www.helpnetsecurity.com
Open in
urlscan Pro
52.89.83.123
Public Scan
URL:
https://www.helpnetsecurity.com/2024/06/10/radare-open-source-reverse-engineering-framework/
Submission: On June 11 via api from TR — Scanned from DE
Submission: On June 11 via api from TR — Scanned from DE
Form analysis
2 forms found in the DOMPOST
<form id="mc4wp-form-1" class="mc4wp-form mc4wp-form-301700 mc4wp-ajax" method="post" data-id="301700" data-name="Open source">
<div class="mc4wp-form-fields"><img decoding="async" class="aligncenter" title="OPIS" src="https://img2.helpnetsecurity.com/posts2024/devider.webp" alt="OPIS">
<img decoding="async" class="aligncenter" title="Open source" src="https://img2.helpnetsecurity.com/posts2024/newsletter_open-source-550x98px_5.webp" alt="OPIS">
<br>
<label>
<input type="email" name="EMAIL" size="35" placeholder="Please enter your e-mail address" required="">
</label> <input type="submit" value="Subscribe"><br><br>
<label>
<p><input type="checkbox" name="AGREE_TO_TERMS" value="1" required=""> I have read and agree to the <a href="https://www.helpnetsecurity.com/privacy-policy/#personalized" target="_blank" rel="noopener">terms & conditions</a>
<img decoding="async" class="aligncenter" title="OPIS" src="https://img2.helpnetsecurity.com/posts2024/devider.webp" alt="OPIS">
</p>
</label>
</div><label style="display: none !important;">Leave this field empty if you're human: <input type="text" name="_mc4wp_honeypot" value="" tabindex="-1" autocomplete="off"></label><input type="hidden" name="_mc4wp_timestamp"
value="1718071838"><input type="hidden" name="_mc4wp_form_id" value="301700"><input type="hidden" name="_mc4wp_form_element_id" value="mc4wp-form-1">
<div class="mc4wp-response"></div>
</form>
POST
<form id="mc4wp-form-2" class="mc4wp-form mc4wp-form-244483 mc4wp-ajax" method="post" data-id="244483" data-name="Footer newsletter form">
<div class="mc4wp-form-fields">
<div class="hns-newsletter">
<div class="hns-newsletter__top">
<div class="container">
<div class="hns-newsletter__wrapper">
<div class="hns-newsletter__title">
<i>
<svg class="hic">
<use xlink:href="#hic-plus"></use>
</svg>
</i>
<span>Cybersecurity news</span>
</div>
</div>
</div>
</div>
<div class="hns-newsletter__bottom">
<div class="container">
<div class="hns-newsletter__wrapper">
<div class="hns-newsletter__body">
<div class="row">
<div class="col">
<div class="form-check form-control-lg">
<input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="520ac2f639" id="mcs1">
<label class="form-check-label text-nowrap" for="mcs1">Daily Newsletter</label>
</div>
</div>
<div class="col">
<div class="form-check form-control-lg">
<input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="d2d471aafa" id="mcs2">
<label class="form-check-label text-nowrap" for="mcs2">Weekly Newsletter</label>
</div>
</div>
</div>
</div>
<div class="form-check form-control-lg mb-3">
<input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="28abe5d9ef" id="mcs3">
<label class="form-check-label" for="mcs3">(IN)SECURE - monthly newsletter with top articles</label>
</div>
<div class="input-group mb-3">
<input type="email" name="email" id="email" class="form-control border-dark" placeholder="Please enter your e-mail address" aria-label="Please enter your e-mail address" aria-describedby="hns-newsletter-submit-btn" required="">
<button class="btn btn-dark rounded-0" type="submit" id="hns-newsletter-submit-btn">Subscribe</button>
</div>
<div class="form-check">
<input class="form-check-input" type="checkbox" name="AGREE_TO_TERMS" value="1" id="mcs4" required="">
<label class="form-check-label" for="mcs4">
<span>I have read and agree to the <a href="https://www.helpnetsecurity.com/newsletter/" target="_blank" rel="noopener" class="d-inline-block">terms & conditions</a>
</span>
</label>
</div>
</div>
</div>
</div>
</div>
</div><label style="display: none !important;">Leave this field empty if you're human: <input type="text" name="_mc4wp_honeypot" value="" tabindex="-1" autocomplete="off"></label><input type="hidden" name="_mc4wp_timestamp"
value="1718071838"><input type="hidden" name="_mc4wp_form_id" value="244483"><input type="hidden" name="_mc4wp_form_element_id" value="mc4wp-form-2">
<div class="mc4wp-response"></div>
</form>
Text Content
