domingo, 30 de agosto de 2020

OWASP-ZSC: A Shellcode/Obfuscate Customized Code Generating Tool


About OWASP-ZSC
   OWASP ZSC is open source software written in python which lets you generate customized shellcodes and convert scripts to an obfuscated script. This software can be run on Windows/Linux/OSX with Python 2 or 3.

   What is shellcode?: Shellcode is a small codes in Assembly language which could be used as the payload in software exploitation. Other usages are in malwares, bypassing antiviruses, obfuscated codes...

   You can read more about OWASP-ZSC in these link:
Why use OWASP-ZSC?
   Another good reason for obfuscating files or generating shellcode with OWASP-ZSC is that it can be used during your pen-testing. Malicious hackers use these techniques to bypass anti-virus and load malicious files in systems they have hacked using customized shellcode generators. Anti-virus work with signatures in order to identify harmful files. When using very well known encoders such as msfvenom, files generated by this program might be already flagged by Anti-virus programs.

   Our purpose is not to provide a way to bypass anti-virus with malicious intentions, instead, we want to provide pen-testers a way to challenge the security provided by Anti-virus programs and Intrusion Detection systems during a pen test.In this way, they can verify the security just as a black-hat will do.

   According to other shellcode generators same as Metasploit tools and etc, OWASP-ZSC  using new encodes and methods which antiviruses won't detect. OWASP-ZSC encoders are able to generate shell codes with random encodes and that allows you to generate thousands of new dynamic shellcodes with the same job in just a second, that means, you will not get the same code if you use random encodes with same commands, And that make OWASP-ZSC one of the best! During the Google Summer of Code we are working on to generate Windows Shellcode and new obfuscation methods. We are working on the next version that will allow you to generate OSX.

OWASP-ZSC Installation:
   You must install Metasploit and Python 2 or 3 first:
  • For Debian-based distro users: sudo apt install python2 python3 metasploit-framework
  • For Arch Linux based distro users: sudo pacman -S python2 python3 metasploit
  • For Windows users: Download Python and Metasploit here.
   And then, enter these command (If you're Windows user, don't enter sudo):
DISCLAIMER: THIS SOFTWARE WAS CREATED TO CHALLENGE ANTIVIRUS TECHNOLOGY, RESEARCH NEW ENCRYPTION METHODS, AND PROTECT SENSITIVE OPEN SOURCE FILES WHICH INCLUDE IMPORTANT DATA. CONTRIBUTORS AND OWASP FOUNDATION WILL NOT BE RESPONSIBLE FOR ANY ILLEGAL USAGE.

An example of OWASP-ZSC

Related news


  1. Hacking Tools Hardware
  2. Tools 4 Hack
  3. Hacker Tools For Mac
  4. Beginner Hacker Tools
  5. Github Hacking Tools
  6. Hacker Tools For Mac
  7. Hack Tools Pc
  8. Hacker Tools 2020
  9. Termux Hacking Tools 2019
  10. Hacking Tools Windows
  11. Hacking Tools Windows 10
  12. What Are Hacking Tools
  13. Pentest Tools Open Source
  14. Pentest Reporting Tools
  15. Black Hat Hacker Tools
  16. Black Hat Hacker Tools
  17. Pentest Tools For Windows
  18. Hacking Tools Windows
  19. Hack Tools
  20. Pentest Reporting Tools
  21. Hacker Tools For Windows
  22. Hack Tools 2019
  23. Hack App
  24. Pentest Tools Subdomain
  25. Hacker Security Tools
  26. Tools 4 Hack
  27. Hacker
  28. Pentest Tools List
  29. Hacking Tools For Windows
  30. Tools 4 Hack
  31. Hacker Tools
  32. Hackers Toolbox
  33. Hacker Search Tools
  34. Github Hacking Tools
  35. Hackers Toolbox
  36. How To Install Pentest Tools In Ubuntu
  37. Hacking Tools Hardware
  38. Hacking Tools Software
  39. Hack Website Online Tool
  40. Pentest Tools For Windows
  41. Hack Tools Mac
  42. Hack Tools Github
  43. Hacking Tools Windows 10
  44. Hack App
  45. What Is Hacking Tools
  46. Pentest Tools Alternative
  47. Hacking Tools For Pc
  48. Pentest Tools Url Fuzzer
  49. Hacking Tools Software
  50. Pentest Tools For Android
  51. Nsa Hack Tools Download
  52. Hack And Tools
  53. Pentest Tools Alternative
  54. Hacking Tools For Mac
  55. Pentest Tools Linux
  56. Nsa Hack Tools

No hay comentarios:

Publicar un comentario