OWASP Zsc Tool
Thank you for visiting OWASP.org. We recently migrated our community to a new web platform and regretably the content for this page needed to be programmatically ported from its previous wiki page. There’s still some work to be done. The historical content can be found here.
Please visit our Page Migration Guide for more information about updating pages for the new website as well as examples of github markdown.
This is an example of a Project or Chapter Page.
Main
! '' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together. The OWASP Security Principles are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one. |
FAQs
To see full guides please visit our wiki page.
Help Menu
PLEASE CLICK HERE TO SEE FULL DEVELOPERS AND USERS DOCUMENTS
OWASP ZSC Project
OWASP ZSC is an open source software in Python language which lets you generate customized shellcodes and convert scripts to an obfuscated script. This software can be run on Windows/Linux/OSX under python.
Usage of shellcodes
Shellcodes are small codes in Assembly Languagewhich could be used as the payload in software exploiting. Other usages are in malwares, bypassing anti viruses, obfuscated codes and etc.
Usage of Obfuscate Codes
Can be used for bypassing antiviruses, code protections, same stuff etc …
Why use OWASP ZSC ?
According to other shellcode generators such as Metasploit tools and etc, OWASP ZSC using new encodes and methods which antiviruses won’t detect. OWASP ZSC encoders are able to generate shell codes with random encodes that allows you to generate thousands of new dynamic shell codes with the same job in just a second, it means you will not get the same code if you use random encodes with the same commands, and that makes OWASP ZSC one of the best! OWASP ZSC can generate shellcode for Linux and Windows _x86 Upcoming features will allow generating shellcodes for OSX And new encodes for the code obfuscation.
User Guides
To run OWASP ZSC, You need to install python `2.x|3.x` on your operation system `Windows|Linux|OSX`, Then it could be run directly with executing `zsc.py` or run the software after you installed it! To see the user manuals, Please follow the next steps!
Generating Shellcode
Via `zsc` command, you are able to enter the software [or run python zsc.py if you don’t want to install it], Then you can have a list of menu with entering `help`. You can have your choices with pressing `tab` key on each step. To generate shellcode, you have to type `shellcode` and then press enter, after that, you can see what’s available in `shellcode` section. There is `generate` , `search` and `download` choices in here which use for `generate shellcodes`, `search` and `download` shellcode from shellstorm. To generate a shellcode, type `generate` and press enter, after that with a `tab` key, you can have list of operation systems available in there. With pressing `tab` key again, functions will be shown for you in this step [ such as `exec` ,`systm`,`write` and `etc`]. choose your function by writing the name `example: exec` and press inter. In the next section you have to fill the argv of function which exec() function have one `example: exec(“/bin/bash”)`, all you need in this section is pressing a `tab` and then `enter` key, software will automatically ask you for function argv. Fill them and next section software will ask you for shellcode type which can be `none` or choose one of listed encoding types. After entering that, your shellcode is ready! There is one more way to have a shellcode from software, which is using shellstorm API. Following the `shellcode`, and then `search` commands to search for a shellcode. After that shellcodes will be listed for you with title name , ID and etc. you can download them with following `shellcode` and then `download` command to download them with the ID which shown to you in the past section! For canceling each section, you can use `restart` command to restart the software and start new task!
Generating Obfuscate Code
With the following `obfuscate` command, you can begin the step for obfuscating a code. With a `tab` key , you can see the list of languages along with the obfuscating module ready. After choosing the language software will ask you for a filename which is a filename of file you want to obfuscate that! Next step software will ask you for encode type. With a `tab` key list the encode modules and choose your encode name. your file rewrited and converted to a obfuscate with encode type you chosen. And do not worry about your original code, it’s saved in file as a comment!
Please click HERE to read more!
Requirement / Installation
Installation Go to download page, and download last version in github. Extract and run installer.py, then you are able to run software with OWASP ZSC command or you can directly execute zsc.py without installing it.or you can follow these commands to install the last version:
<nowiki>wget https://github.com/Ali-Razmjoo/OWASP-ZSC/archive/master.zip -O owasp-zsc.zip && unzip owasp-zsc.zip &&
rm -rf owasp-zsc.zip && mv OWASP-ZSC-master owasp-zsc && cd owasp-zsc && python installer.py</nowiki>
http://zsc.z3r0d4y.com/images/Snapshot_2015-07-27_114843.png
Note: Software could be uninstall with executing uninstaller.py
Note: Software installation directory is “/usr/share/owasp-zsc”
Note: OWASP ZSC Tool could be execute on Linux and Python 2.7.x is required.
Road Map and Getting Involved
Roadmap
As of August, 2016, the highest priorities for the next one year are:
- Develop future features list , Add Operation Systems and new encode types
- Planing for activate features
- Build ZSC API
- Find developers to get better performance, quality, optimizing and best improvement in minimum possible time
- Get other people to review the ZSC Tool Project provide feedback
- Incorporate feedback into changes in the Tool Project and the features
- Keep test, developing and updating with best new methods
- Build and update documents in several languages for developers/users guiding
</strong>
Subsequent Releases will add
- Internationalization Support
- Additional Unit Tests
- Automated Regression tests
</strong>
Minimum Viable Product
OWASP ZSC could be improving with handling module features. MVP of this project is build and active the first module which could be usable to generate/encode Shellcode which already some of them [modules] activated.
Highest usage of OWASP ZSC Tool could be when users are able to use all features with best User Interface and API performance. https://www.owasp.org/images/3/33/Zsc.png
Developers
Developers
Architect & Creator: Ali Razmjoo
- Pratik Patel (Google Summer of Code student 2016)
- Akash Trehan (CodeMaxx)
- Paras Chetal (Google Summer of Code candidate 2016)
- Hamid Samani (HAMIDx9)
Testers
- Johanna Curiel
- Brian Beaudry
Be an OWASP ZSC developer
Developers can add new features and if you don’t have an idea but like to develop, you can submit the issue, which software needs to be fix/add/done in HERE.
After fix/add or develop something, please send your pull request and remember that your code must be compatible with python2 and python3. If you have any question you can open an issue or just mail us. do not forget to register on our mailing list.
AND DON’T FORGET TO READ DEVELOPERS DOCUMENTS
Also this GitBook
Project About
NOTOC
Category:OWASP Project Category:OWASP_Breakers Category:OWASP_Code Category:OWASP_Tool Category:OWASP_Download Category:Shellcode
Example
Put whatever you like here: news, screenshots, features, supporters, or remove this file and don’t use tabs at all.