Radare2 is a complete rewrite of radare. It provides a set of libraries, tools and plugins to ease reverse engineering tasks. It can edit files on local hard drives, view kernel memory, and debug programs locally or via a remote gdb/windbg servers. r2 can analyze, emulate, debug, modify, and disassemble any binary.
Common questions about Radare2 including features, pricing, alternatives, and user reviews.
Radare2 is A powerful reverse engineering framework. It is a Vulnerability Management solution designed to help security teams with Reverse Engineering, Binary Analysis.
Radare2 is a free Vulnerability Management tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/radareorg/radare2/ for download and installation instructions.
Popular alternatives to Radare2 include:
Compare these tools and more at https://cybersectools.com/categories/vulnerability-management
Radare2 is for security teams and organizations that need Reverse Engineering, Binary Analysis. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Vulnerability Management tools can be found at https://cybersectools.com/categories/vulnerability-management
ROPgadget is a cross-platform command-line tool that searches for ROP gadgets in binary files across multiple architectures to facilitate exploit development and ROP chain construction.
OneGadget is a CTF-focused tool that uses symbolic execution to find RCE gadgets in binaries that can execute shell commands through execve('/bin/sh', NULL, NULL).
PEDA is a Python extension for GDB that enhances debugging with colorized displays and specialized commands for exploit development and binary security analysis.
Pwndbg is a GDB plug-in that enhances the debugging experience for low-level software developers, hardware hackers, reverse-engineers, and exploit developers.