radare

@radareorg

Reverse Engineering Framework with focus on UNIX philosophy and full API bindings.

Vrijeme pridruživanja: veljača 2010.

Tweetovi

Blokirali ste korisnika/cu @radareorg

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @radareorg

  1. Prikvačeni tweet
    28. lis 2019.

    r2-4.0 is out! codename "Kràmpack" Read out the release notes in here:

    Poništi
  2. proslijedio/la je Tweet
    30. sij

    Docker 内で radare2 を使うとき ptrace-traceme: Operation not permitted が出る問題 - ねぇうしくんうしくん

    Poništi
  3. proslijedio/la je Tweet
    1. velj

    Usaremos herramientas como , y para adquirir y analizar artefactos forenses y .

    Poništi
  4. proslijedio/la je Tweet
    1. velj

    Living the workshop "Overcoming fear: reversing with Radare2" by in

    Poništi
  5. proslijedio/la je Tweet
    28. sij

    "Code emulation for reverse engineers: a deep dive into radare2's ESIL" by is our next addition to the program for 2020! We are excited to learn more about :)

    RuhrSec 2020 Speaker Arnau Gàmez i Montolio
    Poništi
  6. proslijedio/la je Tweet
    1. velj

    Cutter v1.10.1 released! 🥳 Tomorrow, GitHub will capture and store every repository in an archival facility deep in an Arctic mountain. 🥶🗻 Today, we release a special edition for the benefit of future mankind and other beings 👽 Get it @ Highlights >>

    Prikaži ovu nit
    Poništi
  7. 24. sij
    Poništi
  8. proslijedio/la je Tweet
    23. sij

    r2frida 4.2 is out! You can now use breakpoints and eternalize scripts in ! /cc

    Poništi
  9. proslijedio/la je Tweet
    20. sij

    I wrote a tiny script to give function symbol names for iOS kernelcache on Radare2, by using Jtool2's companion file

    Poništi
  10. proslijedio/la je Tweet
    14. sij
    Odgovor korisniku/ci

    If anyone wants to help and send a pull request - here is our milestone for this release:

    Poništi
  11. proslijedio/la je Tweet
    15. sij
    Poništi
  12. proslijedio/la je Tweet
    15. sij
    Poništi
  13. proslijedio/la je Tweet
    17. sij
    Poništi
  14. proslijedio/la je Tweet
    13. sij

    I am very proud to announce that after hours of reverse engineering, reading docs about radare2, rop, etc. I wrote my first for challenge 3 on which smashes the stack and pops up a shell :)

    Poništi
  15. proslijedio/la je Tweet
    18. sij

    Automatically generating solutions to a corrupted keygenme with , using for the analysis. Cutter and angr are incredibly powerful and useful tools for solving this type of challenge

    Poništi
  16. proslijedio/la je Tweet
    17. sij
    Poništi
  17. proslijedio/la je Tweet
    17. sij

    If you want to contribute to you can have a look at the pending issues for the next release (4.2) that will happen the 20th (in 3 days)

    Poništi
  18. proslijedio/la je Tweet
    17. sij

    acr-1.8.1 released and updated into . Welcome to the new era of compile time version chking. Semver is here! Now you can use the R2_VERSION_{major, minor, patch} and R2_VERSION_NUMBER defines from C and Make.

    Poništi
  19. proslijedio/la je Tweet
    16. sij

    Binary diffing of Removal Tool () updates. Via . Shout out to .

    Poništi
  20. 16. sij

    We just merged a PR that took 4 month to be cooked by and with huge changes in the analysis internals. If you had issues with some binaries (segfaults, infinite loops, overlapped functions,.. ) try again! It should be gone

    Poništi
  21. proslijedio/la je Tweet
    15. sij
    Odgovor korisniku/ci

    I'm guessing you meant bindiff. I have been using radiff2 with good results for a while. Make sure you look at the -g option piped to xdot for the best type of output. Docs are towards the bottom of this page:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·