radare2
A set of reverse engineering tools. More information: https://radare.gitbooks.io/radare2book/.
-
Open a file in write mode without parsing the file format headers:
radare2 -nw {{path/to/binary}}
-
Debug a program:
radare2 -d {{path/to/binary}}
-
Run a script before entering the interactive CLI:
radare2 -i {{path/to/script.r2}} {{path/to/binary}}
-
Show help text for any command in the interactive CLI:
> {{radare2_command}}?
-
Run a shell command from the interactive CLI:
> !{{shell_command}}
-
Dump raw bytes of current block to a file:
> pr > {{path/to/file.bin}}
License and Disclaimer
The content on this page is copyright © 2014—present the tldr-pages team and contributors.This page is used with permission under Creative Commons Attribution 4.0 International License.
While we do attempt to make sure content is accurate, there isn't a warranty of any kind.