JYso is 404Team 404StarLink 2.0 One of the components, If you have any questions about JYso or want to find partners to communicate, you can refer to the way of joining the group of Starlink Project.
Please check out the wiki.
You can download the latest version of releases from here.
It can be either a JNDIExploit or a ysoserial.
Is there a possibility of incorporating machine learning?
This tool is only intended for self-check and security purposes.
The user is solely responsible for any direct or indirect consequences and losses arising from the dissemination or use of the information provided by this tool. The author shall not be held liable for any such consequences.
I have the right to modify and interpret this tool. Without permission from the cybersecurity department or relevant authorities, it is prohibited to misuse this tool for any attack activities, and it must not be used for commercial purposes in any way.
- https://github.com/veracode-research/rogue-jndi
- https://github.com/welk1n/JNDI-Injection-Exploit
- https://github.com/welk1n/JNDI-Injection-Bypass
- https://github.com/WhiteHSBG/JNDIExploit
- https://github.com/su18/ysoserial
- https://github.com/rebeyond/Behinder
- https://t.zsxq.com/17LkqCzk8
- https://mp.weixin.qq.com/s/fcuKNfLXiFxWrIYQPq7OCg
- https://xz.aliyun.com/t/11640?time__1311=mqmx0DBDuDnQ340vo4%2BxCwg%3DQai%3DYzaq4D&alichlgref=https%3A%2F%2Fxz.aliyun.com%2Fu%2F8697
- https://archive.conference.hitb.org/hitbsecconf2021sin/sessions/make-jdbc-attacks-brilliant-again/
- https://tttang.com/archive/1405/#toc_0x03-jdbc-rce
- https://xz.aliyun.com/t/10656?time__1311=mq%2BxBDy7G%3DLOD%2FD0DoYg0%3DDR0HG8KeD&alichlgref=https%3A%2F%2Ftttang.com%2F#toc-7
- https://whoopsunix.com/docs/PPPYSO/advance/UTFMIX/
- https://github.com/Whoopsunix/utf-8-overlong-encoding