Explore tweets tagged as #Radare2
@dalmoz_
dalmoz
1 year
IDA Pro radare2
6
20
86
@Hexploitable
Grant 🌱🏴󠁧󠁢󠁳󠁣󠁴󠁿
1 year
📲🔐 Whether you are a beginner or already experienced - our 4 DAY Mobile App reverse engineering course in Vegas (August) will bring you right up to speed with radare2 and frida 🔥. Decompiling, patching, tracing, hooking, bypassing. Come learn together as we leave these apps
0
6
19
@binitamshah
Binni Shah
2 years
r2d2 : radare2 plugin for GPT-4 solves a crackme with just 1 prompt : https://t.co/5esxby8sTq
6
139
485
@Michael_e18
Michael
5 days
Tried radare2 on a Solana contract today. Ghidra plugin doesn't support sBPF yet—opened . Upstream says no support. As a bug-smasher, this bugs me. Gotta fix it. Ghidra's decomp is still better anyway. @0x_arthurbretas @dhkleung https://t.co/zgZ2ePfkMT
2
1
16
@Asher_Davila
Asher Davila
10 months
Radare2 has added a lot more supported architectures: Before // After (and more that didn't fit in the screenshot)
0
1
6
@enovella_
Edu Novella
2 years
Use the Frida REPL API inside your R2Frida session❤️‍🔥#Radare2 #Frida #R2Frida
0
8
64
@ApkUnpacker
Govind Sharma
1 year
Reverse engineering a mysterious binary? Prioritize functions with the highest references using Radare2's one-liner. @radareorg #reverseengineering
5
18
78
@ciberaliado
Ciber Aliado
2 years
¿Les gustó mi lista anterior? Aquí tienen una nueva, amigos : 1. Parrot Security OS 2. Tcpdump 3. Nessus 4. Fiddler 5. Snort 6. Maltego 7. Aircrack-ng 8. GIMP (GNU Image Manipulation Program) 9. Mimikatz 10. Cuckoo Sandbox 11. Pentoo Linux 12. Brave Browser 13. Radare2
1
1
11
@Pinperepette
🏴‍☠️ The Pirate 🏴‍☠️
2 months
HopperX-CLI è uno strumento di reverse engineering che combina l'analisi binaria di rizin/radare2 con l'intelligenza artificiale di Ollama per automatizzare l'identificazione di protezioni, controlli di licenza e vulnerabilità nei binari Mach-O/ELF... in fase di test, ma
9
4
38
@kaorrosi
Proper Leng
7 months
ROP attack challenge complete! 🎉🎉🎉 Crafted a rop chain to pass arbitrary arguments to a syscall the binary was making and got the flag. I then scripted the exploitation with pwntools for funsies. Used radare2 for initial disassembly. #ropattack
0
1
11
@radareorg
radare
1 month
Happy radare2 6.0.4 release day https://t.co/4DOaR8EGrl
1
5
13
@usetraceix
Traceix
11 months
Is that a radare2 cheatsheet or are you just happy to see me? https://t.co/fH4CseFlsP
0
4
37
@Seifreed
Marc R
1 year
🚀 Take your malware analysis to the next level with radare2! This script: 🔍 Extracts critical stack strings from binaries ⚙️ Automatically generates custom YARA rules to match malicious patterns 🔐 Seamlessly integrates reverse engineering with detection capabilities. 📅
0
5
21
@ApkUnpacker
Govind Sharma
1 year
Unlock the secrets of binaries with radare2! 🕵️‍♂️ Utilize the '/as' command to reveal all syscalls used. Remember to configure your OS type for accurate results; for instance, android binaries follow Linux conventions @radareorg #ReverseEngineering
1
4
25
@usetraceix
Traceix
1 year
New radare2 cheatsheet who dis? This cheatsheet covers: command line options, basic commands, block size, analyzing, ROP, yara, graphs, and much more! Links in next post🧵
1
2
22
@enovella_
Edu Novella
1 year
Lineup is insane! 🔥🧯 https://t.co/0POInRoYJ7 See you there folks! 😎 #barcelona #radare2 @radareorg @RadareCorp
1
5
29
@Seifreed
Marc R
1 year
🛠️ Curious about how to automate malware analysis with #radare2 and #Python? At RadareCon, we'll break down scripts like this one that extract IOCs, analyze binaries, and pull metadata—all in clean JSON format. 🔍 Want to see it in action? Join us for hands-on demos and
0
3
18
@inversive_xyz
Inversive Labs
9 days
Today @radareorg #r2con2025 starts! → https://t.co/Og69r4Oj4S Tomorrow @ulexec and @Seecoalba will present our new radare2 plugins for @solana sBPF analysis, as way to give back to the community! Join us!
0
6
17
@DragonJARCon
DragonJAR 🐉 Security Conference 🏴‍☠️
2 years
r2d2 es un plugin que permite conectar GPT-4 con las capacidades de radare2 para ofrecer una herramienta capaz de ejecutar e interpretar comandos de r2. Esta integración no solo optimiza el proceso de análisis sino que también proporciona insights precisos y valiosos, en los
0
1
5