{"id":15355,"date":"2021-08-02T20:34:39","date_gmt":"2021-08-02T15:04:39","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=15355"},"modified":"2021-08-02T20:34:39","modified_gmt":"2021-08-02T15:04:39","slug":"radare2","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/radare2\/","title":{"rendered":"Radare2 : UNIX-like Reverse Engineering Framework And Command-Line Toolset"},"content":{"rendered":"\n<p><strong>Radare2<\/strong> is a rewrite from scratch of radare. It provides a set of libraries, tools and plugins to ease reverse engineering tasks.<\/p>\n\n\n\n<p>The radare project started as a simple command-line hexadecimal editor focused on forensics, over time more features were added to support a scriptable command-line low level tool to edit from local hard drives, kernel memory, programs, remote gdb servers and be able to analyze, emulate, debug, modify and disassemble any binary.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-NWJXPkKoXjc\/YQKxE4kB4cI\/AAAAAAAAKSw\/P3C_AHF9opslUth-37rsMXysr-pj6xb3QCLcBGAsYHQ\/s1920\/shot.png\" alt=\"\"\/><\/figure>\n\n\n\n<ul class=\"wp-block-list\"><li>Install r2 from&nbsp;<strong>Git<\/strong>&nbsp;(Clone the repo and run&nbsp;<code><strong>sys\/install.sh<\/strong><\/code>) or use&nbsp;<code><strong>pip install r2env<\/strong><\/code><\/li><li>Read the&nbsp;Official radare2 book<\/li><li>COMMUNITY.md&nbsp;engagement<\/li><li>CONTRIBUTING.md&nbsp;general rules<\/li><li>DEVELOPERS.md&nbsp;to improve r2 for your needs<\/li><li>SECURITY.md&nbsp;on vulnerability report instructions<\/li><li>USAGE.md&nbsp;for an introductory session<\/li><li>INSTALL.md&nbsp;instructions<\/li><\/ul>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>git clone https:\/\/github.com\/radareorg\/radare2<br>radare2\/sys\/install.sh<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Plugins<\/strong><\/p>\n\n\n\n<p>Most of the plugins you need may be available in the stock r2 installation, but you can find more in the&nbsp;r2pm&nbsp;package manager.<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>r2pm update # initialize and update the package database<br>r2pm install [pkg] # installs the package<\/strong><\/p>\n\n\n\n<p>Some of the most installed packages are:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>r2ghidra&nbsp;the native ghidra decompiler plugin:&nbsp;<code><strong>pdg<\/strong><\/code>&nbsp;command<\/li><li>esilsolve&nbsp;symbolic execution r2 plugin based on esil and z3<\/li><li>r2dec&nbsp;decompiler based on r2 written in js&nbsp;<code><strong>pdd<\/strong><\/code><\/li><li>r2frida&nbsp;the frida io plugin&nbsp;<code><strong>r2 frida:\/\/0<\/strong><\/code><\/li><li>iaito&nbsp;&#8211; official graphical interface (Qt)<\/li><\/ul>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Operating Systems<\/strong><\/p>\n\n\n\n<p>Windows (since XP), Linux, Darwin, GNU\/Hurd, Apple&#8217;s {Mac,i,iPad,watch}OS, Android [Dragonfly, Net, Free, Open] BSD, Z\/OS, QNX, Solaris, Haiku, FirefoxOS.<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><a href=\"https:\/\/github.com\/radareorg\/radare2#architectures\"><\/a><strong>Architectures<\/strong><\/p>\n\n\n\n<p>i386, x86-64, ARM, MIPS, PowerPC, SPARC, RISC-V, SH, m68k, m680x, AVR, XAP, S390, XCore, CR16, HPPA, ARC, Blackfin, Z80, H8\/300, V810, V850, CRIS, XAP, PIC, LM32, 8051, 6502, i4004, i8080, Propeller, Tricore, CHIP-8, LH5801, T8200, GameBoy, SNES, SPC700, MSP430, Xtensa, NIOS II, Java, Dalvik, WebAssembly, MSIL, EBC, TMS320 (c54x, c55x, c55+, c66), Hexagon, Brainfuck, Malbolge, whitespace, DCPU16, LANAI, MCORE, mcs96, RSP, SuperH-4, VAX, AMD Am29000.<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><a href=\"https:\/\/github.com\/radareorg\/radare2#file-formats\"><\/a><strong>File Formats<\/strong><\/p>\n\n\n\n<p>ELF, Mach-O, Fatmach-O, PE, PE+, MZ, COFF, OMF, TE, XBE, BIOS\/UEFI, Dyldcache, DEX, ART, CGC, Java class, Android boot image, Plan9 executable, ZIMG, MBN\/SBL bootloader, ELF coredump, MDMP (Windows minidump), WASM (WebAssembly binary), Commodore VICE emulator, QNX, WAD, OFF, Game Boy (Advance), Nintendo DS ROMs and Nintendo 3DS FIRMs, various filesystems.