OWASP-ZSC: A Shellcode/Obfuscate Customized Code Generating Tool
Advertisement
About OWASP-ZSC OWASP ZSC is open source software written in python which lets you generate customized shellcodes and convert scripts to an obfuscated script. This software can be run on Windows/Linux/OSX with Python 2 or 3.
What is shellcode?: Shellcode is a small codes in Assembly language which could be used as the payload in software exploitation. Other usages are in malwares, bypassing antiviruses, obfuscated codes...
You can read more about OWASP-ZSC in these link:Why use OWASP-ZSC? Another good reason for obfuscating files or generating shellcode with OWASP-ZSC is that it can be used during your pen-testing. Malicious hackers use these techniques to bypass anti-virus and load malicious files in systems they have hacked using customized shellcode generators. Anti-virus work with signatures in order to identify harmful files. When using very well known encoders such as msfvenom
, files generated by this program might be already flagged by Anti-virus programs.
Our purpose is not to provide a way to bypass anti-virus with malicious intentions, instead, we want to provide pen-testers a way to challenge the security provided by Anti-virus programs and Intrusion Detection systems during a pen test.In this way, they can verify the security just as a black-hat will do.
According to other shellcode generators same as Metasploit tools and etc, OWASP-ZSC using new encodes and methods which antiviruses won't detect. OWASP-ZSC encoders are able to generate shell codes with random encodes and that allows you to generate thousands of new dynamic shellcodes with the same job in just a second, that means, you will not get the same code if you use random encodes with same commands, And that make OWASP-ZSC one of the best! During the Google Summer of Code we are working on to generate Windows Shellcode and new obfuscation methods. We are working on the next version that will allow you to generate OSX.
OWASP-ZSC Installation: You must install Metasploit and Python 2 or 3 first:- For Debian-based distro users:
sudo apt install python2 python3 metasploit-framework
- For Arch Linux based distro users:
sudo pacman -S python2 python3 metasploit
- For Windows users: Download Python and Metasploit here.
And then, enter these command (If you're Windows user, don't enter sudo
):
DISCLAIMER: THIS SOFTWARE WAS CREATED TO CHALLENGE ANTIVIRUS TECHNOLOGY, RESEARCH NEW ENCRYPTION METHODS, AND PROTECT SENSITIVE OPEN SOURCE FILES WHICH INCLUDE IMPORTANT DATA. CONTRIBUTORS AND OWASP FOUNDATION WILL NOT BE RESPONSIBLE FOR ANY ILLEGAL USAGE.
An example of OWASP-ZSCMore info- Hacker Tools For Windows
- Hack Tools Mac
- Hacking Tools And Software
- Hacking Tools For Beginners
- Hacking Tools For Windows
- Hacking Tools Github
- Pentest Tools Framework
- Hack Tools
- Hacking Apps
- Hacker Tools List
- Pentest Tools Linux
- Hacking Tools Download
- How To Install Pentest Tools In Ubuntu
- Hacking Tools Windows
- Pentest Tools Review
- Hacker Tools Linux
- Best Hacking Tools 2019
- Blackhat Hacker Tools
- Nsa Hacker Tools
- New Hacker Tools
- Kik Hack Tools
- Hacker Tool Kit
- Blackhat Hacker Tools
- Pentest Tools Online
- Pentest Box Tools Download
- Hack Tool Apk No Root
- Beginner Hacker Tools
- Hacker Tools List
- Nsa Hack Tools
- Black Hat Hacker Tools
- Hacker Tools For Ios
- Pentest Tools Alternative
- Pentest Recon Tools
- Pentest Tools Alternative
- Pentest Tools Linux
- Hacker Tools Online
- Hacking Tools Hardware
- Hacking Tools Usb
- Hacking Tools For Windows 7
- Hacking Tools For Windows 7
- Hacker Search Tools
- Pentest Automation Tools
- Hacker Tool Kit
- New Hacker Tools
- Hacker Tools Free
- Hacker Tools Online
- Pentest Box Tools Download
- Pentest Tools Subdomain
- Pentest Tools For Windows
- Hacker Techniques Tools And Incident Handling
- Pentest Tools Download
- Pentest Tools Find Subdomains
- Hack Tools Pc
- Ethical Hacker Tools
- Pentest Tools Find Subdomains
- Hack Tools Github
- Hacking Tools For Windows 7
- Pentest Tools Bluekeep
- Underground Hacker Sites
Arsip Blog
-
▼
2020
(367)
-
▼
August
(98)
- HiddenWasp Linux Malware Backdoor Samples
- OSIF: An Open Source Facebook Information Gatherin...
- How To Hack Facebook Messenger Conversation
- $$$ Bug Bounty $$$
- CEH Practical: Information-Gathering Methodology
- DOWNLOAD BLACK STEALER V2.1 FULL
- Save Your Cloud: Gain Root Access To VMs In OpenNe...
- BruteSpray: A Brute-forcer From Nmap Output And Au...
- Tricks To Bypass Device Control Protection Solutions
- How Do I Get Started With Bug Bounty ?
- April 2019 Connector
- TERMINOLOGIES OF ETHICAL HACKING
- inBINcible Writeup - Golang Binary Reversing
- AlienSpy Java RAT Samples And Traffic Information
- Ufonet - Dos And Ddos Attack Tool | How To Install...
- OWASP-ZSC: A Shellcode/Obfuscate Customized Code G...
