Reverse Dependencies of r2pipe
The following projects have a declared dependency on r2pipe:
- cfiddle — CFiddle makes it easy to ask and answers questions about the compilation and execution of smallish programs written in compiled languages like C, C++, and Go.
- dex2call — A simple module to get calls to android.jar from the bytecode
- easy-re — Use angr to solve RE problems fast
- fdcalls — help view dangerous function calls across files
- guanciale — Grab information needed by Carbonara
- hackingtools — All Hacking Tools in this Python with Manually Created Modules
- jailrootdetector — Identify root and jailbreak detection in mobile applications
- malscan — A Python package for automated static and dynamic analysis of malware samples. Supports both static and dynamic analysis techniques with feature extraction and export capabilities for static features.
- nvsl-fiddle — Fiddle makes it easy to ask and answers questions about the compilation and execution of smallish programs written in C or C++.
- oxide-re — Oxide is a flexible, modular, distributed framework for performing analysis of data files, including executables.
- pwntools-r2 — Debug exploits like a boss with Radare2 in pwntools
- quark-engine — An Obfuscation-Neglect Android Malware Scoring System
- r2analyze — r2pipe script for Intezer Analyze
- r2pyapi — High level radare2 python API
- sema-toolchain — Python symbolic execution package
- superpehasher — SuperPEHasher is a wrapper written in Python3 for several hash algorithms dedicated to PE file.
- ThreatHunter — no summary
- unduckify — Utility to extract duckify payloads from a memory dump.
- zeratool — Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems
1