Iaito 6.1.4 is out! 💥

Tons of stability improvements, new widgets, userfriendly features, brings back the debugger mode, display analysis progress and background webserver ideal for r2mcp.

Full changelog https://github.com/radareorg/iaito/releases/tag/6.1.4 #reverseengineering
#radare2

Hint of the day: if your AI agent runs #radare2 oneliners, set the R2_COLOR=0 environment variable to disable colors and save a bunch of tokens!
Here’s why it’s important to always use r2 from git. In r2land, we follow the law of full disclosure and fix any reported vulnerability within a 24h deadline, as stated in SECURITY.md #radare2 https://blog.calif.io/p/mad-bugs-discovering-a-0-day-in-zero
MAD Bugs: Discovering a 0-Day in Zero Day

Here’s how I used Claude to find and patch a radare2 0-day on my first day at Calif.

Calif
“Reverse Engineering the ITE 8910 Keyboard RGB Protocol for OpenRGB” with #radare2 https://chocapikk.com/posts/2026/reverse-engineering-ite8910-keyboard-rgb/
Reverse Engineering the ITE 8910 Keyboard RGB Protocol for OpenRGB - Chocapikk's Cybersecurity Blog

How I reverse-engineered the complete USB HID protocol of the ITE 8910 keyboard controller from a Windows DLL and .NET executable, and contributed per-key RGB support with 14 modes to OpenRGB - the first implementation for this chip on Linux.

@asher_davila just open sourced its #radare2 Python script for parsing .gopclntab and recovering function symbols from Go binaries, including fully stripped ones. Supports ELF, Mach-O, and PE across Go versions 1.2, 1.16, 1.18, and 1.20+ https://github.com/AsherDLL/r2gopclntabParser #golang #reverseengineering
GitHub - AsherDLL/r2gopclntabParser: A radare2 script to parse the gopclntab to facilitate Reverse Engineering Go binaries.

A radare2 script to parse the gopclntab to facilitate Reverse Engineering Go binaries. - AsherDLL/r2gopclntabParser

GitHub
r2frida 6.1.2 was released with support for tracing syscalls! https://github.com/nowsecure/r2frida/releases/tag/6.1.2 #reverseengineering #radare2

@radareorg was checking it earlier today, will have to update here (probably for tomorrow) :)

EDIT: Iaito 6.1.0 has been build on our buildmasters for 32bit and 64bit, enjoy! :)

#HaikuOS #haikuports #Iaito #radare2 #r2ghidra #r2dec_js #reverseengineering #decompiler #opensource #software #Qt

I read the binaryaudit post few days ago, and despite #radare2 winning the opensource reversing tools benchmark i was surprised that IDA was faster.. but didn’t really checked how they were running it until now 🤦‍♂️ so here i am once again sharing the same basic tips:

- do not install radare2 from debian, their package was updated 5 years ago 👉 use last release deb files or build from source
- do not use aaaa unless you dont care about time 👉 there are many specific analysis
- pdc is not a decompiler, it’s a pseudodisassembler 👉 use r2dec, decai or r2ghidra instead

r2flutter is moving at good pace. Still not yet ready for a release, but quite usable for both iOS and Android. It’s about 3000 LOC, and i’m still trying to stabilize the parsing and carving of all the metadata for strings, class hierarchies, type information and so on.

Dart is tricky but I hope this cli tool and #radare2 plugin will make a difference for reversing Flutter apps when released next month.