4
I Use This!
Activity Not Available
Analyzed 3 months ago. based on code collected about 3 years ago.

Project Summary

Open-source advanced command line hexadecimal editor, debugger and disassembler for multiples architectures and platforms:

- GNU/Linux, Android, *BSD, OSX, iPhoneOS, Windows{32,64} and Solaris.
- x86{16,32,64}, dalvik, avr, arm, java, powerpc, sparc, mips, bf.
- pe{32,64}, [fat]mach0{32,64}, elf{32,64}, dex and java classes.

It includes several features to read and edit opcodes for different processors, including a process debugger, binary diffing capabilities, filesystem support, code analysis and more.

Tags

binary curses debug debugger debugging debuggingtool disassembler disassembling disassembly hex hexadecimal hexeditor reverse-engineering reverse_engineering reverseengineering tui

Badges

GNU General Public License v2.0 or later
Permitted

Commercial Use

Modify

Distribute

Place Warranty

Forbidden

Sub-License

Hold Liable

Required

Distribute Original

Disclose Source

Include Copyright

State Changes

Include License

These details are provided for information only. No information here is legal advice and should not be used as such.

GNU General Public License v3.0 or later
Permitted

Commercial Use

Modify

Distribute

Place Warranty

Use Patent Claims

Forbidden

Sub-License

Hold Liable

Required

Distribute Original

Disclose Source

Include Copyright

State Changes

Include License

Include Install Instructions

These details are provided for information only. No information here is legal advice and should not be used as such.

GNU Lesser General Public License v3.0 or later
Permitted

Commercial Use

Modify

Distribute

Place Warranty

Use Patent Claims

Forbidden

Sub-License

Hold Liable

Required

Distribute Original

Disclose Source

Include Copyright

State Changes

Include License

Include Install Instructions

These details are provided for information only. No information here is legal advice and should not be used as such.

Project Security

Vulnerabilities per Version ( last 10 releases )

Project Vulnerability Report

Security Confidence Index

Poor security track-record
Favorable security track-record

Vulnerability Exposure Index

Many reported vulnerabilities
Few reported vulnerabilities

Did You Know...

  • ...
    nearly 1 in 3 companies have no process for identifying, tracking, or remediating known open source vulnerabilities
  • ...
    data presented on the Open Hub is available through our API
  • ...
    there are over 3,000 projects on the Open Hub with security vulnerabilities reported against them
  • ...
    anyone with an Open Hub account can update a project's tags
About Project Security

Languages

C
88%
C++
5%
27 Other
7%

30 Day Summary

Dec 13 2020 — Jan 12 2021

12 Month Summary

Jan 12 2020 — Jan 12 2021
  • 8529 Commits
    Up + 4797 (128%) from previous 12 months
  • 344 Contributors
    Up + 150 (77%) from previous 12 months

Ratings

3 users rate this project:
5.0
 
5.0/5.0
Click to add your rating
  
Review this Project!
 

Static Analysis ( Generated by Coverity Scan for radare2 )

Repository URL: https://github.com/radare/radare2

Version: trunk

2022-11-10
Last Analyzed
1,720,904
Lines of Code Analyze
1.15
Defect Density

Defects by status for current build

5,958
Total defects
925
Outstanding
4,961
Fixed

CWE Top 25 defects

ID CWE-Name Number of Defects
120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') 3
190 Integer Overflow or Wraparound 9
676 Use of Potentially Dangerous Function 4