sábado, 22 de agosto de 2020

OWASP-ZSC: A Shellcode/Obfuscate Customized Code Generating Tool


About OWASP-ZSC
   OWASP ZSC is open source software written in python which lets you generate customized shellcodes and convert scripts to an obfuscated script. This software can be run on Windows/Linux/OSX with Python 2 or 3.

   What is shellcode?: Shellcode is a small codes in Assembly language which could be used as the payload in software exploitation. Other usages are in malwares, bypassing antiviruses, obfuscated codes...

   You can read more about OWASP-ZSC in these link:
Why use OWASP-ZSC?
   Another good reason for obfuscating files or generating shellcode with OWASP-ZSC is that it can be used during your pen-testing. Malicious hackers use these techniques to bypass anti-virus and load malicious files in systems they have hacked using customized shellcode generators. Anti-virus work with signatures in order to identify harmful files. When using very well known encoders such as msfvenom, files generated by this program might be already flagged by Anti-virus programs.

   Our purpose is not to provide a way to bypass anti-virus with malicious intentions, instead, we want to provide pen-testers a way to challenge the security provided by Anti-virus programs and Intrusion Detection systems during a pen test.In this way, they can verify the security just as a black-hat will do.

   According to other shellcode generators same as Metasploit tools and etc, OWASP-ZSC  using new encodes and methods which antiviruses won't detect. OWASP-ZSC encoders are able to generate shell codes with random encodes and that allows you to generate thousands of new dynamic shellcodes with the same job in just a second, that means, you will not get the same code if you use random encodes with same commands, And that make OWASP-ZSC one of the best! During the Google Summer of Code we are working on to generate Windows Shellcode and new obfuscation methods. We are working on the next version that will allow you to generate OSX.

OWASP-ZSC Installation:
   You must install Metasploit and Python 2 or 3 first:
  • For Debian-based distro users: sudo apt install python2 python3 metasploit-framework
  • For Arch Linux based distro users: sudo pacman -S python2 python3 metasploit
  • For Windows users: Download Python and Metasploit here.
   And then, enter these command (If you're Windows user, don't enter sudo):
DISCLAIMER: THIS SOFTWARE WAS CREATED TO CHALLENGE ANTIVIRUS TECHNOLOGY, RESEARCH NEW ENCRYPTION METHODS, AND PROTECT SENSITIVE OPEN SOURCE FILES WHICH INCLUDE IMPORTANT DATA. CONTRIBUTORS AND OWASP FOUNDATION WILL NOT BE RESPONSIBLE FOR ANY ILLEGAL USAGE.

An example of OWASP-ZSC
Related posts

  1. Pentest Tools Subdomain
  2. Hacker Tools For Pc
  3. Hacking Tools Software
  4. Pentest Tools Download
  5. Hacking Tools For Games
  6. Pentest Tools Framework
  7. Pentest Tools Review
  8. Pentest Tools Online
  9. Hacker Techniques Tools And Incident Handling
  10. Hacking Tools For Windows Free Download
  11. Pentest Tools For Android
  12. Top Pentest Tools
  13. Hacker Tools Apk
  14. Hacking Tools For Pc
  15. Hacking Tools For Games
  16. Pentest Tools
  17. New Hack Tools
  18. Pentest Tools Find Subdomains
  19. Hack Tools
  20. Best Pentesting Tools 2018
  21. Hacker Tools Apk
  22. Install Pentest Tools Ubuntu
  23. Pentest Tools For Ubuntu
  24. Tools Used For Hacking
  25. Hacking Tools For Beginners
  26. Physical Pentest Tools
  27. Black Hat Hacker Tools
  28. Ethical Hacker Tools
  29. Hack Tool Apk No Root
  30. Hacking Tools Free Download
  31. Hacker Tools
  32. What Is Hacking Tools
  33. Growth Hacker Tools
  34. Hacking Tools Windows 10
  35. Hacker Tools Hardware
  36. Pentest Tools Framework
  37. Usb Pentest Tools
  38. Hacks And Tools
  39. Hacking Tools 2019
  40. Hacking Tools For Windows
  41. Physical Pentest Tools
  42. Pentest Box Tools Download
  43. Hacking Tools For Pc
  44. Hackrf Tools
  45. Hacker Tools
  46. Hacking Tools For Games
  47. Hack Tools For Ubuntu
  48. Hacking Apps
  49. Hackers Toolbox
  50. Hack App
  51. Hack App
  52. Hacker Security Tools
  53. Hack Tools Pc
  54. Easy Hack Tools
  55. Pentest Tools Port Scanner
  56. Hacker Tools Apk Download
  57. Hacking Tools Free Download
  58. Pentest Tools Download
  59. Hack Tools For Windows
  60. Hacking Tools Online
  61. Tools For Hacker
  62. Hack Tools Download
  63. Hacking Tools For Mac
  64. Pentest Box Tools Download
  65. Github Hacking Tools
  66. Pentest Tools Find Subdomains
  67. New Hacker Tools
  68. Pentest Tools Nmap
  69. Bluetooth Hacking Tools Kali
  70. Pentest Tools Tcp Port Scanner
  71. Pentest Tools Alternative
  72. Hacking App
  73. Computer Hacker
  74. Hack Tools For Windows
  75. Hack Tools For Windows
  76. Wifi Hacker Tools For Windows
  77. Easy Hack Tools
  78. Pentest Tools Website Vulnerability
  79. Pentest Tools Kali Linux
  80. Pentest Automation Tools
  81. Hacking Tools Windows
  82. Growth Hacker Tools
  83. Underground Hacker Sites
  84. Hacking Tools Windows
  85. Pentest Tools Port Scanner
  86. Hacking Tools 2020
  87. Hack Apps
  88. Hacker Tools Mac
  89. Termux Hacking Tools 2019
  90. Termux Hacking Tools 2019
  91. Ethical Hacker Tools
  92. Hacker Techniques Tools And Incident Handling
  93. Hacker Tools Github
  94. Pentest Tools Framework
  95. Hacking Tools Download
  96. Pentest Tools Framework
  97. Hacking Tools For Kali Linux
  98. Hacking Tools And Software
  99. Bluetooth Hacking Tools Kali
  100. Hacking Tools Software
  101. Pentest Tools Windows
  102. Hacker Techniques Tools And Incident Handling
  103. Pentest Tools Github
  104. Hacker Techniques Tools And Incident Handling
  105. What Is Hacking Tools
  106. Pentest Tools Github
  107. Hack And Tools
  108. Hacker Tools 2019
  109. Pentest Tools Website
  110. Pentest Tools Linux
  111. Hacker Tools 2020
  112. Hacker Tools Apk
  113. Hacking Tools Github

No hay comentarios:

Publicar un comentario

Seguidores

Archivo del blog