-
x64 ROP exploiting with
@radareorg : Executing syscalls using ret2csu - https://bananamafia.dev/post/x64-rop-redpwn/ …#radare pic.twitter.com/56Zar1FgdZ -
New Blog post with some CTF-y content - Brute forcing stack canaries: https://bananamafia.dev/post/binary-canary-bruteforce/ … with a bit of
@radareorg debugging magic#radare pic.twitter.com/55SWe0YLeo -
I wrote a simple Commodore 64 emulator, just for the craic :D - https://github.com/marioballano/emudore … - and it supports
#radare! pic.twitter.com/bHudrb78l6 -
How I solved
@Disobey_fi 2020 puzzle reverse engineering part with#radare https://vldha.blogspot.com/2019/12/r2.html -
When you go into the building and wtf :')
@radareorg#radare pic.twitter.com/PP1FQBJmlw
-
"Code emulation for reverse engineers: a deep dive into radare2's ESIL" by
@arnaugamez is our next addition to the program for#RuhrSec 2020! We are excited to learn more about#radare :) pic.twitter.com/WVWMv1FbKG
-
@radareorg Hey check out the r2 plugins I made to crack an interesting#ctf, writeup/#radare tutorial here https://safiire.github.io/blog/2017/08/19/solving-danish-defense-intelligence-puzzle/ … -
With 'agx’ you get a 'cross references graph’
in #radare. Sometimes it's interesting to look beyond
. What are the callers of the callers? Use this script to get them. Maybe we will see a recursive agx implemented in radare soon
Thanks @wsxarcher https://github.com/apasamar/radare_stuff/blob/master/agx_depth.py …pic.twitter.com/fNsWNZCs9q
-
I just pushed a major update to flare-emu that makes it easier to add support for binary analysis frameworks other than IDA Pro. The first new framework to be supported is
#radare! Now you can use flare-emu on the command line or in a Python shell! https://github.com/fireeye/flare-emu … -
FLARE VM (Windows platform) to help in your
#malware analysis /#ReverseEngineering (including#IDA,#radare,#YARA,#BinaryNinja,#OllyDbg,#RetDec,#FLOSS and much more) by@FireEye https://www.fireeye.com/blog/threat-research/2018/11/flare-vm-update.html …pic.twitter.com/dzKhLaUSXU
-
There are several ways to do things with
#radare. Example: 3 ways to calculate file#entropypic.twitter.com/wHpb8rNg9k
-
Reverse engineering with
@radareorg - Intro. https://www.insinuator.net/2016/08/reverse-engineering-with-radare2-intro/ …#RE#Radare -
Published the slides for "r2pipe - Automating binary analysis with radare" workshop at
#nnc5ed#radare https://github.com/jpenalbae/r2-scripts/tree/master/workshop-slides … -
Being waiting for this feature in
#radare for some time now. I love to see developers taking the initiative. Wonder how they know were I live though. pic.twitter.com/Bsfjh5dff9
-
A
#GUI frontend for@radareorg's#radare (which is a tool for#reverseengineering). As an#AppImage for#Linux users!https://twitter.com/r2gui/status/945303247459364864 …
-
Check file
#entropy with#radare in a graphical way
https://asciinema.org/a/VMTInkp7dsWBxcs72FEPkrQ5g?speed=2 … -
-
firmflaws - Firmware analysis API http://buff.ly/29YCAdo
#radare#binwalkpic.twitter.com/5n2k3qMhBW
-
Radare2 wiki now supports online, local webapp or right from the r2 shell!
#radare2#radare@radareorghttps://github.com/securisec/radare2_wiki …
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.