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-vivid-cyan-blue-background-color has-background\" href=\"https:\/\/github.com\/radareorg\/radare2\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Radare2 is a rewrite from scratch of radare. It provides a set of libraries, tools and plugins to ease reverse engineering tasks. The radare project started as a simple command-line hexadecimal editor focused on forensics, over time more features were added to support a scriptable command-line low level tool to edit from local hard drives, [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":16997,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/1.bp.blogspot.com\/-UpK6Z0VH0_Y\/YQKza2CGw1I\/AAAAAAAAKS4\/vtKKOIoTAE4KBIfSWDL3mGlXA8s4ou04QCLcBGAsYHQ\/s676\/1505888016423.png","fifu_image_alt":"Radare2 : UNIX-like Reverse Engineering Framework And Command-Line Toolset","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[630,1255,2713,2834,3471],"class_list":["post-15355","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-command-line-2","tag-framework","tag-radare2","tag-reverse-engineering","tag-unix"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Radare2 : UNIX-like Reverse Engineering Framework And CL Toolset<\/title>\n<meta name=\"description\" content=\"Radare2 is a rewrite from scratch of radare. It provides a set of libraries, tools and plugins to ease reverse engineering tasks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/radare2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Radare2 : UNIX-like Reverse Engineering Framework And CL Toolset\" \/>\n<meta property=\"og:description\" content=\"Radare2 is a rewrite from scratch of radare. It provides a set of libraries, tools and plugins to ease reverse engineering tasks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/radare2\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-02T15:04:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-UpK6Z0VH0_Y\/YQKza2CGw1I\/AAAAAAAAKS4\/vtKKOIoTAE4KBIfSWDL3mGlXA8s4ou04QCLcBGAsYHQ\/s676\/1505888016423.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/1.bp.blogspot.com\/-UpK6Z0VH0_Y\/YQKza2CGw1I\/AAAAAAAAKS4\/vtKKOIoTAE4KBIfSWDL3mGlXA8s4ou04QCLcBGAsYHQ\/s676\/1505888016423.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/radare2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/radare2\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Radare2 : UNIX-like Reverse Engineering Framework And Command-Line Toolset\",\"datePublished\":\"2021-08-02T15:04:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/radare2\/\"},\"wordCount\":400,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/radare2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-UpK6Z0VH0_Y\/YQKza2CGw1I\/AAAAAAAAKS4\/vtKKOIoTAE4KBIfSWDL3mGlXA8s4ou04QCLcBGAsYHQ\/s676\/1505888016423.png\",\"keywords\":[\"Command-Line\",\"Framework\",\"Radare2\",\"Reverse Engineering\",\"unix\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/radare2\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/radare2\/\",\"name\":\"Radare2 : UNIX-like Reverse Engineering Framework And CL Toolset\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/radare2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/radare2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-UpK6Z0VH0_Y\/YQKza2CGw1I\/AAAAAAAAKS4\/vtKKOIoTAE4KBIfSWDL3mGlXA8s4ou04QCLcBGAsYHQ\/s676\/1505888016423.png\",\"datePublished\":\"2021-08-02T15:04:39+00:00\",\"description\":\"Radare2 is a rewrite from scratch of radare. It provides a set of libraries, tools and plugins to ease reverse engineering tasks.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/radare2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/radare2\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/-UpK6Z0VH0_Y\/YQKza2CGw1I\/AAAAAAAAKS4\/vtKKOIoTAE4KBIfSWDL3mGlXA8s4ou04QCLcBGAsYHQ\/s676\/1505888016423.png\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/-UpK6Z0VH0_Y\/YQKza2CGw1I\/AAAAAAAAKS4\/vtKKOIoTAE4KBIfSWDL3mGlXA8s4ou04QCLcBGAsYHQ\/s676\/1505888016423.