Cyber Security Makes Your Digital World Colorful

Welcome to CyberKiller Blog — by Devaraj Govindhan

HTB Certified Machine

Walkthrough of a Hack The Box certified lab challenge focusing on realistic penetration testing techniques.

Read More →

HTB Administrator Machine

Administrator-level exploitation techniques explored in this Hack The Box machine walkthrough.

Read More →

Network Scanning Tool (Nmap)

How to use Nmap effectively for reconnaissance, port scanning, and vulnerability discovery.

Read More →

EternalBlue Vulnerability Exploit

A deep dive into the SMBv1 vulnerability exploited by WannaCry and other malware campaigns.

Read More →

Bugcrowd Scam

Exploring red flags and scam indicators within the bug bounty and pentesting community.

Read More →

IELTS & PTE Exam Scam

Uncovering the fake certificate and score manipulation schemes targeting test takers globally.

Read More →

Tamil Nilam Citizen Service

Security analysis of the Tamil Nadu land records and citizen service portal.

Read More →

NPM Supply Chain Attack

Breakdown of modern JavaScript supply chain risks using NPM as the vector.

Read More →

Phoenix Rowhammer Attack

Analysis of a Rowhammer-based hardware attack with real-world impact.

Read More →

Active Directory Forest Pentest

Forest-level AD exploitation techniques for internal enterprise pentests.

Read More →

Dire Wolf Ransomware Analysis

Reverse engineering and behavioral analysis of the Dire Wolf ransomware sample.

Read More →

PyBitmessage Backdoor Analysis

Malware embedded within a messaging platform designed to exfiltrate data.

Read More →

Auto‑color ELF Malware

Analysis of ELF-format malware targeting Linux systems with advanced stealth techniques.

Read More →

Comprehensive Steps After a Ransomware Attack

From Incident Response to Root Cause Analysis and Recovery.

Read More →