This is a BD-J Xlet that launches JAR files transmitted via TCP to a PS5. The Xlet relies on a privilege escalation vulnerability discovered by theflow, which was later reproduced for the PS4 by sleirsgoevy. To escape the Java sandbox, the Xlet uses that vulnerability to disable the security manager using a technique discovered by sleirsgoevy. The JAR loading mechanism is heavily insired by the works of Hammer 83.
Usage example:
john@localhost:~/bdj-sdk/samples/ps5-jar-loader$ make -C hello-jar-loader
john@localhost:~/bdj-sdk/samples/ps5-jar-loader$ export PS5_HOST=<ps5-host>
john@localhost:~/bdj-sdk/samples/ps5-jar-loader$ make -C hello-jar-loader test