www.helpnetsecurity.com Open in urlscan Pro
52.89.83.123  Public Scan

URL: https://www.helpnetsecurity.com/2024/06/10/radare-open-source-reverse-engineering-framework/
Submission: On June 11 via api from TR — Scanned from DE

Form analysis 2 forms found in the DOM

POST

<form id="mc4wp-form-1" class="mc4wp-form mc4wp-form-301700 mc4wp-ajax" method="post" data-id="301700" data-name="Open source">
  <div class="mc4wp-form-fields"><img decoding="async" class="aligncenter" title="OPIS" src="https://img2.helpnetsecurity.com/posts2024/devider.webp" alt="OPIS">
    <img decoding="async" class="aligncenter" title="Open source" src="https://img2.helpnetsecurity.com/posts2024/newsletter_open-source-550x98px_5.webp" alt="OPIS">
    <br>
    <label>
      <input type="email" name="EMAIL" size="35" placeholder="Please enter your e-mail address" required="">
    </label> <input type="submit" value="Subscribe"><br><br>
    <label>
      <p><input type="checkbox" name="AGREE_TO_TERMS" value="1" required=""> I have read and agree to the <a href="https://www.helpnetsecurity.com/privacy-policy/#personalized" target="_blank" rel="noopener">terms &amp; conditions</a>
        <img decoding="async" class="aligncenter" title="OPIS" src="https://img2.helpnetsecurity.com/posts2024/devider.webp" alt="OPIS">
      </p>
    </label>
  </div><label style="display: none !important;">Leave this field empty if you're human: <input type="text" name="_mc4wp_honeypot" value="" tabindex="-1" autocomplete="off"></label><input type="hidden" name="_mc4wp_timestamp"
    value="1718071838"><input type="hidden" name="_mc4wp_form_id" value="301700"><input type="hidden" name="_mc4wp_form_element_id" value="mc4wp-form-1">
  <div class="mc4wp-response"></div>
</form>

POST

<form id="mc4wp-form-2" class="mc4wp-form mc4wp-form-244483 mc4wp-ajax" method="post" data-id="244483" data-name="Footer newsletter form">
  <div class="mc4wp-form-fields">
    <div class="hns-newsletter">
      <div class="hns-newsletter__top">
        <div class="container">
          <div class="hns-newsletter__wrapper">
            <div class="hns-newsletter__title">
              <i>
                        <svg class="hic">
                            <use xlink:href="#hic-plus"></use>
                        </svg>
                    </i>
              <span>Cybersecurity news</span>
            </div>
          </div>
        </div>
      </div>
      <div class="hns-newsletter__bottom">
        <div class="container">
          <div class="hns-newsletter__wrapper">
            <div class="hns-newsletter__body">
              <div class="row">
                <div class="col">
                  <div class="form-check form-control-lg">
                    <input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="520ac2f639" id="mcs1">
                    <label class="form-check-label text-nowrap" for="mcs1">Daily Newsletter</label>
                  </div>
                </div>
                <div class="col">
                  <div class="form-check form-control-lg">
                    <input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="d2d471aafa" id="mcs2">
                    <label class="form-check-label text-nowrap" for="mcs2">Weekly Newsletter</label>
                  </div>
                </div>
              </div>
            </div>
            <div class="form-check form-control-lg mb-3">
              <input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="28abe5d9ef" id="mcs3">
              <label class="form-check-label" for="mcs3">(IN)SECURE - monthly newsletter with top articles</label>
            </div>
            <div class="input-group mb-3">
              <input type="email" name="email" id="email" class="form-control border-dark" placeholder="Please enter your e-mail address" aria-label="Please enter your e-mail address" aria-describedby="hns-newsletter-submit-btn" required="">
              <button class="btn btn-dark rounded-0" type="submit" id="hns-newsletter-submit-btn">Subscribe</button>
            </div>
            <div class="form-check">
              <input class="form-check-input" type="checkbox" name="AGREE_TO_TERMS" value="1" id="mcs4" required="">
              <label class="form-check-label" for="mcs4">
                <span>I have read and agree to the <a href="https://www.helpnetsecurity.com/newsletter/" target="_blank" rel="noopener" class="d-inline-block">terms &amp; conditions</a>
                </span>
              </label>
            </div>
          </div>
        </div>
      </div>
    </div>
  </div><label style="display: none !important;">Leave this field empty if you're human: <input type="text" name="_mc4wp_honeypot" value="" tabindex="-1" autocomplete="off"></label><input type="hidden" name="_mc4wp_timestamp"
    value="1718071838"><input type="hidden" name="_mc4wp_form_id" value="244483"><input type="hidden" name="_mc4wp_form_element_id" value="mc4wp-form-2">
  <div class="mc4wp-response"></div>
</form>

Text Content

 * News
 * Features
 * Expert analysis
 * Videos
 * Events
 * Whitepapers
 * Industry news
 * Product showcase
 * Newsletters

 * 
 * 
 * 


Please turn on your JavaScript for this page to function normally.
Mirko Zorz, Director of Content, Help Net Security
June 10, 2024
Share


RADARE: OPEN-SOURCE REVERSE ENGINEERING FRAMEWORK



Radare is an open-source UNIX-like reverse engineering framework and
command-line toolset. It can be scripted, modified, and used for batch analysis.



