This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP ZSC Tool Project"
From OWASP
Ali Razmjoo (talk | contribs) (→What is OWASP ZSC ?) |
Ali Razmjoo (talk | contribs) (→Description) |
||
Line 32: | Line 32: | ||
Shellcodesare small codes in assembly which could be use as the payload in software exploiting. Other usages are in malwares, bypassing antiviruses, obfuscated codes and etc. | Shellcodesare small codes in assembly which could be use as the payload in software exploiting. Other usages are in malwares, bypassing antiviruses, obfuscated codes and etc. | ||
+ | |||
+ | ====Usage of Obfuscate Codes==== | ||
+ | |||
+ | Can be use for bypassing antiviruses , code protections , same stuff etc … | ||
====Why use OWASP ZSC ?==== | ====Why use OWASP ZSC ?==== | ||
According to other shellcode generators same as metasploit tools and etc, OWASP ZSC using new encodes and methods which antiviruses won't detect. | According to other shellcode generators same as metasploit tools and etc, OWASP ZSC using new encodes and methods which antiviruses won't detect. | ||
− | OWASP ZSC encoderes are able to generate shellcodes with | + | OWASP ZSC encoderes are able to generate shellcodes with random encodes and that's lets you to get thousands new dynamic shellcodes with same job in just a second,that means you will not get a same code if you use random encodes with same commands, And that make OWASP ZSC one of the bests! otherwise it's gonna generate shellcodes for many operation systems in next versions. |
+ | It’s the same story for code obfuscating. | ||
==Licensing== | ==Licensing== |
Revision as of 08:40, 25 January 2016