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Radare2 : UNIX-like Reverse Engineering Framework And CL Toolset","description":"Radare2 is a rewrite from scratch of radare. It provides a set of libraries, tools and plugins to ease reverse engineering tasks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/radare2\/","og_locale":"en_US","og_type":"article","og_title":"Radare2 : UNIX-like Reverse Engineering Framework And CL Toolset","og_description":"Radare2 is a rewrite from scratch of radare. It provides a set of libraries, tools and plugins to ease reverse engineering tasks.","og_url":"https:\/\/kalilinuxtutorials.com\/radare2\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2021-08-02T15:04:39+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-UpK6Z0VH0_Y\/YQKza2CGw1I\/AAAAAAAAKS4\/vtKKOIoTAE4KBIfSWDL3mGlXA8s4ou04QCLcBGAsYHQ\/s676\/1505888016423.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/1.bp.blogspot.com\/-UpK6Z0VH0_Y\/YQKza2CGw1I\/AAAAAAAAKS4\/vtKKOIoTAE4KBIfSWDL3mGlXA8s4ou04QCLcBGAsYHQ\/s676\/1505888016423.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/radare2\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/radare2\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Radare2 : UNIX-like Reverse Engineering Framework And Command-Line Toolset","datePublished":"2021-08-02T15:04:39+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/radare2\/"},"wordCount":400,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/radare2\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-UpK6Z0VH0_Y\/YQKza2CGw1I\/AAAAAAAAKS4\/vtKKOIoTAE4KBIfSWDL3mGlXA8s4ou04QCLcBGAsYHQ\/s676\/1505888016423.png","keywords":["Command-Line","Framework","Radare2","Reverse Engineering","unix"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/radare2\/","url":"https:\/\/kalilinuxtutorials.com\/radare2\/","name":"Radare2 : UNIX-like Reverse Engineering Framework And CL Toolset","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/radare2\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/radare2\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-UpK6Z0VH0_Y\/YQKza2CGw1I\/AAAAAAAAKS4\/vtKKOIoTAE4KBIfSWDL3mGlXA8s4ou04QCLcBGAsYHQ\/s676\/1505888016423.png","datePublished":"2021-08-02T15:04:39+00:00","description":"Radare2 is a rewrite from scratch of radare. It provides a set of libraries, tools and plugins to ease reverse engineering tasks.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/radare2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/radare2\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/-UpK6Z0VH0_Y\/YQKza2CGw1I\/AAAAAAAAKS4\/vtKKOIoTAE4KBIfSWDL3mGlXA8s4ou04QCLcBGAsYHQ\/s676\/1505888016423.png","contentUrl":"https:\/\/1.bp.blogspot.com\/-UpK6Z0VH0_Y\/YQKza2CGw1I\/AAAAAAAAKS4\/vtKKOIoTAE4KBIfSWDL3mGlXA8s4ou04QCLcBGAsYHQ\/s676\/1505888016423.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/1.bp.blogspot.com\/-UpK6Z0VH0_Y\/YQKza2CGw1I\/AAAAAAAAKS4\/vtKKOIoTAE4KBIfSWDL3mGlXA8s4ou04QCLcBGAsYHQ\/s676\/1505888016423.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":37410,"url":"https:\/\/kalilinuxtutorials.com\/my-awesome-list\/","url_meta":{"origin":15355,"position":0},"title":"My Awesome List : Tools And Their Functions","author":"Varshini","date":"March 31, 2025","format":false,"excerpt":"\"My Awesome List\" is a curated collection of tools, libraries, and resources spanning various domains such as cybersecurity, programming, reverse engineering, and more. Below is an overview of some notable tools and their functions: Networking Tools Wireshark: A powerful network protocol analyzer used for troubleshooting, analysis, and development of communication\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/My-Awesome-List.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/My-Awesome-List.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/My-Awesome-List.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/My-Awesome-List.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/My-Awesome-List.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/My-Awesome-List.