JYso is a tool that can be used as both ysoserial and JNDIExploit. It also has bypass functions of multiple JNDI high versions, WAF, and RASP.
Please be sure to take a moment to read this document, which will help you quickly become familiar with JYso!
Use documentation Wiki.
Download the latest version of Releases.
If you have any other great ideas be sure to let me know!
Download gradle8.7+ and configure it in the global environment variable, execute it in the project root directory
./gradlew shadowJar
For more information, see Directory Structure Description.
We warmly welcome all of you to work together to improve this project!
JYso is a part of 404Team 404StarLink 2.0. If you have questions about JYso or want to find a partner to communicate, you can refer to the Starlink group project.
This tool can only be used in the security construction of enterprises that have obtained sufficient legal authorization.
When using this tool, you should ensure that all your actions comply with local laws and regulations.
If you commit any illegal behavior while using this tool, you will bear all the consequences yourself. All developers and contributors of this tool do not assume any legal and joint liability.
Please do not install and use this tool unless you have fully read, fully understood and accepted all the terms of this agreement.
Your usage behavior or your acceptance of this Agreement in any other express or implicit manner shall be deemed to have read and agreed to be bound by this Agreement.
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…
Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…