Explore tweets tagged as #Radare2
📲🔐 Whether you are a beginner or already experienced - our 4 DAY Mobile App reverse engineering course in Vegas (August) will bring you right up to speed with radare2 and frida 🔥. Decompiling, patching, tracing, hooking, bypassing. Come learn together as we leave these apps
0
6
19
r2d2 : radare2 plugin for GPT-4 solves a crackme with just 1 prompt : https://t.co/5esxby8sTq
6
139
485
Tried radare2 on a Solana contract today. Ghidra plugin doesn't support sBPF yet—opened . Upstream says no support. As a bug-smasher, this bugs me. Gotta fix it. Ghidra's decomp is still better anyway. @0x_arthurbretas @dhkleung
https://t.co/zgZ2ePfkMT
2
1
16
Radare2 has added a lot more supported architectures: Before // After (and more that didn't fit in the screenshot)
0
1
6
0
8
64
Reverse engineering a mysterious binary? Prioritize functions with the highest references using Radare2's one-liner. @radareorg
#reverseengineering
5
18
78
¿Les gustó mi lista anterior? Aquí tienen una nueva, amigos : 1. Parrot Security OS 2. Tcpdump 3. Nessus 4. Fiddler 5. Snort 6. Maltego 7. Aircrack-ng 8. GIMP (GNU Image Manipulation Program) 9. Mimikatz 10. Cuckoo Sandbox 11. Pentoo Linux 12. Brave Browser 13. Radare2
1
1
11
HopperX-CLI è uno strumento di reverse engineering che combina l'analisi binaria di rizin/radare2 con l'intelligenza artificiale di Ollama per automatizzare l'identificazione di protezioni, controlli di licenza e vulnerabilità nei binari Mach-O/ELF... in fase di test, ma
9
4
38
ROP attack challenge complete! 🎉🎉🎉 Crafted a rop chain to pass arbitrary arguments to a syscall the binary was making and got the flag. I then scripted the exploitation with pwntools for funsies. Used radare2 for initial disassembly. #ropattack
0
1
11
🚀 Take your malware analysis to the next level with radare2! This script: 🔍 Extracts critical stack strings from binaries ⚙️ Automatically generates custom YARA rules to match malicious patterns 🔐 Seamlessly integrates reverse engineering with detection capabilities. 📅
0
5
21
Unlock the secrets of binaries with radare2! 🕵️♂️ Utilize the '/as' command to reveal all syscalls used. Remember to configure your OS type for accurate results; for instance, android binaries follow Linux conventions @radareorg
#ReverseEngineering
1
4
25
New radare2 cheatsheet who dis? This cheatsheet covers: command line options, basic commands, block size, analyzing, ROP, yara, graphs, and much more! Links in next post🧵
1
2
22
Lineup is insane! 🔥🧯 https://t.co/0POInRoYJ7 See you there folks! 😎 #barcelona #radare2 @radareorg @RadareCorp
1
5
29
Today @radareorg #r2con2025 starts! → https://t.co/Og69r4Oj4S Tomorrow @ulexec and @Seecoalba will present our new radare2 plugins for @solana sBPF analysis, as way to give back to the community! Join us!
0
6
17
r2d2 es un plugin que permite conectar GPT-4 con las capacidades de radare2 para ofrecer una herramienta capaz de ejecutar e interpretar comandos de r2. Esta integración no solo optimiza el proceso de análisis sino que también proporciona insights precisos y valiosos, en los
0
1
5