Devansh (⚡, 🥷) Profile Banner
Devansh (⚡, 🥷) Profile
Devansh (⚡, 🥷)

@0xAsm0d3us

Followers
14,034
Following
2,797
Media
349
Statuses
1,052

Pwn & Security Research 🔍 🏗️ Hunting threats in the wild⚡ Opinions are solely mine

mempool
Joined December 2019
Don't wanna be here? Send us removal request.
Explore trending content on Musk Viewer
Pinned Tweet
@0xAsm0d3us
Devansh (⚡, 🥷)
2 months
If you, like many, think relying just on `cat` command's output is enough to be sure about the integrity of a bash file. Think twice, you could get hacked. Read below 👇
Tweet media one
75
508
4K
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
A collection of awesome security hardening guides, tools and other resources #cybersecurity #hacking
Tweet media one
16
542
2K
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
Reverse Engineering For Everyone! This comprehensive set of reverse engineering tutorials covers x86, x64 32-bit ARM, 64-bit architectures. If you're a newbie looking to learn reversing, or just someone looking to revise some concepts, check it out
Tweet media one
Tweet media two
9
536
1K
@0xAsm0d3us
Devansh (⚡, 🥷)
10 months
Free Malware Analysis Course, covers malware concepts, malware analysis, and black-box reverse engineering techniques #cybersecurity #malware
Tweet media one
10
415
1K
@0xAsm0d3us
Devansh (⚡, 🥷)
4 years
Weaponizing favicon.ico for BugBounties , OSINT and what not ! Blog : FavFreak : FingerPrint Based Favicon Hash Detection ! @Jhaddix @stokfredrik @NahamSec @hakluke @HusseiN98D
Tweet media one
Tweet media two
17
455
965
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
A powerful and open-source toolkit for hackers and security automation
Tweet media one
19
318
968
@0xAsm0d3us
Devansh (⚡, 🥷)
1 year
Free Malware Analysis Course, covers malware concepts, malware analysis, and black-box reverse engineering techniques #cybersecurity #malware
Tweet media one
9
314
961
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
Cyber-Bookmarks: a list of bookmarks that contains lists of resources/articles that will help bug bounty hunters with resources that are useful during their bug bounty journey. #cybersecurity #malware #bugbounty #hacking
Tweet media one
24
344
935
@0xAsm0d3us
Devansh (⚡, 🥷)
4 years
🔥 Awesome BugBounty Writeups 🔥 Created a list of 600+ Bugbounty writeups characterized by Bug type ! Happy Quarantine ! Grab a coffee and give them binge read 🔥 Github :
Tweet media one
15
429
905
@0xAsm0d3us
Devansh (⚡, 🥷)
3 years
My notes (actually a checklist ✅) for getting into Blockchain Security, a thread 🧵
24
344
869
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
ALL IN ONE Hacking Tool For Hackers #cybersecurity #hacking #osint #bughunting
Tweet media one
14
303
869
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
A curated list of awesome malware analysis tools and resources. #malware #reversing #hacking #cybersecurity
Tweet media one
4
277
837
@0xAsm0d3us
Devansh (⚡, 🥷)
2 months
The full content of the bash file is as follows: The script works by including raw escape codes to move the cursor up a couple of lines, so the rest of the script is written over the top of the malicious code, hiding it.
Tweet media one
6
33
857
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
Cybersecurity handbook by GuideSmiths #cybersecurity #hacking #bugbounty
Tweet media one
17
284
815
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
This awesome repository contains Malware analysis/Reverse engineering related tools, training, podcasts, blog posts, literature and just about anything else closely related to the topic. - by @0x4143 #malware #hacking #reversing #cybersecurity
Tweet media one
1
320
800
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
Bug Hunter Handbook: a book that contains lists of resources that will help bug bounty hunters with resources that are useful during their bug bounty journey. #hacking #bughunting #cybersecurity
Tweet media one
24
277
714
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
Cybersecurity handbook by GuideSmiths #cybersecurity #hacking #bugbounty
Tweet media one
0
267
708
@0xAsm0d3us
Devansh (⚡, 🥷)
4 years
ParamSpider : Parameter miner for humans Got a nice SSRF last week using this : - paramspider found a url with parameter ?file_url= - The parameter was deprecated long back from the production - luckily the parameter was vulnerable to SSRF Github :
Tweet media one
16
278
710
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
A list of interesting payloads, tips and tricks for bug bounty hunters.
Tweet media one
15
247
689
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
🔎 An awesome list of some of the most popular search engines for Hackers/OSINT Professionals/Cyber Investigators. (1/3) #cybersecurity #hacking #osint
Tweet media one
16
228
691
@0xAsm0d3us
Devansh (⚡, 🥷)
10 months
This repo tries to explain complex security vulnerabilities in simple terms that even a five-year-old can understand!
