LinuxCommandLibrary

r2

Reverse engineering and binary analysis framework

TLDR

Open binary for analysis

$ r2 [binary]
copy
Open in write mode
$ r2 -w [binary]
copy
Open with analysis
$ r2 -A [binary]
copy
Debug mode
$ r2 -d [binary]
copy
Open remote file
$ r2 [gdb://host:port]
copy

SYNOPSIS

r2 [options] [file]

DESCRIPTION

r2 (radare2) is an open-source reverse engineering framework for analyzing, disassembling, debugging, and patching binary files. It supports a wide range of architectures and file formats, providing an interactive command-line shell with hundreds of commands for navigating code, examining data structures, and performing forensic analysis.
The framework includes a built-in disassembler, hex editor, debugger, and scripting engine. The -A flag triggers automatic analysis to identify functions, strings, and cross-references on load, while -d enables live debugging of running processes. Remote analysis is supported through protocols like GDB, allowing connection to embedded targets and virtual machines. Its plugin system and scripting via Python, JavaScript, and r2pipe make it extensible for custom analysis workflows.

PARAMETERS

FILE

Binary file.
-A
Run analysis.
-w
Write mode.
-d
Debug mode.
-a ARCH
Architecture.
-b BITS
Bits (32/64).
-c CMD
Run command.

CAVEATS

Steep learning curve. Powerful but complex.

HISTORY

radare2 was created as a reverse engineering framework.

SEE ALSO

gdb(1), objdump(1), ida(1)

> TERMINAL_GEAR

Curated for the Linux community

Copied to clipboard

> TERMINAL_GEAR

Curated for the Linux community