Thursday, 20 August 2020

OWASP-ZSC: A Shellcode/Obfuscate Customized Code Generating Tool


About OWASP-ZSC
   OWASP ZSC is open source software written in python which lets you generate customized shellcodes and convert scripts to an obfuscated script. This software can be run on Windows/Linux/OSX with Python 2 or 3.

   What is shellcode?: Shellcode is a small codes in Assembly language which could be used as the payload in software exploitation. Other usages are in malwares, bypassing antiviruses, obfuscated codes...

   You can read more about OWASP-ZSC in these link:
Why use OWASP-ZSC?
   Another good reason for obfuscating files or generating shellcode with OWASP-ZSC is that it can be used during your pen-testing. Malicious hackers use these techniques to bypass anti-virus and load malicious files in systems they have hacked using customized shellcode generators. Anti-virus work with signatures in order to identify harmful files. When using very well known encoders such as msfvenom, files generated by this program might be already flagged by Anti-virus programs.

   Our purpose is not to provide a way to bypass anti-virus with malicious intentions, instead, we want to provide pen-testers a way to challenge the security provided by Anti-virus programs and Intrusion Detection systems during a pen test.In this way, they can verify the security just as a black-hat will do.

   According to other shellcode generators same as Metasploit tools and etc, OWASP-ZSC  using new encodes and methods which antiviruses won't detect. OWASP-ZSC encoders are able to generate shell codes with random encodes and that allows you to generate thousands of new dynamic shellcodes with the same job in just a second, that means, you will not get the same code if you use random encodes with same commands, And that make OWASP-ZSC one of the best! During the Google Summer of Code we are working on to generate Windows Shellcode and new obfuscation methods. We are working on the next version that will allow you to generate OSX.

OWASP-ZSC Installation:
   You must install Metasploit and Python 2 or 3 first:
  • For Debian-based distro users: sudo apt install python2 python3 metasploit-framework
  • For Arch Linux based distro users: sudo pacman -S python2 python3 metasploit
  • For Windows users: Download Python and Metasploit here.
   And then, enter these command (If you're Windows user, don't enter sudo):
DISCLAIMER: THIS SOFTWARE WAS CREATED TO CHALLENGE ANTIVIRUS TECHNOLOGY, RESEARCH NEW ENCRYPTION METHODS, AND PROTECT SENSITIVE OPEN SOURCE FILES WHICH INCLUDE IMPORTANT DATA. CONTRIBUTORS AND OWASP FOUNDATION WILL NOT BE RESPONSIBLE FOR ANY ILLEGAL USAGE.

An example of OWASP-ZSC

More info


  1. Hacking Tools Windows
  2. Hacking Apps
  3. Pentest Tools Online
  4. Hak5 Tools
  5. Hacking Tools For Windows Free Download
  6. Hack Tools For Games
  7. Pentest Tools List
  8. Hacker Tools Apk Download
  9. Free Pentest Tools For Windows
  10. Nsa Hack Tools Download
  11. Black Hat Hacker Tools
  12. How To Hack
  13. Hacker Tools Windows
  14. Pentest Tools Android
  15. Game Hacking
  16. Hacking Tools Kit
  17. Hacker Tools Github
  18. Pentest Tools Alternative
  19. Blackhat Hacker Tools
  20. Hackers Toolbox
  21. Pentest Tools Kali Linux
  22. Hack App
  23. Hack Tools 2019
  24. Free Pentest Tools For Windows
  25. Best Pentesting Tools 2018
  26. Android Hack Tools Github
  27. Pentest Tools Website
  28. Hack Tools For Ubuntu
  29. Pentest Tools For Mac
  30. Hacking Tools Software
  31. Pentest Tools Port Scanner
  32. Hacking Tools For Mac
  33. New Hack Tools
  34. Hack App
  35. Pentest Tools Subdomain
  36. Hacker Tool Kit
  37. Hacking Tools 2020
  38. Hacking Tools Windows
  39. Pentest Tools Linux
  40. Hackrf Tools
  41. Hacker Tools List
  42. Hacker Hardware Tools
  43. Pentest Tools Website Vulnerability
  44. Hacking Tools 2019
  45. Hacker Tool Kit
  46. Underground Hacker Sites
  47. Hacking Tools Kit
  48. Hacking Tools For Windows 7
  49. Hackers Toolbox
  50. Hack App
  51. Pentest Tools Website Vulnerability
  52. Pentest Tools Bluekeep
  53. Hacker Tools Hardware
  54. Hack App
  55. Pentest Tools Tcp Port Scanner
  56. Pentest Tools Website
  57. Hack Tools For Ubuntu
  58. Hak5 Tools
  59. Hacker Tools Linux
  60. Wifi Hacker Tools For Windows
  61. Wifi Hacker Tools For Windows
  62. Hacker
  63. Pentest Tools Free
  64. Pentest Tools Website Vulnerability
  65. Hacker Tools Linux
  66. Hacker Tools Linux
  67. Tools For Hacker
  68. Hacker Tools Apk
  69. Termux Hacking Tools 2019
  70. Pentest Tools Port Scanner
  71. Pentest Tools Open Source
  72. Pentest Tools For Mac
  73. Hacking Tools Name
  74. Best Pentesting Tools 2018
  75. Hacker Tools Hardware
  76. Pentest Tools Url Fuzzer
  77. Hack Tools For Windows
  78. Hacker Tools Hardware
  79. Tools For Hacker
  80. Pentest Tools Port Scanner
  81. Hack Tools For Windows
  82. Pentest Tools For Windows
  83. Hacking Tools Kit
  84. Black Hat Hacker Tools
  85. Hack Apps
  86. Hacker Techniques Tools And Incident Handling
  87. Hacker Search Tools
  88. Pentest Box Tools Download
  89. Tools For Hacker
  90. Hacking Tools 2020
  91. Hacks And Tools
  92. Hacking Tools Free Download
  93. Hacking Apps
  94. Pentest Tools Review
  95. Pentest Tools Windows
  96. Hacker Tools
  97. Pentest Tools Port Scanner
  98. Pentest Tools For Ubuntu
  99. Hacker Tools Mac
  100. Hacker Tools
  101. Hacking Tools For Windows
  102. Pentest Tools Nmap
  103. Pentest Tools Nmap
  104. Hacking Tools And Software
  105. Pentest Reporting Tools
  106. Hacker Tools Mac
  107. Underground Hacker Sites
  108. Pentest Tools Open Source
  109. Pentest Tools Bluekeep
  110. Hacker Tools 2020
  111. Github Hacking Tools

No comments:

Post a Comment