radareorg Profile Banner
radare Profile
radare

@radareorg

Followers
20K
Following
3K
Media
896
Statuses
9K

Reverse Engineering Framework for the commandline cowboys. Follow us in our primary fediverse for more updates https://t.co/aC9GtrVSVm

Joined February 2010
Don't wanna be here? Send us removal request.
@radareorg
radare
7 months
r2frida-5.9.8 is out!. 🔹Support for hardware breakpoints and watchpoints.🔹Adds the new :ies command to enumerate app entrypoints. 👉 More details: #frida #radare2 #r2frida #reverseengineering.
Tweet card summary image
github.com
Release Notes Version: 5.9.8 (previous: 5.9.6) Commits: 16 (from 6 contributors) Authors Eduardo Novella Grant Murphy pancake renovate[bot] Highlights In Sync with r2-5.9.8 Bump Frida 16.5.9 Imple...
0
24
68
@radareorg
radare
2 months
RT @NowSecureMobile: #Connect25 is bringing an #AI + reverse engineering session diving into r2ai!. Pancake, Creator of #radare2 will show….
0
2
0
@radareorg
radare
3 months
Historically r2ai used the term “baby mode" to prompt the user before running any command for safety reasons when using the auto mode. But maybe we can find a better wording here. Comment for other suggestions!.
1
1
4
@radareorg
radare
3 months
RT @re_and_more: RE tip of the day: Once ARM malware is ready to be emulated with qemu-user (-g <port> argument), you can connect to this p….
0
3
0
@radareorg
radare
4 months
RT @dnak0v: I made a browser extension to enable MCP for claude[.]ai. It works via SSE, so you can just directly point it to your SSE MCP s….
0
12
0
@radareorg
radare
4 months
RT @travisgoodspeed: New binary release of MaskRomTool for Windows (x86_64) and macOS (universal) are available. The big new feature is th….
0
8
0
@radareorg
radare
4 months
RT @dnak0v: I wake up and see pancake rawdog-coded radare2-mcp overnight to prevent possible command injections 😳
Tweet media one
0
1
0
@radareorg
radare
4 months
RT @dnak0v: Added exponential backoff to r2ai.c and an execute_javascript tool. It's pretty much feature complete at this point. https://t.….
0
3
0
@radareorg
radare
4 months
RT @dnak0v: point and click reversers just discovering AI can do RE 😂 bro we've had this shit in radare2 for 2 years now.
0
2
0
@radareorg
radare
4 months
RT @dnak0v: r2ai comes with ask_to_execute (aka baby_mode) by default, where it asks you to confirms everything it executes. @cryptax alrea….
0
2
0
@radareorg
radare
4 months
RT @dnak0v: r2ai.c auto mode working well already
0
3
0
@radareorg
radare
4 months
RT @dnak0v: @janbamjan You are a reverse engineer and you are using radare2 to analyze a binary. The user will ask questions about the bina….
0
2
0
@radareorg
radare
4 months
RT @dnak0v: r2ai+sonnet3.7 solved it in less than 3 min, for $0.35. (Half of that time was just waiting for the 40k tpm limit to reset) .Ju….
0
13
0
@radareorg
radare
5 months
RT @theshyhat: HackerFrogs is live! We're learning more XOR Cryptography /w @picoctf and @CryptoHack__ , then /w @picoctf we're learning th….
0
2
0
@radareorg
radare
6 months
RT @cmatthewbrooks: Fixed another @radareorg bug this weekend to correctly print the spamsum/ssdeep hash for each section in a binary. This….
0
1
0
@radareorg
radare
6 months
RT @NowSecureMobile: AI-powered decompilation is here. @radareorg creator walks through using r2ai to reverse engineer mobile apps, boostin….
0
13
0
@radareorg
radare
7 months
RT @X1turboAgency: 解析環境 radare2 を使ってROMの解析。.ハードウェアの細かい制御まで調べられるとよいんだけど。.マインドマップで処理の流れやワークを整理しながら調べます。.画像は radare2と適当なメモです。 .
0
1
0
@radareorg
radare
7 months
RT @cryptax: r2ai solves my CrackMe in a few seconds. The solution is both elegant and educational. recommend:….
0
29
0