1.9K Followers
2 Following
1.2K Posts
The official radare2 account in the Fediverse
Websitehttps://www.radare.org
GitHubhttps://github.com/radareorg/radare2
Discordhttps://discord.gg/YBey7CR9jf
Conference (Oct 24,25)https://radare.org/con

Codex plugins are packages for skills, mcps and prompts, adding descriptions, icon and tie them to distributed marketplaces to handle updates. r2mcp is now distributed as one.

Just run “make codex-plugin-install” and enjoy it in vscode, codex app and codex cli!

“Reverse Engineering the ITE 8910 Keyboard RGB Protocol for OpenRGB” with #radare2 https://chocapikk.com/posts/2026/reverse-engineering-ite8910-keyboard-rgb/
Reverse Engineering the ITE 8910 Keyboard RGB Protocol for OpenRGB - Chocapikk's Cybersecurity Blog

How I reverse-engineered the complete USB HID protocol of the ITE 8910 keyboard controller from a Windows DLL and .NET executable, and contributed per-key RGB support with 14 modes to OpenRGB - the first implementation for this chip on Linux.

@pancake with xref and control flow now 
@pancake hermes is done
@asher_davila just open sourced its #radare2 Python script for parsing .gopclntab and recovering function symbols from Go binaries, including fully stripped ones. Supports ELF, Mach-O, and PE across Go versions 1.2, 1.16, 1.18, and 1.20+ https://github.com/AsherDLL/r2gopclntabParser #golang #reverseengineering
GitHub - AsherDLL/r2gopclntabParser: A radare2 script to parse the gopclntab to facilitate Reverse Engineering Go binaries.

A radare2 script to parse the gopclntab to facilitate Reverse Engineering Go binaries. - AsherDLL/r2gopclntabParser

GitHub

RE: https://infosec.exchange/@NowSecure/116251163921885755

Last wednesday I sat down at the #paulsecurityweekly podcast to talk about static analysis with @radareorg and mobile security. The video/audio is now online! https://www.scworld.com/podcast-segment/14644-hacking-ip-kvms-reversing-with-radare2-sergi-alvarez-psw-918

💥New release of BannedFuncDetector by @seifreed
〰️〰️〰️〰️〰️〰️〰️〰️〰️
BannedFuncDetector is a Python tool that scans binary files to detect banned or insecure functions. It supports traditional radare2 decompilers and AI-assisted decompilation to provide readable output and highlight risky calls.

https://github.com/seifreed/BannedFuncDetector

RE: https://infosec.exchange/@pancake/116256662480219188

The 6.1.2 releases are out! 🥳

🚨LEGENDARY DROP TOMORROW... Pancake 🤝 Paul’s Security Weekly

Reverse engineering, radare, and NowSecure - you won't want to miss this one

#PaulsSecurityWeekly #radare @pancake @securityweekly