Rizin is a fork of the radare2 reverse engineering framework with a focus on usability, working features and code cleanliness. It can be used to analyze binaries, disassemble code, debug programs, as a forensic tool, as a scriptable command-line hexadecimal editor able to open disk files, and much more!
Common questions about Rizin including features, pricing, alternatives, and user reviews.
Rizin is A reverse engineering framework with a focus on usability and code cleanliness. It is a Security Operations solution designed to help security teams with Reverse Engineering, Binary Analysis.
Rizin is a free Security Operations tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/rizinorg/rizin/ for download and installation instructions.
Popular alternatives to Rizin include:
Compare these tools and more at https://cybersectools.com/categories/security-operations
Rizin is for security teams and organizations that need Reverse Engineering, Binary Analysis. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Security Operations tools can be found at https://cybersectools.com/categories/security-operations
Agentic AI tool for automated malware reverse engineering & phishing analysis.
An open source .NET deobfuscator and unpacker that restores packed and obfuscated assemblies by reversing various obfuscation techniques.
Binwalk is a firmware analysis tool that enables reverse engineering and extraction of embedded file systems and archives from firmware images.