Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/qi4l/jyso
JNDIExploit or a ysoserial.
https://github.com/qi4l/jyso
attack gadget java jndi jndi-injection ldap mem-shell middleware-echo rmi web-security ysoserial
Last synced: 5 days ago
JSON representation
JNDIExploit or a ysoserial.
- Host: GitHub
- URL: https://github.com/qi4l/jyso
- Owner: qi4L
- License: gpl-3.0
- Created: 2022-07-04T02:52:14.000Z (over 2 years ago)
- Default Branch: main
- Last Pushed: 2024-10-27T14:27:57.000Z (3 months ago)
- Last Synced: 2024-10-29T15:38:41.814Z (3 months ago)
- Topics: attack, gadget, java, jndi, jndi-injection, ldap, mem-shell, middleware-echo, rmi, web-security, ysoserial
- Language: Java
- Homepage:
- Size: 265 MB
- Stars: 1,539
- Watchers: 67
- Forks: 184
- Open Issues: 0
-
Metadata Files:
- Readme: README.en.md
- License: LICENSE.txt
Awesome Lists containing this project
README
JYso
It can be used as a tool for ysoserial and JNDIExploit at the same time, and has the bypass function of multiple JNDI high versions, WAF, and RASP
## π Getting Started Guide
π’ Please take a moment to read this document, it will help you quickly get familiar with JYso!
π§ Use the Documentation [Wiki](https://github.com/qi4L/JYso/wiki).
β Download the latest version of [Releases](https://github.com/qi4L/JYso/releases).
## π Features
+ JNDI account password startup
+ JNDI route hiding or encryption
+ JNDI high version Bypass
+ Customize the path, password, HTTP header and value of the memory horse
+ Memory horse supports [Fileless landing Agent insertion](https://xz.aliyun.com/t/10075?time__1311=mq%2BxBD9QDQe4yDBkPoN%2BuDAO%3DnB5x&alichlgref=https%3A%2F%2Fxz.aliyun.com%2Fsearch%3Fkeyword%3Drebeyond)
+ Memory horse writes JRE or environment variables to hide
+ Serialized data plus dirty data
+ [Serialized data is encoded in UTF-8 corresponding to 3 bytes](https://whoopsunix.com/docs/PPPYSO/advance/UTFMIX/)
+ TemplatesImpl _bytecodes feature eliminated and size reduced
+ SignedObject secondary deserialization, can be used to bypass TemplatesImpl blacklist, CC without array and blacklist often seen in CTF, etc.
+ Solve the problem of Shiro Header being too long, get the value of the specified parameter from the request for class loading
+ Dynamically generate obfuscated class names
+ MSF/CS online
+ Code execution through JDBCIf you have other great ideas, please let me know! π
## π― Compile
Download gradle8.7+ and configure it in the global environment variable, and execute it in the project root directory
```shell
./gradlew shadowJar
```## π²Directory structure
For more information, please refer to [Directory structure description](docs/directory_structure.md).
## β¨ CTStack
JYso has joined the [CTStack](https://stack.chaitin.com/tool/detail/1303) community
## β¨ 404StarLink 2.0 - Galaxy
JYso is a member of the 404Team [404StarLink 2.0](https://github.com/knownsec/404StarLink). If you have questions about JYso or want to find a partner to communicate, you can refer to the Starlink group project.
+ https://github.com/knownsec/404StarLink2.0-Galaxy#community
1. [ε ₯ι2024εΉ΄KConε ΅ε¨θ°±](https://kcon.knownsec.com/index.php?s=bqp&c=category&id=3)
## π· Acknowledgements
- https://github.com/veracode-research/rogue-jndi
- https://github.com/welk1n/JNDI-Injection-Exploit
- https://github.com/welk1n/JNDI-Injection-Bypass
- https://github.com/WhiteHSBG/JNDIExploit
- https://github.com/su18/ysoserial
- https://github.com/rebeyond/Behinder
- https://github.com/Whoopsunix/utf-8-overlong-encoding
- https://github.com/mbechler/marshalsec
- https://t.zsxq.com/17LkqCzk8
- https://mp.weixin.qq.com/s/fcuKNfLXiFxWrIYQPq7OCg
- https://xz.aliyun.com/t/11640?time__1311=mqmx0DBDuDnQ340vo4%2BxCwg%3DQai%3DYzaq4D&alichlgref=https%3A%2F%2Fxz.aliyun.com%2Fu%2F8697
- https://archive.conference.hitb.org/hitbsecconf2021sin/sessions/make-jdbc-attacks-brilliant-again/
- https://tttang.com/archive/1405/#toc_0x03-jdbc-rce
- https://xz.aliyun.com/t/10656?time__1311=mq%2BxBDy7G%3DLOD%2FD0DoYg0%3DDR0HG8KeD&alichlgref=https%3A%2F%2Ftttang.com%2F#toc-7
- https://whoopsunix.com/docs/PPPYSO/advance/UTFMIX/
- https://tttang.com/archive/1405/#toc_groovyclassloader
- https://xz.aliyun.com/t/10656?time__1311=mq%2BxBDy7G%3DLOD%2FD0DoY4AKqiKD%3DOQjqx&alichlgref=https%3A%2F%2Ftttang.com%2F
- https://www.leavesongs.com/PENETRATION/use-tls-proxy-to-exploit-ldaps.html
- https://tttang.com/archive/1405/#toc_druid