D0rkerDevil Profile Banner
Ashish Kunwar Profile
Ashish Kunwar

@D0rkerDevil

Followers
13K
Following
102K
Media
597
Statuses
23K

ex @Microsoft Security Researcher| Vulnerability Research | Threat Intel | EASM | DE | Penetration Tester | Opinions here are solely mine not my employer

somewhere in your network
Joined February 2017
Don't wanna be here? Send us removal request.
@D0rkerDevil
Ashish Kunwar
1 day
RT @hackprove_: 💣 Google Drive Auth Bypass: How View-Only Folder Sharing Leaked Google Form Responses ($5000 Bug).more information: https:….
Tweet card summary image
infosecwriteups.com
Author: Aditya Sunny | Category: Bug Bounty | Google VRP | Auth Bypass
0
8
0
@D0rkerDevil
Ashish Kunwar
2 days
RT @geeknik: China's "NightEagle" reveal is performative victimhood—mirroring their own espionage empire while slapping an eagle label to t….
Tweet card summary image
news.risky.biz
In other news: SEC and SolarWinds seek settlement; C&M hack linked to malicious insider; Luis Vuitton discloses breach.
0
1
0
@D0rkerDevil
Ashish Kunwar
4 days
RT @medusa_0xf: New Blog Up, Hackers don't miss!.
Tweet card summary image
medusa0xf.medium.com
Introduction
0
26
0
@D0rkerDevil
Ashish Kunwar
8 days
RT @garethheyes: Manual testing doesn't have to be repetitive. Meet Repeater Strike - an AI-powered Burp Suite extension that turns your Re….
0
9
0
@D0rkerDevil
Ashish Kunwar
8 days
RT @kaganisildak: bitchat-python.written in python & compatible with ios/android. out now. @jack ➟ original / ios.@callebtc ➟ android.@sh….
0
171
0
@D0rkerDevil
Ashish Kunwar
8 days
RT @androidmalware2: Shizuku unlocks advanced functionality on any Android. Using #Shizuku your Android gains ADB privileges to remove bloa….
0
137
0
@D0rkerDevil
Ashish Kunwar
8 days
RT @zoomeye_team: CVE-2025-25257: FortiWeb Pre-Auth RCE.🔥PoC: ZoomEye Dork👉app="FortiWeb WAF".ZoomEye Link: https:….
0
28
0
@D0rkerDevil
Ashish Kunwar
8 days
RT @_xploiterr: Website allows to add your own link, I have visited that page many times tried different variations but not able to exploit….
Tweet card summary image
aszx87410.github.io
In the previous post, various XSS scenarios and ways to execute code were mentioned, including something called the javascript: pseudo protocol. Even from a modern frontend perspective, this is...
0
26
0
@D0rkerDevil
Ashish Kunwar
8 days
RT @pdiscoveryio: Missing the latest CVEs puts you behind. Manually tracking new vulnerabilities takes time and effort. Say Hello to the….
0
5
0
@D0rkerDevil
Ashish Kunwar
21 days
RT @ganaseclabs: FYI : A pentest is NOT the same as a vulnerability scan. One finds known issues. The other thinks like an attacker. A pen….
0
2
0
@D0rkerDevil
Ashish Kunwar
1 month
RT @exploitsclub: Another Week, Another EXPLOITS CLUB 📰. ---.🎉 Binja giveaway: sign up to support the newsletter 🎉.---. Tesla wall charger….
Tweet card summary image
blog.exploits.club
Pacers in 7. Annnnyways 👇 Don't Forget! We are doing a Binary Ninja personal License Giveaway! All you have to do is: 1. Subscribe to the newsletter. C'mon - that should be easy enough. Winner will...
0
12
0
@D0rkerDevil
Ashish Kunwar
1 month
RT @retr0reg: working with binaryninja on an single ASAN output, of a sophisticated framework. .
0
36
0
@D0rkerDevil
Ashish Kunwar
1 month
RT @retr0reg: My handwritten notes on how Attention in Transformers works, based on @3blue1brown's wonderful DL5, DL6!. .
0
5
0
@D0rkerDevil
Ashish Kunwar
1 month
RT @olivier_boschko: New blog just dropped 🤠 I've spent hours boiling down why adversarial examples fundamentally exist, distilled down to….
Tweet card summary image
boschko.ca
Explore why adversarial examples fundamentally exist & why models are often wrong almost everywhere.
0
30
0
@D0rkerDevil
Ashish Kunwar
2 months
RT @Hesamation: Solid Python Cheatsheet.(this is basically 90% of Python)
Tweet media one
0
348
0
@D0rkerDevil
Ashish Kunwar
2 months
RT @Elektor: The I2C bus is highly vulnerable due to its design — both SCL and SDA “float” at high potential and are pulled low by the indi….
0
15
0
@D0rkerDevil
Ashish Kunwar
2 months
RT @pashovkrum: Too many hacks in web3 have come not from vulnerable smart contracts, but from bad OpSec of humans. Anybody who wants to….
Tweet card summary image
updraft.cyfrin.io
Learn advanced web3 wallet transaction verification techniques, signature validation, real-world exploit case studies, how to implement advanced protection strategies.
0
19
0
@D0rkerDevil
Ashish Kunwar
2 months
RT @UnslothAI: Finetune DeepSeek-R1-0528-Qwen3 with GRPO using our free notebook!. Our new reward function increases multilingual (or custo….
Tweet card summary image
colab.research.google.com
Run, share, and edit Python notebooks
0
171
0