JYso is a tool that can be used as both ysoserial and JNDIExploit. It also has bypass functions of multiple JNDI high versions, WAF, and RASP.
Please be sure to take a moment to read this document, which will help you quickly become familiar with JYso!
Use documentation Wiki.
Download the latest version of Releases.
If you have any other great ideas be sure to let me know!
Download gradle8.7+ and configure it in the global environment variable, execute it in the project root directory
./gradlew shadowJar For more information, see Directory Structure Description.
We warmly welcome all of you to work together to improve this project!
JYso is a part of 404Team 404StarLink 2.0. If you have questions about JYso or want to find a partner to communicate, you can refer to the Starlink group project.
This tool can only be used in the security construction of enterprises that have obtained sufficient legal authorization.
When using this tool, you should ensure that all your actions comply with local laws and regulations.
If you commit any illegal behavior while using this tool, you will bear all the consequences yourself. All developers and contributors of this tool do not assume any legal and joint liability.
Please do not install and use this tool unless you have fully read, fully understood and accepted all the terms of this agreement.
Your usage behavior or your acceptance of this Agreement in any other express or implicit manner shall be deemed to have read and agreed to be bound by this Agreement.
What is a Software Supply Chain Attack? A software supply chain attack occurs when a…
When people ask how UDP works, the simplest answer is this: UDP sends data quickly…
Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…
A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…
How Does a Firewall Work Step by Step? What Is a Firewall and How Does…
People trying to securely connect to work are being tricked into doing the exact opposite.…