# runsc32 > Execute extracted shellcode for dynamic analysis **Category:** [[categories/dynamically-reverse-engineer-code-shellcode|Dynamically Reverse-Engineer Code > Shellcode]] | **Tier:** Rich (FOR610) **Docs:** [https://docs.remnux.org/discover-the-tools/dynamically+reverse-engineer+code/shellcode](https://docs.remnux.org/discover-the-tools/dynamically+reverse-engineer+code/shellcode) ## Usage ```bash runsc32 -f shellcode.bin -o 0x3B -d qa.doc ``` ## Related Tools - [[tools/libemu|libemu]] — A library for x86 code emulation and shellcode detection. - [[tools/scdbgc|scdbgc]] — Shellcode emulator — analyze shellcode behavior through API- - [[tools/shcode2exe|shcode2exe]] — Convert raw shellcode to a Windows PE executable for analysi - [[tools/shellcode2exe-bat|shellcode2exe-bat]] — Convert 32 and 64-bit shellcode to a Windows executable file ## FOR610 **Labs:** 3.5, 4.6 **Sections:** 3, 4 #shellcode #execution #dynamic-analysis