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":8569,"url":"https:\/\/kalilinuxtutorials.com\/yarasafe\/","url_meta":{"origin":15355,"position":1},"title":"Yarasafe : SAFE Embeddings To Match Functions In Yara","author":"R K","date":"January 26, 2020","format":false,"excerpt":"YARASAFE is for automatic binary function similarity checks with Yara. SAFE is a tool developed to create Binary Functions Embedding developed by Massarelli L., Di Luna G.A., Petroni F., Querzoni L. and Baldoni R. You can use SAFE to create your function embedding to use inside yara rules. If you\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1184,"url":"https:\/\/kalilinuxtutorials.com\/androl4b-2\/","url_meta":{"origin":15355,"position":2},"title":"Androl4b &#8211; Android Security Virtual Machine","author":"R K","date":"May 6, 2018","format":false,"excerpt":"AndroL4b is an android security virtual machine in view of ubuntu-mate incorporates the gathering of most recent framework, tutorials and labs from various security nerds and researchers for reverse engineering and malware analysis. Changes in Androl4b v.3? Tools are updated New tools and lab added Upgraded to Ubuntu mate 17.04\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"Androl4b","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/05\/1-1.png?resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/05\/1-1.png?resize=350%2C200 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/05\/1-1.png?resize=525%2C300 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/05\/1-1.png?resize=700%2C400 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/05\/1-1.png?resize=1050%2C600 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/05\/1-1.png?resize=1400%2C800 4x"},"classes":[]},{"id":3783,"url":"https:\/\/kalilinuxtutorials.com\/beebug-checking-exploitability\/","url_meta":{"origin":15355,"position":3},"title":"BeeBug : A tool for checking Exploitability","author":"R K","date":"February 8, 2019","format":false,"excerpt":"BeeBug is a tool that can be used to verify if a program crash could be exploitable. This tool was presented the first time at r2con 2018 in Barcelona. Some implemented functionality are: Stack overflow on libcCrash on Program CounterCrash on branchCrash on write memoryHeap vulnerabilitiesRead access violation (some exploitable\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1034,"url":"https:\/\/kalilinuxtutorials.com\/androl4b\/","url_meta":{"origin":15355,"position":4},"title":"A Virtual Machine For Assessing Android applications, Reverse Engineering and Malware Analysis &#8211; AndroL4b","author":"R K","date":"April 27, 2018","format":false,"excerpt":"AndroL4b is an android security virtual machine in view of ubuntu-mate incorporates the accumulation of most recent framework, instructional exercises and labs from various security nerds and researchers for figuring out and malware analysis. What's new in Androl4b v.3? Tools are updated New tools and lab included Upgraded to Ubuntu\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"AndroL4b","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":6226,"url":"https:\/\/kalilinuxtutorials.com\/firmware-slap-vulnerabilities-concolic-analysis-function-clustering\/","url_meta":{"origin":15355,"position":5},"title":"Firmware Slap : Discovering Vulnerabilities In Firmware Through Concolic Analysis &#038; Function Clustering","author":"R K","date":"August 20, 2019","format":false,"excerpt":"Firmware slap combines concolic analysis with function clustering for vulnerability discovery and function similarity in firmware. Firmware slap is built as a series of libraries and exports most information as either pickles or JSON for integration with other tools. Setup Firmware slap should be run in a virtual environment. It\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/15355","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=15355"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/15355\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/16997"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=15355"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=15355"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=15355"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}