Add markdown wiki with 473 pages and zk browser

Generate interlinked wiki from master inventory: 397 tool pages,
15 workflow pages, 27 recipe pages, 33 category pages, plus index.
All pages use [[wiki-links]] for cross-navigation between tools,
workflows, recipes, and categories (1782 links total).

Install zk for interactive browsing with fzf search, tag filtering,
and backlink discovery. Add 'fhelp wiki' command and Makefile target.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
This commit is contained in:
tobias
2026-03-28 19:50:36 +01:00
parent b13db23a5e
commit e62a14dafc
478 changed files with 7683 additions and 5 deletions
+33
View File
@@ -0,0 +1,33 @@
# scdbgc
> Shellcode emulator — analyze shellcode behavior through API-level emulation
**Category:** [[categories/dynamically-reverse-engineer-code-shellcode|Dynamically Reverse-Engineer Code > Shellcode]] | **Tier:** Rich (FOR610)
**Docs:** [https://docs.remnux.org/discover-the-tools/dynamically+reverse-engineer+code/shellcode](https://docs.remnux.org/discover-the-tools/dynamically+reverse-engineer+code/shellcode)
## Usage
```bash
scdbgc /f shellcode.bin /s -1
scdbgc /f shellcode.bin /foff 0x3B /fopen qa.doc
scdbgc /f shellcode.bin /s -1 /norw
```
## Recipes
- [[recipes/office-full-decode-chain|Full Office Macro Decode Chain]]
- [[recipes/rtf-shellcode-extraction|Extract Shellcode from RTF Document]]
- [[recipes/shellcode-emulate-with-offset|Emulate Shellcode at Specific Offset]]
## Workflows
- [[workflows/document-analysis-workflow|Malicious Document Analysis]] — Step 6: Embedded Object Analysis
- [[workflows/shellcode-analysis-workflow|Shellcode Analysis]] — Step 3: Emulation
## Related Tools
- [[tools/libemu|libemu]] — A library for x86 code emulation and shellcode detection.
- [[tools/runsc32|runsc32]] — Execute extracted shellcode for dynamic analysis
- [[tools/shcode2exe|shcode2exe]] — Convert raw shellcode to a Windows PE executable for analysi
- [[tools/shellcode2exe-bat|shellcode2exe-bat]] — Convert 32 and 64-bit shellcode to a Windows executable file
## FOR610
**Labs:** 3.4, 3.5, 4.6
**Sections:** 3, 4
#shellcode #emulation #api-calls