Hunting Deserialization Vulnerabilities With Claude
Source provenance. Raw material catalogued for the wiki ingest pipeline. Lives offline at
raw_sources/offensive-security/ingested/Hunting Deserialization Vulnerabilities With Claude.md.
Status: integrated
Excerpt
In this post, we are going to look at how we can find zero-days in.NET assemblies using Model Context Protocol (MCP). Before we can start vibe hacking, we need an MCP that will allow Claude to disassemble.NET assemblies. Reversing a.NET binary is normally something I would do with dotPEAK; however, this is a Windows-only tool. Luckily for us, [ilspycmd]…
