Provided by: wcc_0.0.2+dfsg-3build5_amd64
wsh - The witchcraft shell
wsh [script] [-h|-q|-v|-V] [binary1] [binary2] ... [-x [script_arg1] [script_arg2] ...]
The Witchcraft Shell is part of the Witchcraft Compiler Collection. The witchcraft shell accepts shared libraries, executables and Witchcraft Shell Scripts written in Punk-C as an input. It loads all the executables in its own address space and make their API available for programming in its embedded interpreter. This provides for binaries functionalities similar to those provided via reflection on interpreted languages like Java. Options: -x, --args Optional script argument separator -q, --quiet Display less output -v, --verbose Display more output -V, --version Display version and build, then exit Script: If the first argument is an existing file which is not a known binary file format, it is assumed to be a lua script and gets executed. Binaries: Any binary file name before the -x tag gets loaded before running the script. The last binary loaded is the main binary analyzed.
The Witchcraft shell calls dlopen() on the shared libraries and executables it loads in its address space. In doing so, it may execute constructor functions from those executables. This may be unsafe if the intent is to analyse hostile code such as malware or binary exploits. The Witcraft Compiler Collection is a set of reverse engineering tools.
Written by endrazine (Jonathan Brossard)
Witchcraft Compiler Collection online bug tracker: <https://github.com/endrazine/wcc/issues>
Copyright Jonathan Brossard License : MIT and BSD Licenses. See <https://github.com/endrazine/wcc/blob/master/LICENSE>.