“I started the project in 2006 when I was working as a forensic analyst, and I
wrote a simple command-line hexadecimal editor to scan a hard drive looking for
keywords and dump the results to disk to recover some files. Over time, the
project evolved to meet my diverse requirements, serving as a debugger, a
disassembler, and a platform for exploring various architectures. It proved
invaluable during CTF (Capture the Flag) competitions, at work, and for personal
reverse engineering projects,” Sergi Àlvarez, the creator of Radare, told Help
Net Security.

Radare’s free software nature, permissive license, and ease of extension and
integration with other tools make it ideal for various environments and needs.
The capability to pull data or extend other software with its features opens up
numerous possibilities.

With everything being pluggable and a key focus on portability, Radare can be
used across various operating systems and architectures. This makes it ideal for
forensics, reverse engineering, debugging, report generation, and exploiting or
diffing.


SUPPORTED PLUGINS

Using the r2pm tool, you can install many plugins and tools:

 * esilsolve: The symbolic execution plugin, based on esil and z3
 * iaito: The official Qt graphical interface
 * keystone: Assembler instructions using the Keystone library
 * r2ai: Run a Language Model in localhost with Llama inside r2!
 * r2dec: A decompiler based on r2 written in JS, accessed with the `pdd`
   command
 * r2diaphora: Diaphora’s binary diffing engine on top of radare2
 * r2frida: The frida io plugin. Start r2 with `r2 frida://0` to use it
 * r2ghidra: The standalone native ghidra decompiler accessible with `pdg`
 * r2papi: High level api on top of r2pipe
 * r2pipe: Script radare2 from any programming language
 * r2poke: Integration with GNU/Poke for extended binary parsing capabilities
 * goresym: Import GoReSym symbol as flags
 * r2yara: Run Yara from r2 or use r2 primitives from Yara
 * radius2: A fast symbolic execution engine based on boolector and esil
 * r2sarif: import/extend/export SARIF documents


FUTURE PLANS AND DOWNLOAD

Radare’s roadmap is primarily driven by the needs and requests from the
community as well as their contributions. One of the main goals is to reduce the
maintenance costs as much as possible, allowing for a focus on cleaning code,
reducing memory usage, and improving performance without sacrificing any of the
existing features.

“On a personal level, my plans include adding support for the latest
technologies used in mobile applications, enhancing scripting capabilities,
improving analysis quality and ship a native decompiler and keep improving the
portability across different platforms. Helping the community and documentation
to grow and contribute is essential for the future of the project, so I strongly
encourage everyone to join the Discord or Telegram chats, submit pull requests
(PRs), or share their questions and proposals, which will help move the project
forward,” Àlvarez concluded.

Radare is available for free download on GitHub.



Must read:

 * 20 free cybersecurity tools you might have missed
 * 15 open-source cybersecurity tools you’ll wish you’d known earlier
 * 20 essential open-source cybersecurity tools that save you time






I have read and agree to the terms & conditions

Leave this field empty if you're human:





More about
 * cybersecurity
 * GitHub
 * open source
 * software

Share


FEATURED NEWS

 * The number of known Snowflake customer data breaches is rising
 * AI’s role in accelerating vulnerability management
 * Radare: Open-source reverse engineering framework

eBook: Breaking bad actors



SPONSORED

 * eBook: Cloud security skills
 * Download: The Ultimate Guide to the CISSP
 * eBook: Do you have what it takes to lead in cybersecurity?




DON'T MISS

 * The number of known Snowflake customer data breaches is rising
 * AI’s role in accelerating vulnerability management
 * Radare: Open-source reverse engineering framework
 * Windows Recall will be opt-in and the data more secure, Microsoft says
 * SolarWinds fixes severe Serv-U vulnerability (CVE-2024-28995)




Cybersecurity news
Daily Newsletter
Weekly Newsletter
(IN)SECURE - monthly newsletter with top articles
Subscribe
I have read and agree to the terms & conditions
Leave this field empty if you're human:

© Copyright 1998-2024 by Help Net Security
Read our privacy policy | About us | Advertise
Follow us
×