A graphical user interface for radare2: Cutter
Key | Action |
---|---|
K or space | Play / Pause |
M | Mute / Unmute |
C | Select next subtitles |
A | Select next audio track |
V | Show slide in full page or toggle automatic source change |
left arrow | Seek 5s backward |
right arrow | Seek 5s forward |
shift + left arrow or J | Seek 10s backward |
shift + right arrow or L | Seek 10s forward |
control + left arrow | Seek 60s backward |
control + right arrow | Seek 60s forward |
shift + down arrow | Decrease volume |
shift + up arrow | Increase volume |
shift + coma | Decrease playback speed |
shift + dot or shift + semicolon | Increase playback speed |
end | Seek to end |
beginning | Seek to beginning |
Information on this media
Links:
Creation date:
July 2nd, 2018, 5:30 p.m.Add date:
July 2nd, 2018, 6:31 p.m.Number of views:
885 (this month: 1)Speaker:
Antide PetitLicense:
CC BY-SA v4Visibility:
This media is publishedDescription
Radare2 is a free and open-source reverse engineering framework, which is becoming more and more popular. One of its main criticisms is that it is only usable within a terminal (CLI), and that the commands are not intuitive, making the learning curve steep. The Cutter project was created to provide an easy-to-use, but still powerful, interface to radare2 for new users. This is done with a native graphical user interface made in Qt and C++.
The goal of the talk is to present radare2 history, along with the common complaints from users, and how we try to overcome those with Cutter. I’ll be presenting the features that are already implemented, the way we allow our users to script the interface, and obviously the missing features that we will implement in a near future.
While Cutter is still under heavy development, it’s becoming more and more user-friendly and easy to use. It is becoming a great alternative to other reverse engineering tools.
Antide Petit
Antide is an infosec student. In 2017, he has done a GSoC on Cutter and is currently its maintainer.
Other media in the channel "2018"
95 viewsGlassfish from (IN)Secure adminJuly 6th, 2018
155 viewsShadow on the Wall - Risks and Flaws with ShadowsocksJuly 6th, 2018
52 viewsOpen Hardware for (software) offensive securityJuly 6th, 2018
40 viewsFreedom Fighting Mode - Open Source Hacking HarnessJuly 6th, 2018
72 viewsExpl-iot: IoT Security Testing FrameworkJuly 6th, 2018
22 viewsIo(M)T Security: A year in reviewJuly 6th, 2018