Tool and Usage
- Year of inception
- Programming language
- Sergi Alvarez
- Latest release
- Latest release date
Why this tool?
Radare stands for RAw DAta REcovery. It helps with performing analysis on files and images to retrieve useful artifacts. This can be used to better understand how malware works, recover lost data, or troubleshoot why software is crashing. In 2014, radare1 was replaced by radare2, which was a parallel work and a full rewrite. It then was released under the LGPLv3 license.
Usage and audience
radare2 is commonly used for digital forensics, reverse engineering, software exploitation, or troubleshooting. Target users for this tool are security professionals.
- text user interface
Tool review and remarks
The review and analysis of this project resulted in the following remarks for this security tool:
- + More than 500 contributors
- + More than 8000 GitHub stars
- + Many releases available
- + The source code of this software is available
Supported operating systems
Radare2 is known to work on Android, FreeBSD, Haiku, Linux, Microsoft Windows, NetBSD, OpenBSD, Solaris, iOS, and macOS.
Similar tools to radare2:
Cutter is a graphical user interface for radare2, the well-known reverse engineering framework. Read how it works in this review.
LIEF is a library to analyze executable formats like ELF, MachO, and PE. It can be used during reverse engineering, binary analysis, and malware research.
Looking for a way to perform reverse engineering or dynamic analysis? PyREBox is an instrumentation tool for virtual machines. Learn how it works and its benefits.
This tool page was updated at . Found an improvement? Help the community by submitting an update.
Related tool information
This tool is categorized as a Linux malware analysis tool, Linux reverse engineering tool, Linux static analysis tool, binary analysis tool, digital forensics tool, exploit development tool, and file system forensics tool.