security courses.

      Metasploit

      Mastered Metasploit and its commands for monitoring target machines during my Z Security courses.

      Wireshark

      Learned Wireshark to analyze and sniff target networks by creating my own lab for man-in-the-middle attacks.

      Wireshark

      Learned Wireshark to analyze and sniff target networks by creating my own lab for man-in-the-middle attacks.

      kali linux

      Utilizing Kali Linux daily as my primary OS, I've conducted pentesting and mastered numerous tools and commands.

      kali linux

      Utilizing Kali Linux daily as my primary OS, I've conducted pentesting and mastered numerous tools and commands.

      Maltego

      Learned Maltego during my Z Security course to gather OSINT and information about targets effectively.

      Maltego

      Learned Maltego during my Z Security course to gather OSINT and information about targets effectively.

      PLAY REEL
      • anishalx Project MacIP
      • anishalx Project GhostARP
      • anishalx Project Netscanner

      Lethal tool for
      dominating MAC/IP
      address manipulation
      Lethal
      tool for
      dominating MAC/IP
      address
      manipulation

      MacIP changer

      Source

      Live Demo

      Ruthless ARP
      manipulator for total network .
      Ruthless ARP
      manipulator for
      total network .

      GhostARP

      Source

      Live Demo

      Stealth Python
      tool for network
      device hunting
      Stealth Python
      tool for network
      device hunting

      Netscanner

      Source

      Live Demo

      MY Skills

      python expert
      analyst
      Defender

      Buy Me A Coffee

      Connect