radare (@radareorg) 's Twitter Profile
radare

@radareorg

Reverse Engineering Framework for the commandline cowboys. Follow us in our primary fediverse for more updates infosec.exchange/@radareorg

ID: 111926756

linkhttp://rada.re calendar_today06-02-2010 16:36:51

8,8K Tweet

20,20K Followers

8 Following

るま (@lumc_) 's Twitter Profile Photo

radare2を初めて使ってみて、アレコレやりながら、最終こういうごり押しをした 3時間ぐらい色んなbindingを試して全然動かなくて発狂してた。r2pipeというのがちゃんと動いた

radare2を初めて使ってみて、アレコレやりながら、最終こういうごり押しをした
3時間ぐらい色んなbindingを試して全然動かなくて発狂してた。r2pipeというのがちゃんと動いた
x1turbo.agency (@x1turboagency) 's Twitter Profile Photo

解析環境 radare2 を使ってROMの解析。 ハードウェアの細かい制御まで調べられるとよいんだけど。 マインドマップで処理の流れやワークを整理しながら調べます。 画像は radare2と適当なメモです。

解析環境 radare2 を使ってROMの解析。
ハードウェアの細かい制御まで調べられるとよいんだけど。
マインドマップで処理の流れやワークを整理しながら調べます。
画像は radare2と適当なメモです。
Axelle Ap. @cryptax @mastodon.social (@cryptax) 's Twitter Profile Photo

r2ai solves my CrackMe in a few seconds. The solution is both elegant and educational. cryptax.medium.com/cracking-my-ow… + recommend: youtube.com/watch?v=UxE5GN… #r2con #radare2 #AI #crackme #CTF

r2ai solves my CrackMe in a few seconds. The solution is both elegant and educational.

cryptax.medium.com/cracking-my-ow…

+ recommend: youtube.com/watch?v=UxE5GN… 

#r2con #radare2 #AI #crackme #CTF
NowSecure (@nowsecuremobile) 's Twitter Profile Photo

AI-powered decompilation is here. radare creator walks through using r2ai to reverse engineer mobile apps, boosting efficiency & reducing the learning curve. #Radare #ReverseEngineering #AI loom.ly/dII6FD8

AI-powered decompilation is here. <a href="/radareorg/">radare</a> creator walks through using r2ai to reverse engineer mobile apps, boosting efficiency &amp; reducing the learning curve. #Radare #ReverseEngineering #AI
loom.ly/dII6FD8
Matt Brooks (@cmatthewbrooks) 's Twitter Profile Photo

Fixed another radare bug this weekend to correctly print the spamsum/ssdeep hash for each section in a binary. This is available via r2 without needing to run analysis over the target binary, meaning it’s still performant for large targets.

Fixed another <a href="/radareorg/">radare</a> bug this weekend to correctly print the spamsum/ssdeep hash for each section in a binary. This is available via r2 without needing to run analysis over the target binary, meaning it’s still performant for large targets.
theShyHat (@theshyhat) 's Twitter Profile Photo

HackerFrogs is live! We're learning more XOR Cryptography /w picoCTF and CryptoHack , then /w picoCTF we're learning the Radare2 debugger, finally we're hacking Windows Active Directory /w Thehackerslabs Doraemon! Watc h here: twitch.tv/theshyhat youtube.com/watch?v=Q2xp-f…

Daniel Nakov (@dnak0v) 's Twitter Profile Photo

r2ai+sonnet3.7 solved it in less than 3 min, for $0.35. (Half of that time was just waiting for the 40k tpm limit to reset) Just because you can, doesn't mean you should, guys.

r2ai+sonnet3.7 solved it in less than 3 min, for $0.35. (Half of that time was just waiting for the 40k tpm limit to reset) 
Just because you can, doesn't mean you should, guys.
Daniel Nakov (@dnak0v) 's Twitter Profile Photo

janbam You are a reverse engineer and you are using radare2 to analyze a binary. The user will ask questions about the binary and you will respond with the answer to the best of your ability. # Guidelines - Understand the Task: Grasp the main objective, goals, requirements,

Daniel Nakov (@dnak0v) 's Twitter Profile Photo

r2ai comes with ask_to_execute (aka baby_mode) by default, where it asks you to confirms everything it executes. Axelle Ap. @cryptax @mastodon.social already thought of that months ago. You don't get that choice with Claude Desktop, you can barely even see the code after you click Allow.

Daniel Nakov (@dnak0v) 's Twitter Profile Photo

I made a browser extension to enable MCP for claude[.]ai. It works via SSE, so you can just directly point it to your SSE MCP servers. It's kinda cool because it actually just uses the existing code Anthropic already has, just not enabled. So all of the MCP UI works :D

I made a browser extension to enable MCP for claude[.]ai. It works via SSE, so you can just directly point it to your SSE MCP servers. It's kinda cool because it actually just uses the existing code Anthropic already has, just not enabled. So all of the MCP UI works :D
Travis Goodspeed (@travisgoodspeed) 's Twitter Profile Photo

New binary release of MaskRomTool for Windows (x86_64) and macOS (universal) are available. The big new feature is that my disassembler is included for Z80, 8080, SM83, 6502, 6805, DirecTV's F-Card and others. MAME's Unidasm and radare are still supported, of course.

Reverse Engineering and More (@re_and_more) 's Twitter Profile Photo

RE tip of the day: Once ARM malware is ready to be emulated with qemu-user (-g <port> argument), you can connect to this port using tools like radare2 with the -d argument. For best results, explicitly specify its architecture and bitness! #infosec #malware #reverseengineering

RE tip of the day: Once ARM malware is ready to be emulated with qemu-user (-g &lt;port&gt; argument), you can connect to this port using tools like radare2 with the -d argument. For best results, explicitly specify its architecture and bitness!
#infosec #malware #reverseengineering
radare (@radareorg) 's Twitter Profile Photo

Historically r2ai used the term “baby mode" to prompt the user before running any command for safety reasons when using the auto mode. But maybe we can find a better wording here. Comment for other suggestions!

NowSecure (@nowsecuremobile) 's Twitter Profile Photo

#Connect25 is bringing an #AI + reverse engineering session diving into r2ai! Pancake, Creator of #radare2 will show how AI can: - Analyze mobile apps - Detect privacy issues - Help you understand what’s going on step by step Register here: loom.ly/fmOGrqw

#Connect25 is bringing an #AI + reverse engineering session diving into r2ai!

Pancake, Creator of #radare2 will show how AI can:
- Analyze mobile apps
- Detect privacy issues
- Help you understand what’s going on step by step

Register here: loom.ly/fmOGrqw