Event JSON
{
"id": "c6757f63367d3b52a46d0a2915cde3f4c7844b0f89333ed401067967cd59bea1",
"pubkey": "05df33b31d45568d221f414c169c9abebd0765b8ab0e13d6e84461eb3a961a38",
"created_at": 1747249319,
"kind": 1,
"tags": [
[
"t",
"csharp"
],
[
"t",
"redteam"
],
[
"t",
"github"
],
[
"t",
"infosec"
],
[
"t",
"cybersecurity"
],
[
"t",
"software"
],
[
"t",
"technology"
],
[
"t",
"news"
],
[
"t",
"ctf"
],
[
"t",
"cybersecuritycareer"
],
[
"t",
"hacking"
],
[
"t",
"blueteam"
],
[
"t",
"purpleteam"
],
[
"t",
"tips"
],
[
"t",
"opensource"
],
[
"t",
"cloudsecurity"
],
[
"imeta",
"url https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/507/731/373/139/365/original/fb1b79c7a9b774e1.png",
"m image/png",
"dim 1024x1024",
"blurhash U68|G7PV9WvfLNL1rXn353GF,[nOL2Nar=kC"
],
[
"proxy",
"https://infosec.exchange/users/alevsk/statuses/114507731378637387",
"activitypub"
],
[
"client",
"Mostr",
"31990:6be38f8c63df7dbf84db7ec4a6e6fbbd8d19dca3b980efad18585c46f04b26f9:mostr",
"wss://relay.mostr.pub"
]
],
"content": "New Open-Source Tool Spotlight 🚨🚨🚨\n\nLoading PowerShell scripts from C# while bypassing AMSI, ETW, and logging? Meet Stracciatella. Think SharpPick but designed for evasion—with Constrained Language Mode \u0026 defenses disabled on startup using .NET runspaces. Intricate yet efficient. #CSharp #RedTeam\n\n🔗 Project link on #GitHub 👉 https://github.com/mgeeky/Stracciatella\n\n#Infosec #Cybersecurity #Software #Technology #News #CTF #Cybersecuritycareer #hacking #redteam #blueteam #purpleteam #tips #opensource #cloudsecurity\n\n— ✨\n🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴☠️\n\nhttps://media.infosec.exchange/infosec.exchange/media_attachments/files/114/507/731/373/139/365/original/fb1b79c7a9b774e1.png",
"sig": "4120999a6f77cbd21237e55af9edd320129a006200d0990b55c99868f9c3792fd718d63c3118e98c251e1548393149d465dc34e815e2fd5e75730059bb01aab8"
}