LinuxCommandLibrary

rabin2

Extract information from binary files

TLDR

Show binary info

$ rabin2 -I [binary]
copy
List symbols
$ rabin2 -s [binary]
copy
List imports
$ rabin2 -i [binary]
copy
List exports
$ rabin2 -E [binary]
copy
List strings
$ rabin2 -z [binary]
copy
List sections
$ rabin2 -S [binary]
copy
Show entry point
$ rabin2 -e [binary]
copy
List libraries
$ rabin2 -l [binary]
copy

SYNOPSIS

rabin2 [-I] [-s] [-i] [-z] [-S] [options] binary

DESCRIPTION

rabin2 extracts information from binary files. It's part of the radare2 reverse engineering framework.
Binary info shows format, architecture, and protections. PIE, canaries, and NX are detected.
Symbol tables reveal function and variable names. Both debug and dynamic symbols listed.
String extraction finds embedded text. Useful for finding hardcoded data.
Section listing shows memory layout. Permissions and sizes are displayed.

PARAMETERS

-I

Binary info.
-s
Symbols.
-i
Imports.
-E
Exports.
-z
Strings.
-S
Sections.
-e
Entry points.
-l
Libraries.
-H
Header fields.
-c
Classes (ObjC/Java).
-j
JSON output.

CAVEATS

Part of radare2. Large binaries may be slow. Stripped binaries have limited info.

HISTORY

rabin2 is part of radare2, created by pancake (Sergi Alvarez) around 2006. It provides binary analysis without full disassembly.

SEE ALSO

r2(1), objdump(1), readelf(1), nm(1)

> TERMINAL_GEAR

Curated for the Linux community

Copied to clipboard

> TERMINAL_GEAR

Curated for the Linux community