Skip to content
Ali Razmjoo edited this page Dec 15, 2023 · 12 revisions

What is OWASP ZSC ?

OWASP ZeroDay Cyber Research Shellcoder [Generator] is an open source software in python language which lets you generate customized shellcodes for listed operation systems. This software can be run on Linux/OSX under python [2.x and 3.x compatible].

main

Usage of shellcodes

Shellcodes are small codes in assembly which could be use as the payload in software exploiting. Other usages are in malwares, bypassing antiviruses, obfuscated codes and etc.

Why use OWASP ZSC ?

According to other shellcode generators same as metasploit tools and etc, OWASP ZSC using new encodes and methods which antiviruses won't detect. OWASP ZSC encoderes are able to generate shellcodes with random encodes and that's lets you to get thousands new dynamic shellcodes with same job in just a second,that means you will not get a same code if you use random encodes with same commands, And that make OWASP ZSC one of the bests! otherwise it's gonna generate shellcodes for many operation systems in next versions.

Installation

Go to download page, and download last version in github. Extract and run installer.py, then you are able to run software with OWASP ZSC command or you can directly execute zsc.py without installing it.or you can follow these commands to install the last version:

wget https://github.com/Ali-Razmjoo/OWASP-ZSC/archive/master.zip -O owasp-zsc.zip && unzip owasp-zsc.zip && rm -rf owasp-zsc.zip && mv OWASP-ZSC-master owasp-zsc && cd owasp-zsc && python installer.py

API

http://api.z3r0d4y.com/v2/?api_name=zsc&payload=show_all
  • Search in payloads
http://api.z3r0d4y.com/v2/?api_name=zsc&payload=show_all&limit=windows
  • Generating shellcode
http://api.z3r0d4y.com/v2/?api_name=zsc&payload=windows_x86/add_admin/none&input=user~~~pass
http://api.z3r0d4y.com/v2/?api_name=zsc&payload=windows_x86/add_admin/xor_0x41424344&input=user~~~pass
  • Generating obfuscate code
http://api.z3r0d4y.com/v2/
POST: api_name=zsc&payload=perl/simple_hex&input=print%20%22a%22%3B%0Aif%20%281%3D%3D1%29%7B%0Aprint%20%22b%22%3B%0A%7D

Maintainer: https://www.secologist.com/

Clone this wiki locally