* News * Features * Expert analysis * Videos * Events * Whitepapers * Industry news * Product showcase * Newsletters * * * Please turn on your JavaScript for this page to function normally. Mirko Zorz, Director of Content, Help Net Security June 10, 2024 Share RADARE: OPEN-SOURCE REVERSE ENGINEERING FRAMEWORK Radare is an open-source UNIX-like reverse engineering framework and command-line toolset. It can be scripted, modified, and used for batch analysis. “I started the project in 2006 when I was working as a forensic analyst, and I wrote a simple command-line hexadecimal editor to scan a hard drive looking for keywords and dump the results to disk to recover some files. Over time, the project evolved to meet my diverse requirements, serving as a debugger, a disassembler, and a platform for exploring various architectures. It proved invaluable during CTF (Capture the Flag) competitions, at work, and for personal reverse engineering projects,” Sergi Àlvarez, the creator of Radare, told Help Net Security. Radare’s free software nature, permissive license, and ease of extension and integration with other tools make it ideal for various environments and needs. The capability to pull data or extend other software with its features opens up numerous possibilities. With everything being pluggable and a key focus on portability, Radare can be used across various operating systems and architectures. This makes it ideal for forensics, reverse engineering, debugging, report generation, and exploiting or diffing. SUPPORTED PLUGINS Using the r2pm tool, you can install many plugins and tools: * esilsolve: The symbolic execution plugin, based on esil and z3 * iaito: The official Qt graphical interface * keystone: Assembler instructions using the Keystone library * r2ai: Run a Language Model in localhost with Llama inside r2! * r2dec: A decompiler based on r2 written in JS, accessed with the `pdd` command * r2diaphora: Diaphora’s binary diffing engine on top of radare2 * r2frida: The frida io plugin. Start r2 with `r2 frida://0` to use it * r2ghidra: The standalone native ghidra decompiler accessible with `pdg` * r2papi: High level api on top of r2pipe * r2pipe: Script radare2 from any programming language * r2poke: Integration with GNU/Poke for extended binary parsing capabilities * goresym: Import GoReSym symbol as flags * r2yara: Run Yara from r2 or use r2 primitives from Yara * radius2: A fast symbolic execution engine based on boolector and esil * r2sarif: import/extend/export SARIF documents FUTURE PLANS AND DOWNLOAD Radare’s roadmap is primarily driven by the needs and requests from the community as well as their contributions. One of the main goals is to reduce the maintenance costs as much as possible, allowing for a focus on cleaning code, reducing memory usage, and improving performance without sacrificing any of the existing features. “On a personal level, my plans include adding support for the latest technologies used in mobile applications, enhancing scripting capabilities, improving analysis quality and ship a native decompiler and keep improving the portability across different platforms. Helping the community and documentation to grow and contribute is essential for the future of the project, so I strongly encourage everyone to join the Discord or Telegram chats, submit pull requests (PRs), or share their questions and proposals, which will help move the project forward,” Àlvarez concluded. Radare is available for free download on GitHub. Must read: * 20 free cybersecurity tools you might have missed * 15 open-source cybersecurity tools you’ll wish you’d known earlier * 20 essential open-source cybersecurity tools that save you time I have read and agree to the terms & conditions Leave this field empty if you're human: More about * cybersecurity * GitHub * open source * software Share FEATURED NEWS * The number of known Snowflake customer data breaches is rising * AI’s role in accelerating vulnerability management * Radare: Open-source reverse engineering framework eBook: Breaking bad actors SPONSORED * eBook: Cloud security skills * Download: The Ultimate Guide to the CISSP * eBook: Do you have what it takes to lead in cybersecurity? DON'T MISS * The number of known Snowflake customer data breaches is rising * AI’s role in accelerating vulnerability management * Radare: Open-source reverse engineering framework * Windows Recall will be opt-in and the data more secure, Microsoft says * SolarWinds fixes severe Serv-U vulnerability (CVE-2024-28995) Cybersecurity news Daily Newsletter Weekly Newsletter (IN)SECURE - monthly newsletter with top articles Subscribe I have read and agree to the terms & conditions Leave this field empty if you're human: © Copyright 1998-2024 by Help Net Security Read our privacy policy | About us | Advertise Follow us ×