summaryrefslogtreecommitdiffstats
path: root/devel/radare/DETAILS
blob: 2d47e852239fbad9d5537a61d3f52f281a9a8a5f (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
           SPELL=radare
         VERSION=1.5.2
          SOURCE=$SPELL-$VERSION.tar.gz
   SOURCE_URL[0]=http://www.radare.org/get/$SOURCE
     SOURCE_HASH=sha512:128bfddd05dbae163f2143952e8f08177811d1fc7e4d15a8a5356646fa44f780e4515ee32fe033a910fdfd84c2b0b20a8ab77ac9baeb9dd72e46f3ad14d97e15
SOURCE_DIRECTORY="$BUILD_DIRECTORY/$SPELL-$VERSION"
        WEB_SITE=http://www.radare.org/
      LICENSE[0]=GPL
         ENTERED=20080314
           SHORT="unix-like toolchain for reverse engineering"
cat << EOF
radare is a toolchain that aims to create a complete set of utilities for
handling binary files from the command line. It's mainly a hexadecimal editor
for the command line but with advanced features. There are extensions for
debugging processes on x86-32 and ARM, libusb and fd sniffers, binary diffing
utilities, base format conversions, generating graphs of a program, a
cross-platform disassembler as an objdump frontend, and more.
EOF