Hunting Deserialization Vulnerabilities With Claude

Source provenance. Raw material catalogued for the wiki ingest pipeline. Lives offline at raw_sources/offensive-security/ingested/Hunting Deserialization Vulnerabilities With Claude.md.

Status: integrated

Excerpt

In this post, we are going to look at how we can find zero-days in.NET assemblies using Model Context Protocol (MCP). Before we can start vibe hacking, we need an MCP that will allow Claude to disassemble.NET assemblies. Reversing a.NET binary is normally something I would do with dotPEAK; however, this is a Windows-only tool. Luckily for us, [ilspycmd]…