1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
|
. "$GRIMOIRE"/FUNCTIONS &&
SPELL=radare2
if [[ "$RADARE2_BRANCH" == "stable" ]]
then
VERSION=5.2.1
SOURCE="${SPELL}-${VERSION}.tar.xz"
SOURCE_URL[0]="https://github.com/radare/radare2/archive/$VERSION.tar.gz"
SOURCE_HASH=sha512:c744f5c8fff163022a7a9a913fe34dfa0dee0d9ab3b18bd4cc038c2d487dbfeba2f1523aa12a3166a2c22c45bcc71e802fae101b72fc2e6adab96b522c0de17b
SOURCE_DIRECTORY="${BUILD_DIRECTORY}/${SPELL}-${VERSION}"
else
VERSION=$(get_scm_version)
SOURCE_IGNORE=volatile
FORCE_DOWNLOAD=on
SOURCE="${SPELL}-git.tar.bz2"
SOURCE_URL[0]="git://github.com/radare/$SPELL"
SOURCE_DIRECTORY="${BUILD_DIRECTORY}/${SPELL}-git"
fi
WEB_SITE="http://radare.org"
LICENSE[0]=GPL
ENTERED=20110506
SHORT="open source reverse engineering framework"
cat << EOF
radare is a reverse engineering framework with tools to disassemble, debug,
analyze and manipulate binary files. The tools provided form a unix-like
toolchain.
* Multi-architecture multi-platform
- GNU/Linux, BSD, OSX, iPhoneOS, Windows and Solaris
- x86{32,64}, arm, java, powerpc, mips
- PE{32,64}, [fat]MACH0{32,64}, ELF{32,64}, CLASS
* Highly scriptable
- Batch mode and native plugins with full internal API access
- Vala, Go, Python, ruby, perl, lua, Java, shellscript, ..
- Scripting language based in mnemonic commands and macros
* Hexadecimal editor
- 64-bit offset support with virtual addressing and section maps
- Assemble and disassemble from/to many architectures
- Colorizes opcodes, bytes and debug register changes
- Print data in various formats (int, float, disasm, timestamp, ..)
- Search multiple patterns or keywords with binary mask support
- Checksumming and data analysis of byte blocks
* IO is wrapped
- Support Files, disks, processes and streams
- Virtual addressing with sections and multiple file mapping
- Handles gdb:// and rap:// remote protocols
* Debugger support
- Software and hardware breakpoints
- Tracing and logging facilities
* Diffing between two functions or binaries
- Graphviz friendly code analysis graphs
- Colorize nodes and edges
* Code analysis at opcode, basicblock, function levels
- Embedded simple virtual machine to emulate code
- Keep track of code and data references
- Function calls and syscall decompilation
- Function description, comments and library signatures
EOF
|