A reverse engineering framework and command-line toolset for binary analysis, disassembly, debugging, and forensic tasks.
Rizin is a reverse engineering framework and command-line toolset for analyzing binaries, disassembling code, debugging programs, and performing forensic tasks. It is a fork of radare2 designed with a focus on usability, features, and code cleanliness, supporting a wide range of file formats and CPU architectures.
Security researchers, malware analysts, forensic investigators, and developers working with low-level code who need a portable, scriptable tool for binary analysis and debugging.
Developers choose Rizin for its extensive architecture and file format support, scriptability through multiple language bindings, and its commitment to usability and clean code compared to other reverse engineering frameworks.
UNIX-like reverse engineering framework and command-line toolset.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Supports over 30 CPU architectures including x86, ARM, RISC-V, and retro systems like GameBoy, enabling analysis across diverse hardware platforms.
Handles a wide range of file formats such as ELF, PE, Mach-O, and Android boot images, making it versatile for various binary analysis tasks.
Offers language bindings for Python, Haskell, OCaml, Ruby, Rust, and Go via rzpipe, allowing automation and integration with existing workflows.
Runs on multiple operating systems including Windows, macOS, Linux, and mobile platforms like Android, ensuring tool consistency across environments.
Requires building from source with meson, as per the README, which can be more involved and error-prone compared to installing pre-compiled binaries.
Despite usability improvements, the framework has a vast command set and conceptual depth, which can overwhelm newcomers to reverse engineering.
Primarily command-line based, so users seeking graphical interfaces for intuitive analysis may find it lacking compared to tools like Ghidra.