-
Easy way to install
#radare2 on Android with#termuxpic.twitter.com/DZDIhYDeHd -
Let's use radare2 to reverse engineer a Gameboy ROM! Check it out @ https://www.megabeets.net/reverse-engineering-a-gameboy-rom-with-radare2 …
@radareorg#radare2 pic.twitter.com/7FJOB3SdKS
-
They are being completely ridiculous. The built-in assistant practically reverses everything for you.
#radare2 pic.twitter.com/6uClEEmRze
-
Pwning
#radare2 for the PwnDebian challenge. Found a command injection hidden in a crafted binary. Fixed in master as of yesterday@radareorg@carloz_spicy@syscaller@b00n10@megabeets_pic.twitter.com/iRyb9xTHmaPrikaži ovu nit -
Writeup for pwnable.kr challenge passcode using radare2: https://github.com/chrysh/ctf_writeups/tree/master/pwnable.kr/passcode …
@radareorg#radare2 -
Usaremos herramientas como
#GRR,#SleuthKit y#radare2 para adquirir y analizar artefactos forenses y#malware.https://twitter.com/rootedcon/status/1223198991761973249 …
-
Idk when the layouts interface was added to
#radare2, but holy fuck what have I been doing with my life? -
#MalwareMustDie -New#BLOG: MMD-0064-2019 - Linux/AirDropBot https://blog.malwaremustdie.org/2019/09/mmd-0064-2019-linuxairdropbot.html … With a#reversing hands out for a new#Linux#MIPS stripped#botnet#malware in#radare2 (@radareorg) Analyzed & written by@unixfreaxjp thx:@0xrbpic.twitter.com/ZITRvHD0yO
Prikaži ovu nit -
I can use
@GHIDRA_RE decompiler at command line with#radare2@radareorg . Thanks everyone for making it possible.#infosecpic.twitter.com/AbTShrfIgE
-
Researching obscure architectures sounds challenging to you? We thought so too, so we developed a disassembly and analysis plugin for
#radare2 to make things easier! Read on to learn how we did it. https://alephsecurity.com/2019/07/09/xiaomi-zigbee-2/ … -
Get practical tips for using the
#Radare2 reverse engineering toolkit developed by@oleavr &@trufae, mobile security researchers at NowSecure.#ReverseEngineering@githubhttp://ow.ly/dzhl50kbrst -
Unofficial
#r2frida wiki with practical examples to get started with@radareorg and@fridadotre. Link: https://github.com/enovella/r2frida-wiki … -#Android#ReverseEngineering#Frida#Radare2#iOSpic.twitter.com/rEKxro7YoI
Prikaži ovu nit -
#radare2 helps you to understand how stack frame works. r2 finds local_variables and arguments and simplify your analisys. Check out the example! pic.twitter.com/GG4VDwOrgt
-
Hypervisor-Level Debugger based on Radare2 / LibVMI https://github.com/Wenzel/r2vmi
#hacklu#radare2#malware#analysis#sandboxpic.twitter.com/WHTMFZNBx7
-
Metame: Metamorphic code engine for arbitrary executables https://github.com/a0rtega/metame by
@a0rtega using#radare2 -
Want to analyse a shellcode ? Bash oneliner
echo -n "\x31\xc0\x50\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\x50\x53\x89\xe1\xb0\x0b\xcd\x80" | xxd -p | xargs rasm2 -d
#shellcode from http://shell-storm.org/shellcode/files/shellcode-827.php …,#radare2 -
It took awhile but it's finally here – Reversing a Self-Modifying Binary with the almighty radare2! Check it out @ https://www.megabeets.net/reversing-a-self-modifying-binary-with-radare2 …
@radareorg#radare2 pic.twitter.com/YCipzGaWGE
-
Here I am, reversing winmine.exe with
#x64dbg and#radare2.#reverseengineeringpic.twitter.com/ygCRCuMR10
-
New article on
#reverseengineering#linux#malware using#radare2 Let me know what you guys think! https://medium.com/@201322c78cfc/48e349b252f9 …
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.