- /o?
- /w?
- /i?
- /f?
- /s?
- /O?
- /d?
- /F?
- a8?
- aF?
- afm?
- afu?
- afna?
#
radare2
Here are 136 public repositories matching this topic...
trufae
commented
Oct 5, 2021
Read more
Reverse Engineering Resources About All Platforms(Windows/Linux/macOS/Android/iOS/IoT) And Every Aspect! (More than 3500 open source tools and 2300 posts&videos)
reverse-engineering
gdb
windbg
ida-plugin
android-security
frida
idapython
radare2
cuckoo
angr
x64dbg
idapro
dynamorio
binaryninja
binnavi
apk-analysis
intelpt
ghidra
-
Updated
Sep 1, 2021
Radare2 and Frida better together.
-
Updated
Oct 6, 2021 - JavaScript
A curated list of awesome projects, articles and the other materials powered by Radare2
-
Updated
Apr 30, 2020
1
XVilka
commented
Sep 23, 2020
Print the following workflow:
r2 -e io.va=false /bin/ls
[0x000068d0]> pfo elf64
[0x000068d0]> pf.elf_
pf.elf_ident pf.elf_phdr pf.elf_header pf.elf_shdr
[0x000068d0]> pf.elf_ident @ 0
magic : 0x00000000 = "\x7fELF"
class : 0x00000004 = class (enum elf_class) = 0x2 ; ELFCLASS64
data : 0x00000005 = data (enum elf_data) = 0x1 ; ELFDATA2LSB
version : 0x00000006 =
A series of tutorials about radare2 framework from https://www.megabeets.net
-
Updated
Jan 17, 2021 - Python
radare2 plugin - converts asm to pseudo-C code.
-
Updated
Oct 8, 2021 - C
sushant94
commented
Jan 23, 2018
Currently, accessing Bindings in RadecoFunction is not elegant. We should improve support for this. This should also be extended to improve accessing of type and other node information related to these bindings.
Find JNI function signatures in APK and apply to reverse tools.
-
Updated
Mar 23, 2021 - C++
This repo aims at providing practical examples on how to use r2frida
-
Updated
Dec 11, 2020
Hypervisor-Level Debugger based on Radare2 / LibVMI, using VMI IO and debug plugins
-
Updated
Jan 6, 2019 - C
Reversing list
-
Updated
Mar 30, 2021 - Python
Open
Retiring bindings
1
XVilka
commented
Jan 5, 2019
- Python 2 support (ends in one year) - an probably all versions less than 3.4
- PHP5 (support just ended this year) - maybe porting to PHP7?
- Luvit support - 7 years no updates
- Newlisp - 7 years no updates
- Guile - 7 years no updates
- Awk - 6 years no updates (is anyone using them at all?)
Extract labels from IDA, Ghidra, Binary Ninja, and Relyze files and export x64dbg database. Including radare2 main address.
-
Updated
Aug 1, 2021 - Python
Tool to decrypt iOS apps using r2frida
-
Updated
Oct 1, 2021 - Python
Attempt to get ARCore Preview 2 running on unsupported devices
-
Updated
Dec 30, 2017 - Shell
wargio
opened
Jun 8, 2021
mlaferrera
commented
Feb 7, 2018
Stash for Binary Exploitation and Reverse Engineering Resources
-
Updated
Sep 22, 2020
RAIR: RAdare In Rust
rust
framework
static-analysis
reverse-engineering
disassembler
forensics
travis
malware-analysis
exploitation
radare2
radare
libr
-
Updated
Apr 27, 2021 - Rust
Improve this page
Add a description, image, and links to the radare2 topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the radare2 topic, visit your repo's landing page and select "manage topics."