A custom systems programming language designed for security research, featuring a full LLVM-based compiler and built-in low-level system primitives.
RedLang compiles directly to native machine code using the LLVM backend. It introduces first-class support for shellcode generation, memory manipulation, and anti-analysis techniques.
Full LSP implementation providing autocomplete, go-to-definition, and real-time error checking in VS Code.
Built-in keywords for ROP chains, code execution, and syscall invocation.
Seamlessly compile for Windows, Linux, and macOS from a single codebase.
RedLang syntax is inspired by Rust and C++, but simplified for rapid development of security tools.
fn main() {
// Define shellcode buffer
let shellcode: [u8; 4] = [0x90, 0x90, 0xCC, 0xC3];
// Allocate executable memory
let mem = unsafe { mmap(0, 4096, PROT_EXEC | PROT_READ | PROT_WRITE) };
// Copy shellcode
memcpy(mem, shellcode, 4);
// Execute
let func: fn() = cast(mem);
func();
}