Shellcode is like a virus and a program a cell. While a cell can be executed a virus needs a cell to run. Your best bet is to inject the shellcode into a virtual instance of an exploitable program and step though it. Shellcode by definition cant be run outside of a vulnerability. Web Design|PAKKA Web Designers