-
-
Notifications
You must be signed in to change notification settings - Fork 216
Home
OWASP ZeroDay Cyber Research Shellcoder [Generator] is an open source software in python language which lets you generate customized shellcodes for listed operation systems. This software can be run on Linux/OSX under python [2.x and 3.x compatible].
Shellcodes are small codes in assembly which could be use as the payload in software exploiting. Other usages are in malwares, bypassing antiviruses, obfuscated codes and etc.
According to other shellcode generators same as metasploit tools and etc, OWASP ZSC using new encodes and methods which antiviruses won't detect. OWASP ZSC encoderes are able to generate shellcodes with random encodes and that's lets you to get thousands new dynamic shellcodes with same job in just a second,that means you will not get a same code if you use random encodes with same commands, And that make OWASP ZSC one of the bests! otherwise it's gonna generate shellcodes for many operation systems in next versions.
Go to download page, and download last version in github. Extract and run installer.py, then you are able to run software with OWASP ZSC command or you can directly execute zsc.py without installing it.or you can follow these commands to install the last version:
wget https://github.com/Ali-Razmjoo/OWASP-ZSC/archive/master.zip -O owasp-zsc.zip && unzip owasp-zsc.zip && rm -rf owasp-zsc.zip && mv OWASP-ZSC-master owasp-zsc && cd owasp-zsc && python installer.py
-
New API URL http://api.z3r0d4y.com/v2
-
All inputs data could in GET or POST Method
-
Show all payloads
http://api.z3r0d4y.com/v2/?api_name=zsc&payload=show_all
- Search in payloads
http://api.z3r0d4y.com/v2/?api_name=zsc&payload=show_all&limit=windows
- Generating shellcode
http://api.z3r0d4y.com/v2/?api_name=zsc&payload=windows_x86/add_admin/none&input=user~~~pass
http://api.z3r0d4y.com/v2/?api_name=zsc&payload=windows_x86/add_admin/xor_0x41424344&input=user~~~pass
- Generating obfuscate code
http://api.z3r0d4y.com/v2/
POST: api_name=zsc&payload=perl/simple_hex&input=print%20%22a%22%3B%0Aif%20%281%3D%3D1%29%7B%0Aprint%20%22b%22%3B%0A%7D
Maintainer: https://www.secologist.com/