radare2-tutorial
radare2-tutorial copied to clipboard
Reverse Engineering using Radare2
Radare2 Tutorial
Reverse Engineering using Radare2
You should run the binary file on a VM and actually take a snapshot before you start. Specially if you do dynamic analysis and you do not know what the sampe does (backdoor, worm, virus, ...)
-
Basics
- Introduction to Raddare2
- Gitbook: Radare2-explorations
- Useful commands
- R2 Cheatsheet
- Radare2 tutorial
- A JOURNEY INTO RADARE 2 – PART 1: SIMPLE CRACKME
-
Reverse Engineering with Radare2
- Intro-to-Reverse-Engineering-and-Debugging-with-Radare2
- Simple example with Radare2
- Mystery bin with Radare2
- Defeating-IOLI-with-radare2
- Analysing-crackme03-with-radare2
- Diving Into Radare2
- Binary Bomb with Radare2 - Prelude
- REVERSE ENGINEERING A GAMEBOY ROM WITH RADARE2
-
Radare2 Explorations
-
Training Materials
-
Others