From Wikipedia, the free encyclopedia
Jump to navigation Jump to search
Shown is Iaito, the graphical user interface of radare2
Original author(s)Sergi Alvarez (pancake)
Developer(s)pancake and the community
Stable release
5.2.1 / April 21, 2021; 4 months ago (2021-04-21)[1]
Written inC[2]
Operating systemLinux, BSD, macOS, Microsoft Windows, Haiku, Android, iOS, Solaris
Available inEnglish
Websitewww.radare.org/r/ Edit this on Wikidata

Radare2 (also known as r2) is a complete framework for reverse-engineering and analyzing binaries; composed of a set of small utilities that can be used together or independently from the command line. Built around a disassembler for computer software which generates assembly language source code from machine-executable code, it supports a variety of executable formats for different processor architectures and operating systems.


Radare2 was created in February 2006,[3] aiming to provide a free and simple command-line interface for a hexadecimal editor supporting 64 bit offsets to make searches and recovering data from hard-disks, for forensic purposes. Since then, the project has grown with the aim changed to provide a complete framework for analyzing binaries while adhering to several principles of the Unix philosophy.[4]

In 2009, the decision was made to completely rewrite it, to get around limitations in the initial design. Since then, the project continued to grow,[5] and attracted several resident developers.

In 2016, the first r2con took place in Barcelona,[6][7] gathering more than 100 participants, featuring various talks about various features and improvements of the framework.

Radare2 has been the focus of multiple presentations at several high-profile security conferences, like the recon,[8] hack.lu,[9] 33c3.[3]

Radare2 was forked in December 2020 as Rizin by some members of the radare2 and Cutter core development teams who seek to "focus on usability, stability, and working features, which strives to provide a welcoming environment for developers and users alike."[10][11]

Features and usage[edit]

Radare2 has a steep learning curve since it does not have a GUI by itself. Originally built around a hexadecimal editor, it has now a multitude of tools and features, and also bindings for several languages.[12] Meanwhile it has a WebUI[13] and there is an external Qt GUI called Cutter (formerly named Iaito).[14]

Static analysis[edit]

Radare2 is able to assemble and disassemble a lot of software programs, mainly executables, but it can also perform binary diffing with graphs,[15] extract information like relocations symbols, and various other types of data. Internally, it uses a NoSQL database named sdb to keep track of analysis information that can be inferred by radare2 or manually added by the user. Since it is able to deal with malformed binaries, it has also been used by software security researchers for analysis purposes.[16][17][18]

Dynamic analysis[edit]

Radare2 has a built-in debugger that is lower-level than GDB. It can also interface with GDB and WineDBG[19] to debug Windows binaries on other systems. In addition, it can also be used as a kernel debugger with VMWare.

Software exploitation[edit]

Since it features a disassembler and a low-level debugger, radare2 can be useful to developers of exploits. The software has features which assist in exploit development, such as a ROP gadget search engine and mitigation detection. Because of the software's flexibility and support for many file formats, it is often used by capture the flag teams[20][21] and other security-oriented personnel.[22] Radare2 can also assist in creating shellcodes with its 'ragg2' tool, similar to metasploit.


Cutter was the first official graphical user interface (GUI) for radare2. It is mostly aimed "on those who[se] are not yet radare2 users because of the learning curve, because they don't like CLI applications or because of the difficulty/instability of radare2". It was the successor of the formerly known project Iaito that suffered from too little maintenance after it became open source on GitHub. Later on Iaito was forked and heavily rewritten, again with C++ and Qt as its base. These design choices enable it to be a cross platform application targeting Linux, MacOS as well as Windows. At the same time, it was renamed to Cutter. Cutter's goal is to export the extensive functionality of radare2 to a modern user friendly GUI that can compete with other major static and dynamic analysis frameworks like Hex-Rays Interactive Disassembler, or Binary Ninja.

In 2020, the core team of Cutter, who was also a part of radare2's core team, left radare2 and co-founded Rizin. Following this, Cutter switched from radare2 to Rizin as its backend.[23] Currently, Iaito is a fork of Cutter with the last working commit with radare2.[24]

Supported architectures/formats[edit]


  1. ^ "Releases · radareorg/radare2". github.com. Retrieved 2021-04-26.
  2. ^ Git repository
  3. ^ a b "Radare demystified". Chaos Computer Club media site. CCC. 2016-12-29. Retrieved 2016-12-29.
  4. ^ "I have written more than 300.000 code lines for Radare". www.cigtr.info. Archived from the original on 2018-11-03. Retrieved 2017-01-21.
  5. ^ CCC, radare demystified, retrieved 2017-01-21
  6. ^ "r2con 2016". NCC Group. Retrieved 2017-01-21.
  7. ^ Bakken, Sam (2016-08-09). "The hacker behind open-source, reverse-engineering tool Radare..." NowSecure. Retrieved 2017-01-21.
  8. ^ "Recon 2015 Schedule". recon.cx. Retrieved 2017-01-21.
  9. ^ "Talks at Hack.lu 2015". Hack.lu 2015. Retrieved 2017-01-21.
  10. ^ Announcing Rizin!
  11. ^ Cutter Team. "Cutter 2.0 Release". Cutter. Cutter. Retrieved 14 August 2021.
  12. ^ Git repository for radare2's bindings
  13. ^ The new web interface
  14. ^ Cutter
  15. ^ "Binary Diffing" visual en Linux con Radare2
  16. ^ AlienVault - OSX/Leverage.a Analysis
  17. ^ Craig Heffner - Finding and Reversing Backdoors in Consumer Firmware
  18. ^ PHDays IV, May 21, 2014, 'Anton Kochkov', Application of radare2 illustrated by Shylock/Caphaw.D and Snakso.A analysis
  19. ^ Gmane archive about WinDBG support in radare2
  20. ^ Dragon Sector
  21. ^ LSE
  22. ^ Phrack - manual binary mangling with radare
  23. ^ Rizin (2020-12-05). "Frequently Asked Questions". Rizin. Retrieved 2021-04-26.
  24. ^ "iaito". rada.re. Retrieved 14 August 2021.
  25. ^ Dydl cache - iphonedevwiki.net
  26. ^ .XBE File Format 1.1
  27. ^ Tavis Ormandy - Fun with Constrained Programming

Further reading[edit]

External links[edit]