A libre, Unix-like reverse engineering framework and command-line toolset for analyzing, debugging, and modifying binaries.
Radare2 is a free and open-source reverse engineering framework and command-line toolset designed for analyzing, debugging, and modifying binary files. It provides a comprehensive suite of tools for disassembly, hex editing, scripting, and forensic analysis, supporting a wide range of architectures and operating systems. It solves the need for a powerful, scriptable, and extensible alternative to proprietary reverse engineering software.
Security researchers, malware analysts, forensic investigators, and low-level developers who need to dissect and manipulate binaries across diverse platforms and architectures.
Developers choose Radare2 for its unparalleled flexibility, extensive architecture support, and libre licensing (LGPLv3). Its scriptable nature and rich plugin ecosystem allow deep customization and integration, making it a versatile tool for both automated analysis and interactive exploration.
UNIX-like reverse engineering framework and command-line toolset
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Supports over 50 CPU architectures and numerous file formats, from ELF to WebAssembly, enabling analysis of binaries across embedded systems, mobile, and desktop platforms.
Features an embedded JavaScript interpreter and r2pipe for integration with any programming language, allowing automation of complex analysis and vulnerability research tasks.
Through r2pm, users can install plugins like r2ghidra for decompilation and r2frida for dynamic instrumentation, significantly expanding core functionality beyond the command-line.
Retains advanced hex editing and memory analysis features from its origins, making it suitable for disk forensics and low-level file manipulation, as highlighted in the usage examples.
The command-line interface has hundreds of cryptic commands and flags, requiring memorization and practice, which the README acknowledges by pointing to extensive external resources like books and videos.
Learning materials are scattered across the official book, YouTube talks, blog posts, and community chats, making it challenging for new users to find consistent, up-to-date guidance.
Installation often involves building from source with scripts or managing dependencies via r2pm, and Windows setup requires manual steps with meson and compilers, which can be error-prone.
radare2 is an open-source alternative to the following products:
Ghidra is a software reverse engineering framework developed by the NSA, used for analyzing compiled code and understanding software functionality.
IDA Pro is the professional version of the Interactive Disassembler, featuring advanced debugging and analysis tools for reverse engineering.
Hopper is a reverse engineering tool and disassembler for macOS, Linux, and Windows that allows analysis of executable files, with features for decompilation and debugging.