Aditya Telange

@adityatelange
55 Followers
48 Following
363 Posts

🚀 evil-winrm-py v1.6.0 is out!

New commands:
• runexe → upload & exec local EXEs (with args)
• loaddll → load remote DLL as PS module
• services → list non-system services

Plus better tab completion for PS cmdlets, multi-encoding support, and more.

https://github.com/adityatelange/evil-winrm-py/releases/tag/v1.6.0

#Pentest #WinRM #RedTeam

Release v1.6.0 · adityatelange/evil-winrm-py

This release introduces new commands for interacting with the remote host, including runexe, loaddll, and services. It also brings significant improvements to the interactive shell, such as enhance...

GitHub

The #FDroid website has a new banner on top to remind visitors that #Google did not change course and #Android will be locked-down in under 200 days.

If you care about the freedom to control your devices and care about the privacy of you data, please contact your representative and make your voice heard.

https://keepandroidopen.org/ (thanks @marcprux) has the resources to guide you.

We know users will rarely visit the site so the Client(s) will get a banner soon too.

Thank you for your support!

Keep Android Open

Advocating for Android as a free, open platform for everyone to build apps on.

Bypassing LinkedIn's Connection Privacy with a Simple Search Filter

https://adityatelange.in/blog/linkedin-list-network-without-connecting/

#appsec #infosec #linkedin

Bypassing LinkedIn's Connection Privacy with a Simple Search Filter

Discover how a simple manipulation of LinkedIn's search filters allowed access to private connection lists, highlighting the importance of robust access controls.

Aditya Telange

Making Dynamic Instrumentation Accessible with Frida UI

https://adityatelange.in/blog/ui-for-frida/

#android #pentest #infosec #frida

Making Dynamic Instrumentation Accessible with Frida UI

A developer-friendly mobile-dashboard for Frida to speed up your Android and iOS dynamic instrumentation workflow.

Aditya Telange

🔐 Introducing frida-ui

A lightweight, web-based user interface built for Frida - designed to make Android application penetration testing more intuitive and efficient.

📦 Easy to get started:
> uv tool install frida-ui
> frida-ui

Check it out on GitHub - https://github.com/adityatelange/frida-ui

Available on PyPI: https://pypi.org/project/frida-ui

#AndroidSecurity #infosec #Frida #SecurityTools #OpenSource

GitHub - adityatelange/frida-ui: Interact with Frida devices, processes, and scripts directly from your browser.

Interact with Frida devices, processes, and scripts directly from your browser. - adityatelange/frida-ui

GitHub

Breaking Payload Encryption in Web Applications

https://adityatelange.in/blog/payload-encryption/

#appsec #pentesting

Breaking Payload Encryption in Web Applications

A deep dive into techniques for breaking payload encryption in web applications, including common vulnerabilities and tools used.

Aditya Telange
too much wait 

evil-winrm-py

python-based tool for executing commands on remote Windows machines using the WinRM (Windows Remote Management) protocol. It provides an interactive shell.

https://github.com/adityatelange/evil-winrm-py

#windows #pentesting #infosec

GitHub - adityatelange/evil-winrm-py: Execute commands interactively on remote Windows machines using the WinRM protocol

Execute commands interactively on remote Windows machines using the WinRM protocol - adityatelange/evil-winrm-py

GitHub
Demystifying WinRM

One of the most common problems I come across today when it comes to remotely managing Windows is dealing with WinRM and its inconsistencies. I wanted to create a blog post that will help people un…

Blogging for Logging