Let’s say you’ve dumped the shellcode payload from a malware sample, you’ve dumped it as a binary, it would be nice to be able to execute it and see what it does.
You can do this with scdbg.
Just drag the binary containing your shellcode onto scdbg, leave everything as default and click the Launch button. It’ll show you all the different APIs being called and what it executes, including URLs and command arguments.