Introduction Edit

Zscript is a programming language created by Alien X (Jeb K) in 1998. It is featured in many Regeneration Corporation programs such as Ghost Samurai[1], CPS[2], and many more programs. In 2010, it was considered a legitimate programming language for penetration testing and user hacks. Many programmers in the BCIS[3] and BSD[4] used Zscript to activate in-game services on Blockhead, and many other difficult tasks.

Examples Edit

Zscript is always started with >- and ended with <-. Without using this every line of code, the program will be unable to read the script by itself. Several strings are known to local contacts, such as "element' which can be used to ensure will-power to the machine, depending on the high power based off the element usage. Regular C++ or JavaScript injecting codes are still the same, Bool, String, Class, Int, Var, and other things of that nature. The only difference is after stating a "String" a ';' must be placed at the end of each string, or the program will likely crash. Enabling and disabling exploits/hacks/programs can be used by stating "sshe" or "sshc", and a path of program. TRUE and FALSE are also the same. Configuration can be started with "config=VOID (or) NULL=true/false, and then continued configuration lines. Integers can be injected during the code, as well as variables. In the end of each program path "null" must be stated at the end of the paragraph to end the line of programming. After that, "endTask" to shut down the program. DNS can be used to evaluate certain lines of code, as well as HTTP/HTTPS. Firewall and ActiveDirectory is an advanced line of code, which can increase --risk and --level of each injected variable/string. VPN and IPS are enabled, as well as other advanced preferences such as LDAP, Proxy, Telnet, SSH, WAF, VoIP, Whois, Kerberos, and FTP. Vulnerability patches/execution such as Backups, Directory Listing, DNS Active Cache, .DS_Store, GHDB, PHP Code Execution, Insecure Methods, IIS Short Name, Juicy Files, Multiple Choices, SQLi, .Svn, Listing, Leaks, Proxy, Users, ZoneTransfer and HeartBleed, are included. Metadata collection is enabled, such as: Users, Folders, Printers, Software, Emails, Operating Systems, Passwords and Servers. There is diffidently more to learn about Zscript, but likely very little is known as of 2017.

References Edit

Community content is available under CC-BY-SA unless otherwise noted.