radare2

radare2

UNIX-like reverse engineering framework and command-line toolset

github Security C free
★ 23,601Stars
3,211Forks
23,601Watchers
0Views
May 2026Last Update

About radare2

UNIX-like reverse engineering framework and command-line toolset

What you should know about radare2

radare2 — UNIX-like reverse engineering framework and command-line toolset. It is categorized under Security and primarily built with C. The project has gathered 23,601 stars and 3,211 forks on GitHub, indicating strong adoption among developers.

Pricing & licensing: This tool is offered free of charge , released under the Unknown license. The source code is openly available on GitHub, allowing engineers to audit, contribute, or fork as needed.

Use cases & topics: radare2 is associated with the following topics: binary-analysis, c, commandline, disassembler, forensics, hacktoberfest, malware-analysis, radare2. Teams working in binary-analysis / c / commandline spaces typically evaluate this kind of tool when scoping new architecture decisions or replacing legacy components.

Getting started: Check out the official GitHub repository for installation steps, configuration examples, and the latest release notes. Most teams hit value within the first week if the tool aligns with their existing Security stack.

Editor's note from Fanny Engriana (Founder, Wardigi Digital Agency): when evaluating tools in the Security category for our agency clients, we look at three things first — license clarity, community size, and active maintenance. Tools with explicit license terms and ongoing commits tend to remain viable across multi-year projects.

Related Tools