OWASP-ZSC: A Shellcode/Obfuscate Customized Code Generating Tool

Advertisement

About OWASP-ZSC
   OWASP ZSC is open source software written in python which lets you generate customized shellcodes and convert scripts to an obfuscated script. This software can be run on Windows/Linux/OSX with Python 2 or 3.

   What is shellcode?: Shellcode is a small codes in Assembly language which could be used as the payload in software exploitation. Other usages are in malwares, bypassing antiviruses, obfuscated codes...

   You can read more about OWASP-ZSC in these link:
Why use OWASP-ZSC?
   Another good reason for obfuscating files or generating shellcode with OWASP-ZSC is that it can be used during your pen-testing. Malicious hackers use these techniques to bypass anti-virus and load malicious files in systems they have hacked using customized shellcode generators. Anti-virus work with signatures in order to identify harmful files. When using very well known encoders such as msfvenom, files generated by this program might be already flagged by Anti-virus programs.

   Our purpose is not to provide a way to bypass anti-virus with malicious intentions, instead, we want to provide pen-testers a way to challenge the security provided by Anti-virus programs and Intrusion Detection systems during a pen test.In this way, they can verify the security just as a black-hat will do.

   According to other shellcode generators same as Metasploit tools and etc, OWASP-ZSC  using new encodes and methods which antiviruses won't detect. OWASP-ZSC encoders are able to generate shell codes with random encodes and that allows you to generate thousands of new dynamic shellcodes with the same job in just a second, that means, you will not get the same code if you use random encodes with same commands, And that make OWASP-ZSC one of the best! During the Google Summer of Code we are working on to generate Windows Shellcode and new obfuscation methods. We are working on the next version that will allow you to generate OSX.

OWASP-ZSC Installation:
   You must install Metasploit and Python 2 or 3 first:
  • For Debian-based distro users: sudo apt install python2 python3 metasploit-framework
  • For Arch Linux based distro users: sudo pacman -S python2 python3 metasploit
  • For Windows users: Download Python and Metasploit here.
   And then, enter these command (If you're Windows user, don't enter sudo):
DISCLAIMER: THIS SOFTWARE WAS CREATED TO CHALLENGE ANTIVIRUS TECHNOLOGY, RESEARCH NEW ENCRYPTION METHODS, AND PROTECT SENSITIVE OPEN SOURCE FILES WHICH INCLUDE IMPORTANT DATA. CONTRIBUTORS AND OWASP FOUNDATION WILL NOT BE RESPONSIBLE FOR ANY ILLEGAL USAGE.

An example of OWASP-ZSC
More info
  1. Hacker Tools For Windows
  2. Hack Tools Mac
  3. Hacking Tools And Software
  4. Hacking Tools For Beginners
  5. Hacking Tools For Windows
  6. Hacking Tools Github
  7. Pentest Tools Framework
  8. Hack Tools
  9. Hacking Apps
  10. Hacker Tools List
  11. Pentest Tools Linux
  12. Hacking Tools Download
  13. How To Install Pentest Tools In Ubuntu
  14. Hacking Tools Windows
  15. Pentest Tools Review
  16. Hacker Tools Linux
  17. Best Hacking Tools 2019
  18. Blackhat Hacker Tools
  19. Nsa Hacker Tools
  20. New Hacker Tools
  21. Kik Hack Tools
  22. Hacker Tool Kit
  23. Blackhat Hacker Tools
  24. Pentest Tools Online
  25. Pentest Box Tools Download
  26. Hack Tool Apk No Root
  27. Beginner Hacker Tools
  28. Hacker Tools List
  29. Nsa Hack Tools
  30. Black Hat Hacker Tools
  31. Hacker Tools For Ios
  32. Pentest Tools Alternative
  33. Pentest Recon Tools
  34. Pentest Tools Alternative
  35. Pentest Tools Linux
  36. Hacker Tools Online
  37. Hacking Tools Hardware
  38. Hacking Tools Usb
  39. Hacking Tools For Windows 7
  40. Hacking Tools For Windows 7
  41. Hacker Search Tools
  42. Pentest Automation Tools
  43. Hacker Tool Kit
  44. New Hacker Tools
  45. Hacker Tools Free
  46. Hacker Tools Online
  47. Pentest Box Tools Download
  48. Pentest Tools Subdomain
  49. Pentest Tools For Windows
  50. Hacker Techniques Tools And Incident Handling
  51. Pentest Tools Download
  52. Pentest Tools Find Subdomains
  53. Hack Tools Pc
  54. Ethical Hacker Tools
  55. Pentest Tools Find Subdomains
  56. Hack Tools Github
  57. Hacking Tools For Windows 7
  58. Pentest Tools Bluekeep
  59. Underground Hacker Sites

Arsip Blog

Copyright © 2009 - - Kiamat | Coin Free Faucet Claim | Firebug Theme by Blog Oh! Blog | Converted to Blogger Template by ThemeLib.com | Jasa Promosi Online - Tukar Link Gratis