4
I Use This!
Activity Not Available
Analyzed 6 months ago. based on code collected almost 4 years ago.

Project Summary

Open-source advanced command line hexadecimal editor, debugger and disassembler for multiples architectures and platforms:

- GNU/Linux, Android, *BSD, OSX, iPhoneOS, Windows{32,64} and Solaris.
- x86{16,32,64}, dalvik, avr, arm, java, powerpc, sparc, mips, bf.
- pe{32,64}, [fat]mach0{32,64}, elf{32,64}, dex and java classes.

It includes several features to read and edit opcodes for different processors, including a process debugger, binary diffing capabilities, filesystem support, code analysis and more.

Tags

binary curses debug debugger debugging debuggingtool disassembler disassembling disassembly hex hexadecimal hexeditor reverse-engineering reverse_engineering reverseengineering tui

Badges

GNU General Public License v2.0 or later
Permitted

Commercial Use

Modify

Distribute

Place Warranty

Forbidden

Sub-License

Hold Liable

Required

Distribute Original

Disclose Source

Include Copyright

State Changes

Include License

These details are provided for information only. No information here is legal advice and should not be used as such.

GNU General Public License v3.0 or later
Permitted

Commercial Use

Modify

Distribute

Place Warranty

Use Patent Claims

Forbidden

Sub-License

Hold Liable

Required

Distribute Original

Disclose Source

Include Copyright

State Changes

Include License

Include Install Instructions

These details are provided for information only. No information here is legal advice and should not be used as such.

GNU Lesser General Public License v3.0 or later
Permitted

Commercial Use

Modify

Distribute

Place Warranty

Use Patent Claims

Forbidden

Sub-License

Hold Liable

Required

Distribute Original

Disclose Source

Include Copyright

State Changes

Include License

Include Install Instructions

These details are provided for information only. No information here is legal advice and should not be used as such.

Project Security

Vulnerabilities per Version ( last 10 releases )

Project Vulnerability Report

Security Confidence Index

Poor security track-record
Favorable security track-record

Vulnerability Exposure Index

Many reported vulnerabilities
Few reported vulnerabilities

Did You Know...

  • ...
    there are over 3,000 projects on the Open Hub with security vulnerabilities reported against them
  • ...
    search using multiple tags to find exactly what you need
  • ...
    nearly 1 in 3 companies have no process for identifying, tracking, or remediating known open source vulnerabilities
  • ...
    anyone with an Open Hub account can update a project's tags
About Project Security

Languages

C
88%
C++
5%
28 Other
7%

30 Day Summary

Dec 13 2020 — Jan 12 2021

12 Month Summary

Jan 12 2020 — Jan 12 2021
  • 9244 Commits
    Up + 5512 (147%) from previous 12 months
  • 372 Contributors
    Up + 178 (91%) from previous 12 months

Ratings

3 users rate this project:
5.0
 
5.0/5.0
Click to add your rating
  
Review this Project!
 

Static Analysis ( Generated by Coverity Scan for radare2 )

Repository URL: https://github.com/radare/radare2

Version: trunk

2024-06-19
Last Analyzed
1,871,887
Lines of Code Analyze
1.3
Defect Density

Defects by status for current build

6,386
Total defects
1,193
Outstanding
5,130
Fixed

CWE Top 25 defects

ID CWE-Name Number of Defects
120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') 4
190 Integer Overflow or Wraparound 13
676 Use of Potentially Dangerous Function 4