<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Security on Aditya Telange</title><link>https://adityatelange.in/tags/security/</link><description>Recent content in Security on Aditya Telange</description><image><title>Aditya Telange</title><url>https://adityatelange.in/assets/tn.jpg</url><link>https://adityatelange.in/assets/tn.jpg</link></image><generator>Hugo -- 0.156.0</generator><language>en</language><copyright>2020 - 2026 Aditya Telange</copyright><lastBuildDate>Mon, 26 Jan 2026 00:40:00 +0530</lastBuildDate><atom:link href="https://adityatelange.in/tags/security/index.xml" rel="self" type="application/rss+xml"/><item><title>Bypassing LinkedIn's Connection Privacy with a Simple Search Filter</title><link>https://adityatelange.in/blog/linkedin-list-network-without-connecting/</link><pubDate>Mon, 26 Jan 2026 00:40:00 +0530</pubDate><guid>https://adityatelange.in/blog/linkedin-list-network-without-connecting/</guid><description>Discover how a simple manipulation of LinkedIn&amp;#39;s search filters allowed access to private connection lists, highlighting the importance of robust access controls.</description></item><item><title>Breaking Payload Encryption in Web Applications</title><link>https://adityatelange.in/blog/payload-encryption/</link><pubDate>Sat, 27 Sep 2025 23:59:52 +0530</pubDate><guid>https://adityatelange.in/blog/payload-encryption/</guid><description>A deep dive into techniques for breaking payload encryption in web applications, including common vulnerabilities and tools used.</description></item><item><title>Android App Security Testing Lab with MobSleuth</title><link>https://adityatelange.in/blog/mobsleuth-lab/</link><pubDate>Sun, 16 Jun 2024 19:32:45 +0530</pubDate><guid>https://adityatelange.in/blog/mobsleuth-lab/</guid><description>Setting up a virtual lab for Android App security assessments.</description></item><item><title>Breaking down Reverse shell commands</title><link>https://adityatelange.in/blog/revshells/</link><pubDate>Sun, 07 May 2023 19:27:11 +0530</pubDate><guid>https://adityatelange.in/blog/revshells/</guid><description>&lt;p&gt;In pentesting assessments and CTFs we always need reverse shells to execute commands on target machine once we have exploited a system and have a command injection at some point in our engagement.&lt;/p&gt;
&lt;p&gt;For that we have an awesome project: &lt;a href="https://revshells.com/"&gt;revshells.com&lt;/a&gt; or &lt;a href="https://github.com/0dayCTF/reverse-shell-generator"&gt;reverse-shell-generator&lt;/a&gt;
where we have a ton of reverse shell payloads listed.
This blog post tries to explain their working.&lt;/p&gt;
&lt;p&gt;Note: I&amp;rsquo;ll be breaking down &lt;em&gt;all of them, but not all at once&lt;/em&gt;.
If you have any comments/feedback let me know in the &lt;a href="https://adityatelange.in/blog/revshells/#comments_section"&gt;comments section&lt;/a&gt;.&lt;/p&gt;</description></item></channel></rss>