Back to Terminal

RedLang

A custom systems programming language designed for security research, featuring a full LLVM-based compiler and built-in low-level system primitives.

Project Status: Closed Source / Private PreviewThis project is currently in private development. Source code will be released in a future update.
View Documentation on GitHub

01. Compiler Architecture

RedLang compiles directly to native machine code using the LLVM backend. It introduces first-class support for shellcode generation, memory manipulation, and anti-analysis techniques.

  • LLVM BackendOptimized native code generation for x86_64 and ARM64.
  • Memory SafetyOptional borrow checker for secure tool development.
  • AI Code GenIntegrated LLM support for rapid security tool prototyping.
COMPILER: LLVM 18
TARGET: x86_64-unknown-linux-gnu
OPTIMIZATION: -O3

Language Server

Full LSP implementation providing autocomplete, go-to-definition, and real-time error checking in VS Code.

Security Primitives

Built-in keywords for ROP chains, code execution, and syscall invocation.

Cross-Compilation

Seamlessly compile for Windows, Linux, and macOS from a single codebase.

02. Syntax Preview

RedLang syntax is inspired by Rust and C++, but simplified for rapid development of security tools.

fn main() {
    // Define shellcode buffer
    let shellcode: [u8; 4] = [0x90, 0x90, 0xCC, 0xC3];
    
    // Allocate executable memory
    let mem = unsafe { mmap(0, 4096, PROT_EXEC | PROT_READ | PROT_WRITE) };
    
    // Copy shellcode
    memcpy(mem, shellcode, 4);
    
    // Execute
    let func: fn() = cast(mem);
    func();
}