# shcode2exe > Convert raw shellcode to a Windows PE executable for analysis in disassemblers **Category:** [[categories/dynamically-reverse-engineer-code-shellcode|Dynamically Reverse-Engineer Code > Shellcode]] | **Tier:** Rich (FOR610) **Docs:** [https://docs.remnux.org/discover-the-tools/dynamically+reverse-engineer+code/shellcode](https://docs.remnux.org/discover-the-tools/dynamically+reverse-engineer+code/shellcode) ## Usage ```bash shcode2exe ``` ## Recipes - [[recipes/shellcode-to-exe|Convert Shellcode to Executable]] ## Workflows - [[workflows/shellcode-analysis-workflow|Shellcode Analysis]] — Step 5: Conversion to EXE ## Related Tools - [[tools/libemu|libemu]] — A library for x86 code emulation and shellcode detection. - [[tools/runsc32|runsc32]] — Execute extracted shellcode for dynamic analysis - [[tools/scdbgc|scdbgc]] — Shellcode emulator — analyze shellcode behavior through API- - [[tools/shellcode2exe-bat|shellcode2exe-bat]] — Convert 32 and 64-bit shellcode to a Windows executable file #shellcode #conversion #pe