# qiling > Multi-platform binary emulation framework — emulate PE, ELF, shellcode across OS/arch combinations **Category:** [[categories/statically-analyze-code-general|Statically Analyze Code > General]] | **Tier:** Rich (FOR610) **Docs:** [https://docs.remnux.org/discover-the-tools/statically+analyze+code/general](https://docs.remnux.org/discover-the-tools/statically+analyze+code/general) ## Usage ```bash python3 -c "from qiling import Qiling; ql = Qiling([''], '/path/to/rootfs')" ``` ## Workflows - [[workflows/unpacking-workflow|Unpacking Packed Executables]] — Step 3: Emulation-Based Unpacking ## Related Tools - [[tools/cutter|Cutter]] — Open-source reverse engineering platform — Qt-based GUI for - [[tools/ghidra|Ghidra]] — Open-source disassembler and decompiler from NSA with script - [[tools/objdump|objdump]] — Disassemble binary files. - [[tools/vivisect|Vivisect]] — Binary analysis and emulation framework — static analysis wi #emulation #multi-platform #binary-analysis