
radare
@radareorg
Followers
20K
Following
3K
Media
896
Statuses
9K
Reverse Engineering Framework for the commandline cowboys. Follow us in our primary fediverse for more updates https://t.co/aC9GtrVSVm
Joined February 2010
r2frida-5.9.8 is out!. 🔹Support for hardware breakpoints and watchpoints.🔹Adds the new :ies command to enumerate app entrypoints. 👉 More details: #frida #radare2 #r2frida #reverseengineering.
github.com
Release Notes Version: 5.9.8 (previous: 5.9.6) Commits: 16 (from 6 contributors) Authors Eduardo Novella Grant Murphy pancake renovate[bot] Highlights In Sync with r2-5.9.8 Bump Frida 16.5.9 Imple...
0
24
68
RT @as0ler: Do you want to start using @radareorg and don’t know how to start? This is a good starting point where you have good autogenera….
deepwiki.com
Radare2 (r2) is a comprehensive open-source reverse engineering framework that provides a set of libraries, tools, and plugins for binary analysis, disassembly, debugging, and manipulation. It began a
0
4
0
RT @NowSecureMobile: #Connect25 is bringing an #AI + reverse engineering session diving into r2ai!. Pancake, Creator of #radare2 will show….
0
2
0
RT @re_and_more: RE tip of the day: Once ARM malware is ready to be emulated with qemu-user (-g <port> argument), you can connect to this p….
0
3
0
RT @dnak0v: I made a browser extension to enable MCP for claude[.]ai. It works via SSE, so you can just directly point it to your SSE MCP s….
0
12
0
RT @travisgoodspeed: New binary release of MaskRomTool for Windows (x86_64) and macOS (universal) are available. The big new feature is th….
0
8
0
RT @dnak0v: I wake up and see pancake rawdog-coded radare2-mcp overnight to prevent possible command injections 😳
0
1
0
RT @dnak0v: Added exponential backoff to r2ai.c and an execute_javascript tool. It's pretty much feature complete at this point. https://t.….
0
3
0
RT @dnak0v: point and click reversers just discovering AI can do RE 😂 bro we've had this shit in radare2 for 2 years now.
0
2
0
RT @dnak0v: @janbamjan You are a reverse engineer and you are using radare2 to analyze a binary. The user will ask questions about the bina….
0
2
0
RT @dnak0v: r2ai+sonnet3.7 solved it in less than 3 min, for $0.35. (Half of that time was just waiting for the 40k tpm limit to reset) .Ju….
0
13
0
RT @dnak0v: @lauriewired i've got one for radare2 you should try
github.com
MCP stdio server for radare2. Contribute to radareorg/radare2-mcp development by creating an account on GitHub.
0
5
0
RT @theshyhat: HackerFrogs is live! We're learning more XOR Cryptography /w @picoctf and @CryptoHack__ , then /w @picoctf we're learning th….
0
2
0
RT @cmatthewbrooks: Fixed another @radareorg bug this weekend to correctly print the spamsum/ssdeep hash for each section in a binary. This….
0
1
0
RT @NowSecureMobile: AI-powered decompilation is here. @radareorg creator walks through using r2ai to reverse engineer mobile apps, boostin….
0
13
0
RT @X1turboAgency: 解析環境 radare2 を使ってROMの解析。.ハードウェアの細かい制御まで調べられるとよいんだけど。.マインドマップで処理の流れやワークを整理しながら調べます。.画像は radare2と適当なメモです。 .
0
1
0
RT @cryptax: r2ai solves my CrackMe in a few seconds. The solution is both elegant and educational. recommend:….
0
29
0