r2tips

@r2tips

Shared account to publish tips for radare2

r2land
Vrijeme pridruživanja: listopad 2018.

Tweetovi

Blokirali ste korisnika/cu @r2tips

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @r2tips

  1. Prikvačeni tweet
    2. pro 2018.

    Hey there, r2land! We are eager to hear about the tips you find most useful when using r2 for RE, malware analysis, exploiting, random CTFs... Or whatever you are using r2 for. Just send us a DM and we will share your tips 😉

    Poništi
  2. proslijedio/la je Tweet
    18. pro 2019.
    Odgovor korisnicima

    Here is a great tip to find the r2 command you are looking for: Execeute "?*~<keyword>" where "keyword" is a word describing the thing you are looking for. It can be "imports", "shellcode", "qword" and anything else. Same goes for "e??~<keyword>" for config variables.

    Poništi
  3. proslijedio/la je Tweet
    17. ruj 2019.

    We are proud to announce that the artichokes season has started! In r2land we celebrate this with a new release of r2 (the last one of the 3.x series)

    Poništi
  4. 17. ruj 2019.

    By pressing the 'e' key in panels mode you can edit the command to run on any panel. Type 'axt $$' to get an interactively updated panel giving you the xrefs while you scroll in the disasm

    Poništi
  5. 17. ruj 2019.

    You can now script r2frida in the agent side in C. Thanks to the new CModule API the '.' command in r2frida handles the .c files in a special way

    Poništi
  6. proslijedio/la je Tweet
    23. srp 2019.

    Call code from an alive process with via \dxc (Dynamic eXecute Code). For instance, let's call getpid() from libc and then verify the pid with the cmd \dp. Any cool function to arbitrarily call from your target? Go and it!

    Poništi
  7. 25. srp 2019.

    How often do you update r2 from git?

    Poništi
  8. 25. srp 2019.

    Refactoring news: The old r2 command "/c/" has been renamed to "/ad/". This command allows you to find assembly with regexes. Practical example; find assembly syscalls on obfuscated arm32 with r2 is a piece of cake.

    Poništi
  9. 25. srp 2019.

    Why not parsing headers from memory at runtime? goodies brought to you by

    Poništi
  10. 25. srp 2019.

    Switf5 demangling is now supported on and

    swift-frida is now integrated in r2frida <3
    Poništi
  11. 23. srp 2019.

    Call code from an alive process with via \dxc (Dynamic eXecute Code). For instance, let's call getpid() from libc and then verify the pid with the cmd \dp. Any cool function to arbitrarily call from your target? Go and it!

    Poništi
  12. proslijedio/la je Tweet
    3. srp 2019.

    We are happy to announce the official agenda of ! 🚀 You can find it on the conference website @ Tickets for the conference and the training days are still available - hurry up and grab yours today before the price goes up!

    Poništi
  13. 2. srp 2019.

    You can script r2 in C, this screenshot shows different ways to run that C code (loaded as a dynamic plugin and executed) using the rlang interface which is now integrated with -i and .

    Poništi
  14. 21. svi 2019.

    Command of the day: alias reset='r2 -qcre --' Yep, r2 also have the UNIX 'reset' command inside to restore/fix the terminal settings.

    Poništi
  15. 15. svi 2019.

    When reviewing the XRefs in visual mode (press 'x'), now we can press ';' too add a comment in the caller in order to make clear the purpose of each call or if we are interested in them or not.

    Poništi
  16. 15. svi 2019.

    Thanks to the RSoC this last 3.5.1 release also includes the new 'scr.prompt.popup' option to show the rollup widget when TAB is pressed to autocomplete the commandline. Combines with all your favourite color themes!

    Poništi
  17. proslijedio/la je Tweet
    15. svi 2019.

    The new r2pipe for Python (v1.3.1) comes with a new cmdJ() method that returns a Python object instead of a JSON one, so you can use dot and tab to autocomplete and introspect anything inside r2. Thanks for the addition!

    Poništi
  18. 1. svi 2019.

    You can decode base64 strings in different ways. Use p6d and ?b64- commands to decode them. Check out the 📸 example.

    Poništi
  19. proslijedio/la je Tweet
    1. ožu 2019.

    Do you want to speak at r2con2019? Send us a mail at r2con@radare.org with your proposal! Thanks!

    Prikaži ovu nit
    Poništi
  20. 25. sij 2019.

    Moving from IDA to radare2? You can use this python script to convert your IDB and IDC files into a radare2 initialization script. The output file can then be used in or :)

    Poništi
  21. 18. sij 2019.

    This new command have also an important side use case, analyze all functions not being covered in previous analysis: af @@=`aflm~0x`

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·