CTF Support
Toggle Dark/Light/Auto mode Toggle Dark/Light/Auto mode Toggle Dark/Light/Auto mode Back to homepage

Shellcode

Introduction

Shellcode is small executable machine code, often used in exploitation or CTF challenges. Instead of running it directly (which can crash your system), debugging tools enable safe inspection of its behavior.

Quick Reference

  • Use BlobRunner to harness shellcode for debugging.
  • Load shellcode inside a sandboxed VM or emulator (e.g., QEMU, VirtualBox).
  • Disassemble and inspect flow using Ghidra or Radare2.

Tools

Tool Purpose
BlobRunner Run and debug shellcode safely inside a Windows process
Immunity Debugger Debug shellcode in Windows sandbox environment
x64dbg Visual debugger for injecting and analyzing payloads
Ghidra Disassemble and analyze shellcode statically

Example: Debugging with BlobRunner

BlobRunner.exe shellcode.bin

This loads the shellcode into a simple harness program so you can attach x64dbg or Immunity Debugger for step‑by‑step analysis.