Tweet media one
4
236
695
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
A curated list of Android Security materials and resources For Pentesters and Bug Hunters #android #cybersecurity #bugbounty
Tweet media one
2
306
691
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
Damn Vulnerable GraphQL Application is an intentionally vulnerable implementation of Facebook's GraphQL technology, to learn and practice GraphQL Security. #hacking #graphql #cybersecurity #bughunting
Tweet media one
4
297
666
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
A non-exhaustive list of awesome CTFs for sharping your hacking/pwning skills
Tweet media one
8
229
644
@0xAsm0d3us
Devansh (⚡, 🥷)
2 months
We are so worried by this `xz` fiasco, when in reality it is so trivial to trick humans into running malicious code. No CVEs are used for the majority of the big shot hacks, humans are the most vulnerable link in this chain. Education/awareness alone will stop the majority of the
8
26
636
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
🗡️Application Security Cheat Sheet #bugbounty #hacking #cybersecurity
Tweet media one
2
273
611
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
Tweet media one
2
239
613
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
🛡️ Awesome Cloud Security Resources ⚔️ #cloudhacking #cybersecurity #appsec #bughunting
Tweet media one
4
242
604
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
List of awesome reverse engineering resources #reversing #hacking #cybersecurity
Tweet media one
2
217
589
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
A collection of awesome API Security tools and resources. #cybersecurity #apitesting #bugbounty
Tweet media one
4
271
596
@0xAsm0d3us
Devansh (⚡, 🥷)
4 years
🔥Find OpenRedirect Vulnerabilities in Bulk ! OpenRedireX : An Asynchronous Fuzzer for testing Openredirect issues Initially @nullpxl and I coded this for the output produced by ParamSpider + GF , Now releasing it as a standalone repository ! Github :
Tweet media one
10
218
589
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
Damn Vulnerable DeFi is the wargame to learn offensive security of DeFi smart contracts. Throughout numerous challenges you will build the skills to become a bug hunter or security auditor in the space, and yeah Merry Christmas🎄 #blockchain
Tweet media one
6
186
593
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
List of tutorials and things to look for while hunting for vulnerabilities 🐛 (- compiled by @KathanP19 and other awesome contributors) #cybersecurity #bughunting #hacking
Tweet media one
9
212
565
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
Bug Hunter Handbook: a book that contains lists of resources that will help bug bounty hunters with resources that are useful during their bug bounty journey. #hacking #bughunting #cybersecurity
Tweet media one
4
223
564
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
Application Security Cheat Sheet: A list of cheat sheets for application security #cybersecurity #bughunting #hacking #malware #exploit
Tweet media one
13
230
565
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
Collections of tools and methods created to aid in OSINT collection #osint #geosint #cybersecurity
Tweet media one
2
180
505
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
ALL IN ONE Hacking Tool For Hackers #cybersecurity #hacking #osint #bughunting
Tweet media one
1
207
486
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
A thread 🧵 on DNS misconfigurations/resources/articles/tools 👇 #hacking #cybersecurity #dns #bugbounty
9
170
480
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
Awesome Hacking: A collection of various awesome lists for hackers, pentesters, and security researchers #hacking #cybersecurity #osint #bughunting
Tweet media one
3
179
480
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
Some of my favorite Solidity Smart Contract Security resources 💚 #ethereum #blockchain #solidity #smartcontracts
Tweet media one
35
178
473
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
A curated list of awesome threat detection and hunting resources #cybersecurity #bughunting #hacking #malware
Tweet media one
1
175
471
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
API Security Checklist: Checklist of the most important security countermeasures when designing, testing, and releasing your API. #cybersecurity #api #hacking #bughunting
Tweet media one
4
211
478
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
⚔️ Checklist for container security - DevSecOps practices #cybersecurity #hacking #containers #bughunting #devops #devsecops
Tweet media one
1
167
424
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
🗡️🛡️A data set of Ethereum smart contract bugs #solidity #ethereum #cybersecurity
Tweet media one
10
153
413
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
HTTP Security headers quick reference #cybersecurity #bugbounty
Tweet media one
5
137
417
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
