unicorn framework.
Windows shellcode emulation tool based uponShellcodeEmulator emulates Windows shellcode with the help of windbg process memory dumps. You can provide shellcode to analyze with any Windows process dump image. The tool will emulate as much as of the userland code using the shellcode bytes and the provided dump image.
You can add your custom syscall handlers or any handlers in between the API calls used by shellcode and the kernel layer. This can provide full view of the user stack. It will let you investigate shellcode that bypasses loose API hooks in higher callstack level.
Installation
-
Install WinDbg
-
Install ShellcodeEmulator
pip install git+https://github.com/ohjeongwook/ShellcodeEmulator --upgrade
- Please run following command if you experience any PyKD/WinDbg integration issues
- PyKD has some issues with DLL package distribution.
python -m pykdfix.fix_windbg_files
Usage
> python -m shellcode_emulator.run
Usage: run.py [options] args
Options:
-h, --help show this help message and exit
-b IMAGE_BASE, --image_base=IMAGE_BASE
Image base to load the shellcode inside process memory
-d DUMP_FILENAME, --dump_filename=DUMP_FILENAME
A process dump file from normal Windows process
-l LIST_FILENAME, --list_filename=LIST_FILENAME
A list filename generated by IDA (this can be used
instead of shellcode filename)
Example
- Take process dump from Windows notepad process using Process Explorer and save it as notepad.dmp
- Run wincalc.bin shellcode
python -m shellcode_emulator.run wincalc.bin -d notepad.dmp