Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/owasp/zsc
OWASP ZSC - Shellcode/Obfuscate Code Generator https://www.secologist.com/
https://github.com/owasp/zsc
assembly linux obfuscator osx owasp python shellcode windows
Last synced: 8 days ago
JSON representation
OWASP ZSC - Shellcode/Obfuscate Code Generator https://www.secologist.com/
- Host: GitHub
- URL: https://github.com/owasp/zsc
- Owner: OWASP
- License: other
- Created: 2015-05-18T11:08:39.000Z (over 9 years ago)
- Default Branch: master
- Last Pushed: 2024-03-14T22:19:20.000Z (8 months ago)
- Last Synced: 2024-10-12T20:40:13.437Z (26 days ago)
- Topics: assembly, linux, obfuscator, osx, owasp, python, shellcode, windows
- Language: Python
- Homepage: https://www.secologist.com/
- Size: 3.18 MB
- Stars: 646
- Watchers: 59
- Forks: 217
- Open Issues: 17
-
Metadata Files:
- Readme: readme.md
- Changelog: CHANGELOG.md
- Funding: .github/FUNDING.yml
- License: LICENSE.md
Awesome Lists containing this project
README
OWASP ZSC
=========***THIS SOFTWARE WAS CREATED TO CHALLENGE ANTIVIRUS TECHNOLOGY, RESEARCH NEW ENCRYPTION METHODS, AND PROTECT SENSITIVE OPEN SOURCE FILES WHICH INCLUDE IMPORTANT DATA. CONTRIBUTORS AND OWASP FOUNDATION WILL NOT BE RESPONSIBLE FOR ANY ILLEGAL USAGE.***
OWASP ZSC is open source software written in python which lets you generate customized shellcode and convert scripts to an obfuscated script. This software can be run on Windows/Linux/OSX with python.
* OWASP Page: https://www.owasp.org/index.php/OWASP_ZSC_Tool_Project
* Documents: https://www.gitbook.com/book/ali-razmjoo/owasp-zsc/details
* Home: [https://www.secologist.com/](https://www.secologist.com/)
* Features: http://zsc.z3r0d4y.com/table.html
* Github: https://github.com/Ali-Razmjoo/OWASP-ZSC
* Archive: https://github.com/Ali-Razmjoo/ZCR-Shellcoder-Archive
* Mailing List: https://groups.google.com/d/forum/owasp-zsc
* API: http://api.z3r0d4y.com[![asciicast](https://asciinema.org/a/90674.png)](https://asciinema.org/a/90674)
#### For more information, read the document files in main directory or visit home page.