A list of interesting payloads, tips and tricks for bug bounty hunters. #bugbounty #hacking #cybersecurity
Tweet media one
1
163
409
@0xAsm0d3us
Devansh (⚡, 🥷)
10 months
headerpwn: A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers    Useful for uncovering following behaviors: - Header based access control issues - 403/401 Bypasses - Detecting anomalies when certain special headers are present - Header
Tweet media one
4
115
415
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
A curated list of blockchain security Capture the Flag (CTF) competitions #blockchain #ethereum #solidity
Tweet media one
8
150
395
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
Collection of Facebook Bug Bounty Writeups #cybersecurity #hacking #bugbounty #facebook
Tweet media one
2
165
391
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
Mobile Security Testing Guide by OWASP: An excellent starting point for getting into Mobile Security (Android & iOS) #android #ios #cybersecurity #hacking #bughunting
Tweet media one
2
183
373
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
Hacker101: Free educational resource to grow and empower the hacker community at large. #cybersecurity #hacking #bugbounty
Tweet media one
5
133
368
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
⚔️Offensive Security Cheatsheet #cybersecurity #bugbounty #hacking
Tweet media one
2
123
349
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
The Mobile Hacking CheatSheet - by randorisec #cybersecurity #bughunting #hacking
Tweet media one
7
119
352
@0xAsm0d3us
Devansh (⚡, 🥷)
10 months
A curated list of bugbounty writeups (Bug type wise) #bugbounty
Tweet media one
3
130
353
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
Machine Learning for Cyber Security: A curated list of amazingly awesome tools and resources related to the use of machine learning for cyber security. #cybersecurity #hacking #machinelearning
Tweet media one
5
127
343
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
Advanced XXE Exploitation: 3-hour workshop on XML External Entities (XXE) exploitation by GoSecure #xxe #hacking #cybersecurity
Tweet media one
2
136
343
@0xAsm0d3us
Devansh (⚡, 🥷)
2 months
Let's run this `" file. Wait what? Why it is spitting out the contents of `/etc/passwd`? The trick here is "escape codes".
Tweet media one
6
5
346
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials, and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Development. #cybersecurity #fuzzing #hacking
Tweet media one
2
133
327
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
A curated list of resources(trainings, documentation, tools) for Secure Coding (by @VladToie )
Tweet media one
0
138
324
@0xAsm0d3us
Devansh (⚡, 🥷)
10 months
CVE reversing is perhaps the best, most effective and practical approach for learning the ropes of offensive security research. Here is how I do it: - Tracking recent CVEs - Selecting CVEs related to extensively utilized software - Scrutinizing CVE description - Reading product
Tweet media one
4
65
328
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
A curated list of awesome threat detection and hunting resources #cybersecurity #bughunting #hacking #malware
Tweet media one
3
105
323
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
Template Injection in Action: 2-hour workshop on Template Injection (SSTI) #ssti #hacking #cybersecurity #bughunting
Tweet media one
2
155
321
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
Github's SecurityBites playlist is a good entry point for devs to learn how to secure your code against common vulnerabilities. #cybersecurity
Tweet media one
7
88
310
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
A Collection of Notes, Checklists, Writeups on Bug Bounty Hunting and Web Application Security. #cybersecurity #bugbounty #hacking
Tweet media one
1
145
311
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
How to exploit a double-free vulnerability ('Use After Free for Dummies') #binaryexploitation #hacking #cybersecurity
Tweet media one
1
85
309
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis, and security assessment framework capable of performing static and dynamic analysis. #cybersecurity #hacking
Tweet media one
1
136
291
@0xAsm0d3us
Devansh (⚡, 🥷)
10 months
paramspider: Mining URLs from dark corners of Web Archives for bughunting/fuzzing/further probing GitHub: 🔄 Revamped Features: - Multiple domain names Input using file - Enhanced Exception Handling - Easy Setup using pip - Clear and more
Tweet media one
9
85
307
@0xAsm0d3us
Devansh (⚡, 🥷)
4 years
[Thanks to a PR] FavFreak now has around 500 fingerprints of common services, FavFreak : Reference : #bugbounty
Tweet media one
7
126
303
@0xAsm0d3us
Devansh (⚡, 🥷)
9 months
DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is making GitHub: #cybersecurity
Tweet media one
3
61
279
@0xAsm0d3us
Devansh (⚡, 🥷)
11 months
This repo aims to explain the basics of DNS at different levels of complexity for readers with various technical backgrounds.
