JYso is a tool that can be used as both ysoserial and JNDIExploit. It also has bypass functions of multiple JNDI high versions, WAF, and RASP.
Please be sure to take a moment to read this document, which will help you quickly become familiar with JYso!
Use documentation Wiki.
Download the latest version of Releases.
If you have any other great ideas be sure to let me know!
Download gradle8.7+ and configure it in the global environment variable, execute it in the project root directory
./gradlew shadowJar For more information, see Directory Structure Description.
We warmly welcome all of you to work together to improve this project!
JYso is a part of 404Team 404StarLink 2.0. If you have questions about JYso or want to find a partner to communicate, you can refer to the Starlink group project.
This tool can only be used in the security construction of enterprises that have obtained sufficient legal authorization.
When using this tool, you should ensure that all your actions comply with local laws and regulations.
If you commit any illegal behavior while using this tool, you will bear all the consequences yourself. All developers and contributors of this tool do not assume any legal and joint liability.
Please do not install and use this tool unless you have fully read, fully understood and accepted all the terms of this agreement.
Your usage behavior or your acceptance of this Agreement in any other express or implicit manner shall be deemed to have read and agreed to be bound by this Agreement.
General Working of a Web Application Firewall (WAF) A Web Application Firewall (WAF) acts as…
How to Send POST Requests Using curl in Linux If you work with APIs, servers,…
If you are a Linux user, you have probably seen commands like chmod 777 while…
Vim and Vi are among the most powerful text editors in the Linux world. They…
Working with compressed files is a common task for any Linux user. Whether you are…
In the digital era, an email address can reveal much more than just a contact…