ShellCodeEmulator: Shellcode emulator written with Unicorn
Windows shellcode emulation tool based upon unicorn framework
ShellcodeEmulator emulates Windows shellcode with the help of windbg process memory dumps. You can provide shellcode to analyze with any Windows process dump image. The tool will emulate as much as of the userland code using the shellcode bytes and the provided dump image.
You can add your custom syscall handlers or any handlers in between the API calls used by shellcode and the kernel layer. This can provide a full view of the user stack. It will let you investigate shellcode that bypasses loose API hooks in higher callstack level.
Installation
- Install WinDbg
- Install ShellcodeEmulator
pip install git+https://github.com/ohjeongwook/ShellcodeEmulator --upgrade
- Please run following command if you experience any PyKD/WinDbg integration issues
- PyKD has some issues with DLL package distribution.
python -m pykdfix.fix_windbg_files
Usage
Example
- Take process dump from Windows notepad process using Process Explorer and save it as notepad.dmp
- Run wincalc.bin shellcode
python -m shellcode_emulator.run wincalc.bin -d notepad.dmp
Source: https://github.com/ohjeongwook/