Tweet media one
3
79
277
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
🐛 A list of writeups from the Google VRP Bug Bounty program #cybersecurity #bugbounty #hacking #googlevrp
Tweet media one
2
115
270
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
🗡️ 🐛 Bug Bounty Cheatsheet by m0chan #bughunting #hacking #cybersecurity
Tweet media one
2
116
270
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
An introduction to Ghidra's primary components - by @byte_how #malware #reversing #forensics
Tweet media one
0
84
274
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
Pentest-Book: A collection of some awesome tools or techniques, tricks that might be useful in pentests/bugbounties (by @Six2dez1 ) #cybersecurity #bughunting #hacking #malware
Tweet media one
2
72
273
@0xAsm0d3us
Devansh (⚡, 🥷)
10 months
Discover potential XSS vulnerabilities en masse on the URLs stored in Wayback achrive for a domain using Rayder workflows Rayder: Workflow: #bugbounty
Tweet media one
5
83
261
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
Tweet media one
4
88
262
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
Introduction to Assembly - (by @D3v1L4L )
Tweet media one
1
78
250
@0xAsm0d3us
Devansh (⚡, 🥷)
10 months
revit : A command-line utility for performing reverse DNS lookups #bugbountytips #dns #cybersecurity
Tweet media one
2
47
258
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
An Intentionally designed Vulnerable Android Application built in Kotlin for sharping your mobile hacking skills via exploiting real-world mobile vulnerabilities. #android #hacking #cybsersecurity
Tweet media one
2
119
249
@0xAsm0d3us
Devansh (⚡, 🥷)
1 year
Android App Reverse Engineering 101 #CyberSecurity #malware
Tweet media one
4
70
243
@0xAsm0d3us
Devansh (⚡, 🥷)
10 months
OpenRedireX: A fuzzer for detecting open redirect vulnerabilities #bugbountytips #BugBounty
Tweet media one
4
66
248
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
Reverse Engineering resources (little outdated, but still relevant) #hacking #cybersecurity #reversing
Tweet media one
0
75
236
@0xAsm0d3us
Devansh (⚡, 🥷)
2 months
(2/n) Reading the file using `cat` seems fine, right? Definitely, nothing suspicious there, right?
Tweet media one
2
2
242
@0xAsm0d3us
Devansh (⚡, 🥷)
10 months
heaptruffle: Mine URLs from Browser's Heap Snapshot for fun and profit GitHub: heaptruffle captures heap snapshots of the web pages' memory. These heap snapshots are then parsed, allowing heaptruffle to extract URLs/endpoints from it. #bugbountytips
Tweet media one
3
66
240
@0xAsm0d3us
Devansh (⚡, 🥷)
4 years
I got so many DMs on how to use ParamSpider + GF , I created a section in the readme file() with follow along steps , do check this out , if still got problems DM are always open !
Tweet media one
9
91
234
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
💥 A curated list of Terminal frameworks, plugins & resources for CLI lovers. #cli #linux #terminal
Tweet media one
4
74
224
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
Android Application Pentesting - Mystikcon 2020 #android #cybersecurity #hacking #bughunting
Tweet media one
4
85
228
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
A curated list of Frida resources! #frida #android #cybersecurity #bughunting
Tweet media one
1
115
221
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
CrackMe codes for Linux x86/x86_64 #reversing
Tweet media one
1
56
218
@0xAsm0d3us
Devansh (⚡, 🥷)
9 months
⚡️ Discover more subdomains and expand the attack surface using Rayder workflow. Here is what the workflow does: - Fetches subdomains of a domain using subfinder - Mutates the subdomains using radamsa fuzzer - Fetches fresh DNS resolvers for dns bruteforcing - Uses massdns to
Tweet media one
3
52
218
@0xAsm0d3us
Devansh (⚡, 🥷)
1 year
Mind-Maps for Bug Hunters, Penetration Testers, Offensive/Defensive Security Professionals #cybersecurity #bughunting
Tweet media one
4
89
218
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
Nettacker: Automated Penetration Testing Framework - Open-Source Vulnerability Scanner
Tweet media one
1
83
212
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
This wiki (by @rv_inc ) contains a comprehensive list of common smart contract security vulnerabilities, compiled from various sources.
Tweet media one
1
84
209
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
Malware and Exploitdev Resources: This document serves as a list of resources, and other things that aid in malware analysis/dev and exploit dev #cybersecurity #hacking #malware #exploit
Tweet media one
1
107
210
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
AzureHunter: A Cloud Forensics Powershell module to run threat hunting playbooks on data from Azure and O365 #cybersecurity #hacking #cloud #forensics
Tweet media one
0
70
205
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
Awesome OSINT: A curated list of amazingly awesome open-source intelligence tools and resources. #osint #cybersecurity #osint #hacking #bughunting
Tweet media one
1
78
205
@0xAsm0d3us
Devansh (⚡, 🥷)
10 months
Brute force HTTP headers on a list of URLs for finding anomalies and analyzing how servers respond to different HTTP headers using Rayder workflows Useful for uncovering following behaviors: ⚡️ Header based access control issues ⚡️ 403/401 Bypasses ⚡️ Detecting anomalies
Tweet media one
3
42
208
@0xAsm0d3us
Devansh (⚡, 🥷)
2 years
Application Security related cheatsheets by OWASP #cybersecurity #hacking #owasp #bugbounty
Tweet media one
2
77
201