summaryrefslogtreecommitdiffstats
path: root/devel/radare/DETAILS
blob: c2c4ce8b2f8274fbc74750d9cc8c533faa2cd058 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
           SPELL=radare
         VERSION=1.5
          SOURCE=$SPELL-$VERSION.tar.gz
   SOURCE_URL[0]=http://www.radare.org/get/$SOURCE
     SOURCE_HASH=sha512:6fe9ca08d6d85a3d7da19a23fcec11fe0ab822203120f4fd15e4a362bb9fd2e988a3ff04ca8cff40849ac0db012cd65760de57dc8537c2401a1925e286150f30
SOURCE_DIRECTORY="$BUILD_DIRECTORY/$SPELL-$VERSION"
        WEB_SITE=http://www.radare.org/
      LICENSE[0]=GPL
         ENTERED=20080314
           SHORT="unix-like toolchain for reverse engineering"
cat << EOF
radare is a toolchain that aims to create a complete set of utilities for
handling binary files from the command line. It's mainly a hexadecimal editor
for the command line but with advanced features. There are extensions for
debugging processes on x86-32 and ARM, libusb and fd sniffers, binary diffing
utilities, base format conversions, generating graphs of a program, a
cross-platform disassembler as an objdump frontend, and more.
EOF