# runsc32 # Execute extracted shellcode for dynamic analysis # FOR610 Labs: 3.5, 4.6 | Sections: 3, 4 # Docs: https://docs.remnux.org/discover-the-tools/dynamically+reverse-engineer+code/shellcode % shellcode, execution, dynamic-analysis # Basic usage runsc32 -f shellcode.bin -o 0x3B -d qa.doc