OWASP-ZSC
Help Menu
zsc> helpGenerate Shellcode
zsc> shellcode
zsc> generateGenerate Linux Shellcode
zsc/shellcode/generate/> linux_x86Generate system("/bin/sh") payload with no encoders
zsc/shellcode/generate/linux_x86> systemzsc/shellcode/generate/linux_x86/system> command_to_executecommand_to_execute> /bin/shzsc/shellcode/generate/linux_x86/system/encode_type> zsc/shellcode/generate/linux_x86/system/encode_type> noneOutput assembly code?(y or n)> yOutput shellcode to screen?(y or n)> yShellcode output to a .c file?(y or n)> nGenerate system("/bin/sh") with xor_random encoder
python3 zsc.py -p linux_x86/system/xor_random -i /bin/shSearch for Shell_Storm Shell Code
python3 zsc.py --shell-storm search 'linux/x86 bind 1337'
Download the shellcode
python3 zsc.py --shell-storm download 882Obsfucate the Exploit
zsc> helpzsc> obfuscatezsc/obfuscate> pythonfilename> /home/l3mon/Desktop/hello.pyencode> simple_base64_rev
Last updated
Was this helpful?