00%
Anish Kumar

Making
good
code
since
2024

Passionate ethical hacker dedicated to uncovering vulnerabilities and fortifying digital landscapes with innovative security solutions.

Fixer

Solving daily technical problems enhances my skills for future challenges

Fixer

Solving daily technical problems enhances my skills for future challenges

Visual

I search the internet for references and then combine them to create my own work.

Visual

I search the internet for references and then combine them to create my own work.

Hunter

I'm passionate about bug bounty hunting, using various tools and my unique approach to find vulnerabilities

Hunter

I'm passionate about bug bounty hunting, using various tools and my unique approach to find vulnerabilities

Learner

I'm constantly learning to upskill my knowledge, utilizing free time for technical work and expanding my expertise in cybersecurity.

Learner

I'm constantly learning to upskill my knowledge, utilizing free time for technical work and expanding my expertise in cybersecurity.

Tutorial

I thought I’d make millions of $ from Youtube but I didn’t

Tutorial

I thought I’d make millions of $ from Youtube but I didn’t

anishalx work anishalx work-mobile
Proficient in Python scripting, JavaScript, Bash, mastering Linux tools & BurpSuite for advnced bug bounty, Pentest.
Python

Developed multiple Python tools

Experienced

Python

Networking Automation Tools

Experienced

Bash

Utilized Bash for scripting

Intermediate

Bash

Scripting Task Automation

Intermediate

c++

Built mini projects

Basic

c++

System-Level Programming

Basic

JS

Creating payloads with JavaScript

Basic

JS

Payload Creation Scripts

Basic

Proficient in Kali Linux, Burp Suite Performing expert pentesting and vulnerability detection
anishalx planet

Nmap

Nmap

Utilized Nmap for comprehensive network and domain scanning, mastering essential commands during my Z Security course.

Burp Suite

Burp Suite

Daily utilize Burp Suite to uncover website vulnerabilities, solve labs, and engage in bug bounty programs.

Metasploit

Metasploit

Mastered Metasploit and its commands for monitoring target machines during my Z Security courses.

Wireshark

Wireshark

Learned Wireshark to analyze and sniff target networks by creating my own lab for man-in-the-middle attacks.

kali linux

kali linux

Utilizing Kali Linux daily as my primary OS, I've conducted pentesting and mastered numerous tools and commands.

Maltego

Maltego

Learned Maltego during my Z Security course to gather OSINT and information about targets effectively.

  • anishalx Project MacIP
  • anishalx Project GhostARP
  • anishalx Project Netscanner

Robust
solution for
seamless
MAC/IP
adress
management.

MacIP changer

Source

Live Demo

Swift ARP spoofing
for advanced
network intercet

GhostARP

Source

Live Demo

Swift Python
tool for network
device scan

Netscanner

Source

Live Demo

anishalx banner-bottom anishalx banner-bottom-mobile

MY MOTTO

Expert
hacker
pionering leader

Buy Me A Coffee

Anish Alx

Hiding
bad
code
since
2022

Relentless in pursuit of digital flaws, I manipulate systems, exploit hidden flaws, and relentlessly hunt vulnerabilities in the shadows of cyberspace.

Fixer

Solving daily technical problems enhances my skills
for future challenges

Fixer

Solving daily technical problems enhances my skills
for future challenges

Visual

I search the internet for references and then combine them to create my own work.

Visual

I search the internet for references and then combine them to create my own work.

Hunter

I'm passionate about bug bounty hunting, using various tools and my unique approach to find vulnerabilities

Hunter

I'm passionate about bug bounty hunting, using various tools and my unique approach to find vulnerabilities

Learner

I'm constantly learning to upskill my knowledge, utilizing free time for technical work and expanding my expertise in cybersecurity.

Learner

I'm constantly learning to upskill my knowledge, utilizing free time for technical work and expanding my expertise in cybersecurity.

Tutorial

I thought I’d make millions of $ from Youtube
but I didn’t

Tutorial

I thought I’d make millions of $ from Youtube
but I didn’t

Harnessing the dark web’s secrets, I breach systems, exploit vulnerabilities, and dominate bug bounties with exactitude.
Python

Networking Automation Tools

Experienced

Python

Networking Automation Tools

Experienced

Bash

Scripting Task Automation

Intermediate

Bash

Scripting Task Automation

Intermediate

c++

System-Level Programming

Basic

c++

System-Level Programming

Basic

JS

Payload Creation Scripts

Basic

JS

Payload Creation Scripts

Basic

Mastering the dark arts of cybersecurity with Metasploit, Wireshark for stealthy exploits.

Nmap

Utilized Nmap for comprehensive network and domain scanning, mastering essential commands during my Z Security course.

Nmap

Utilized Nmap for comprehensive network and domain scanning, mastering essential commands during my Z Security course.

Burp Suite

Daily utilize Burp Suite to uncover website vulnerabilities, solve labs, and engage in bug bounty programs.

Burp Suite

Daily utilize Burp Suite to uncover website vulnerabilities, solve labs, and engage in bug bounty programs.

Metasploit

Mastered Metasploit and its commands for monitoring target machines during my Z Security courses.

Metasploit

Mastered Metasploit and its commands for monitoring target machines during my Z Security courses.

Wireshark

Learned Wireshark to analyze and sniff target networks by creating my own lab for man-in-the-middle attacks.

Wireshark

Learned Wireshark to analyze and sniff target networks by creating my own lab for man-in-the-middle attacks.

kali linux

Utilizing Kali Linux daily as my primary OS, I've conducted pentesting and mastered numerous tools and commands.

kali linux

Utilizing Kali Linux daily as my primary OS, I've conducted pentesting and mastered numerous tools and commands.

Maltego

Learned Maltego during my Z Security course to gather OSINT and information about targets effectively.

Maltego

Learned Maltego during my Z Security course to gather OSINT and information about targets effectively.

PLAY REEL
  • anishalx Project MacIP
  • anishalx Project GhostARP
  • anishalx Project Netscanner

Lethal tool for
dominating MAC/IP
address manipulation
Lethal
tool for
dominating MAC/IP
address
manipulation

MacIP changer

Source

Live Demo

Ruthless ARP
manipulator for total network .
Ruthless ARP
manipulator for
total network .

GhostARP

Source

Live Demo

Stealth Python
tool for network
device hunting
Stealth Python
tool for network
device hunting

Netscanner

Source

Live Demo

MY Skills

python expert
analyst
Defender

Buy Me A Coffee

Connect