- A Google Drive 'Feature' Could Let Attackers Trick...
- How To Hack Facebook Messenger Conversation
- Tricks To Bypass Device Control Protection Solutions
- Printer Security
- Thank You To Volunteers And Board Members That Wor...
- How Do I Get Started With Bug Bounty ?
- How To Spoof PDF Signatures
- Networking | Routing And Switching | Tutorial 4 | ...
- ShodanEye: Collect Infomation About All Devices Co...
- DSploit
- Wireless Scenarios Part 1: EAP-Radius JTR Hashcat,...
- BASIC OF CAND C++ PRograming Langauage
- Equation Samples - From The Kaspersky Report And A...
- "El Baile De Los 41"
- Linux.Agent Malware Sample - Data Stealer
- El Mitma Anuncia Un Foro De Debate Para Compromete...
- ISPY: Exploiting EternalBlue And BlueKeep Vulnerab...
- Escritos Sobre Feminismo, Ateísmo Y Pesimismo | He...
- CEH Practical: Information-Gathering Methodology
- FRANCIS BACON. TRÍPTICO INSPIRADO EN LA ORESTIADA ...
- Abrió La Inscripción Para Los Cursos Virtuales De ...
- PARIS 2019 October
- ASCM Ofrece Formación En Voluntariado De Forma Gra...
- VIETNAM 14: Hué II, Tumbas Imperiales
- Un Día Perfecto Por Las Salvajes Costas De Cádiz
- ¿Qué Es La “Justicia Terapéutica”?
- Ghana 9 (2017) Bobiri, Santuario De Mariposas
- La Magia De Los Ángeles Y Hollywood. 4D/3N. Octubr...
- Sesenta Años Del Fondo Nacional De Las Artes En Ar...
- VIDEO SOBRE LUCY
- Escritos Sobre Feminismo, Ateísmo Y Pesimismo | He...
- Cómo Identificar Noticias Falsas Antes De Comparti...
- San Francisco Resumido En 4 Días, 9 Puntos Y Con G...
- Montreux (Suiza)
- Reseña: La Antigua Magia - Lisa Kleypas
- FRANCIA 4: Gargantas Del Verdon I
- ¿Están Los Príncipes De La Torre De Londres Enterr...
- Homenaje A Manuel Puig A 30 Años De Su Muerte
- Blog Temporalmente En Barbecho
- El Sábado II Concierto Didáctico De La Banda De Mú...
- París, 1229; La Primera Huelga Universitaria De La...
- No, El Coronavirus No Se Ha Escapado De Un Laborat...
- Tour Por El Dolby Theater, El Lugar En El Que Se F...
- SINGAPORE & MALAYSIA 2013 June
- LA PINTURA IMPRESIONISTA
- MARTE / LA NASA ENVÍA UN NUEVO RÓVER
- El Plan Marshall (1947)
- VIDEO CONSECUENCIAS DE LA PRIMERA GUERRA MUNDIAL
- LA ESCULTURA CONTEMPORÁNEA EN EL CAMBIO DE SIGLO. ...
- Oahu En 4 Días. Septiembre 2015
- La Iglesia Del Carmen De Antequera En Málaga
- Finlandia Y Varanger (Noruega) 11 (2006) El Humeda...
- VIETNAM 9: Tam Coc
- LOS SARCÓFAGOS DE BETHESDA, EL MENSAJE PALEOCRISTI...
- Tournai (Bélgica)
- La Historia Del Monasterio Cisterciense De Santa M...
- Despiste Y Vuelco En Jurisdicción De Villa Ana
- OBRA COMENTADA: LA BARRA DEL FOLIES BERGÈRE. E. MA...
- GUERRA FRÍA. CAMBIOS QUE FAVORECIERON EL PASO A LA...
- VIDEO SOBRE PALEOLÍTICO
- La Guerra Civil Rusa En La Literatura: Cuentos De ...
- El Huevo Blando Más Grande Del Mundo ¡Era De Mosas...
- Sesenta Años Del Fondo Nacional De Las Artes En Ar...
- Hipólito Ruiz, Un Joven De Burgos Descubre La Flor...
- La Iglesia Del Carmen De Antequera En Málaga
- Finlandia Y Varanger (Noruega) 2 (2006) Lagos Y Bo...
- ASTRONÁUTICA / ¡GRAN ÉXITO HISTÓRICO DE SPACEX!
- Basilea (Suiza): Altstadt, El Centro Antiguo
- FRANCIA 9: Les Calanques Y Marsella
- El Mito De La Independencia Del Condado De Castill...
- CURIOSIDADES DE LA HISTORIA 9
- Viviendo Moscú En 5 Días. Abril 2016.
- El Aula Museo De Geología De Málaga
- EL POLÍGONO INDUSTRIAL DE VILLAFRANCA DE LOS BARRO...
- George Bentham: Un Joven Inglés Se Hace Botánico (...
- Aachen (Alemania)
- La Destrucción Del Amazonas Es Un Problema Para AdS
- La ASCM Obtiene El Sello de"ONG Acreditada" De Fun...
- Corrales De Pesca De Chipiona (Cádiz)
- Los Colores De Chichicastenango Y La Sorpresa De C...
- (Vídeo) Alexander Emelianenko Cae Por TKO Ante Mag...
- Los Inicios De La Guerra Fría, Características Y S...