1.9K Followers
2 Following
1.2K Posts
The official radare2 account in the Fediverse
Websitehttps://www.radare.org
GitHubhttps://github.com/radareorg/radare2
Discordhttps://discord.gg/YBey7CR9jf
Conference (Oct 24,25)https://radare.org/con
@pancake hermes is done
@asher_davila just open sourced its #radare2 Python script for parsing .gopclntab and recovering function symbols from Go binaries, including fully stripped ones. Supports ELF, Mach-O, and PE across Go versions 1.2, 1.16, 1.18, and 1.20+ https://github.com/AsherDLL/r2gopclntabParser #golang #reverseengineering
GitHub - AsherDLL/r2gopclntabParser: A radare2 script to parse the gopclntab to facilitate Reverse Engineering Go binaries.

A radare2 script to parse the gopclntab to facilitate Reverse Engineering Go binaries. - AsherDLL/r2gopclntabParser

GitHub

RE: https://infosec.exchange/@NowSecure/116251163921885755

Last wednesday I sat down at the #paulsecurityweekly podcast to talk about static analysis with @radareorg and mobile security. The video/audio is now online! https://www.scworld.com/podcast-segment/14644-hacking-ip-kvms-reversing-with-radare2-sergi-alvarez-psw-918

💥New release of BannedFuncDetector by @seifreed
〰️〰️〰️〰️〰️〰️〰️〰️〰️
BannedFuncDetector is a Python tool that scans binary files to detect banned or insecure functions. It supports traditional radare2 decompilers and AI-assisted decompilation to provide readable output and highlight risky calls.

https://github.com/seifreed/BannedFuncDetector

RE: https://infosec.exchange/@pancake/116256662480219188

The 6.1.2 releases are out! 🥳

🚨LEGENDARY DROP TOMORROW... Pancake 🤝 Paul’s Security Weekly

Reverse engineering, radare, and NowSecure - you won't want to miss this one

#PaulsSecurityWeekly #radare @pancake @securityweekly

You can now choose where to locate the navigation bar and the colors match the selected color theme. Next release will hopefully be next week! Keep up testing and reporting anything you find :)
"Exploring Android Protections on RASP Times" with Frida and Radare2 -- https://www.linkedin.com/pulse/exploring-android-protections-rasp-times-just-mobile-security-lc5gf/
Exploring Android Protections on RASP Times

TL; DR#1: The post will discuss some basic methodologies for exploring the behavior of RASP solutions using static analysis, Frida, and Radare2. No method of bypassing protections will be addressed directly.