Display content of all files named flag.txt
Create a binary file from a hex string
Convert decimal number to zero-padded hex representation
Get n-th line
Regex for Base64 encoded text
Utility for translating, or deleting, or squeezing repeated characters
Print n-th word in line
Convert decimal ASCII code to char
\K is a lookbehind alternative, telling the engine to start capturing only after it
Pretty print JSON file
Echo two lines by including them in curly brackets. No need to escape the dollar sign since string is enclosed within single quotes
Redirect into executable stdin, then keep stdin open
Redirect into executable stdin, then keep stdin open
Start a command as a background job, setting up pipes connected to both its stdin and stdout
Solve substitution ciphers
Solve Vigenere ciphers
Examine certificate content
Examine RSA private key
Examine RSA public key
View certificate signing request (CSR) details
View PKCS#12 details
Extract certificates from PKCS#12 file
Generate RSA private key pair
Generate CSR with extension
Sign child CSR with parent
Create PKCS#12 file
See link
See link
Factorize numbers
Attack RSA, attempt to find private key
Create public key from parameters
Attempt to break multiple public keys with common factor attacks or individually
Decrypt binary file by attacking public key
Decode Base64 format
Disable ASLR for a Windows Binary:
Generate a unique sequence of elements to help exploit buffer overflows
Generate a unique sequence of elements to help exploit buffer overflows in a 64-bit executable
Search for the location of the given value in the cyclic pattern
Search for the location of the given value in the cyclic pattern, given a 64-bit executable
Allow connecting to an executable via the network
Create a ROP gadget for a given binary
Create a ROP gadget for a given binary, without including certain bytes
Compile C program
Compile C program with the highest optimizations
Compile and assemble with 32-bit Intel syntax
Compile and assemble pure assembly file with 32-bit Intel syntax - create object file
A list of additional, user-specified, ELF shared objects to be loaded before all others.
Output verbose debugging information about operation of the dynamic linker
Analyze binary in order to reverse engineer it
Open R2 in WebUI
Perform initial analysis of the executable
List functions
Seek location (can be function name, address etc.)
Print Disassembly (of) Function
Enter visual mode
Outside visual mode, use VV to enter graph view
Rename function
Replace the assembler code by a pseudo code which is simpler to read
Attempt to decompile function
Rename local variable
Change view
Save project
Load project
Print buffer in python-compatible mode
List all the flags from the selected flagspace
Retrieve symbol information
Export graph into text file
Change the block size to value specified by an object
Move to write mode
strace intercepts system calls make by the glibc and other libraries directly into the Linux Kernel
ltrace intercepts library calls and system calls made by your application to C libraries such as the glibc
Check the properties of executables (like PIE, RELRO, PaX, Canaries, ASLR, Fortify Source)
Given several function offsets, find the correct libc version that matches them
Decompose Android APK file
Dump audio file spectrogram.
Extract strings from binary
Determine file type
Recover files based on their headers, footers, and internal data structures
Visualize a binary format using Kaitai
Extract bytes from binary file
Command line hex viewer
Display hex view of binary between and
Patch a binary at offset with
Analyse binary files for embeded files and executable code
Extract any file type using Binwalk (not just known types)
Search for locations of string in binary
Detail the binary difference between two files
Compare two files byte by byte, ignore initial offsets
Display information about ESE file
Dump ESE table
Simple-to-use RAM-based file system specially designed for debugging purposes
Lists the files and directory names in a file system.
Outputs the contents of a file in a disk image to STDOUT
Mount file system to local mount path
Get extended attributes of filesystem objects
Mount data stored in EWF files
Extract EXIF information from image
Decode QR Code from image
pngcheck verifies the integrity of PNG files
pngcheck verifies the integrity of PNG files
Inspect PDF files and find malformed elements
PDF to text
Detect stegano-hidden data in PNG & BMP
Reveal hidden text in an image
Reveal hidden text in an image
Extract hidden files embedded into media files using steghide
Run program with GDB
Open a core dump for a given program with GDB
Execute commands fromt the command line
Start your program under GDB.
Quit execution
Resume program execution, at the address where your program last stopped
Set breakpoint
List breakpoints
Delete breakpoint
Continue running your program until control reaches a different source line, then stop it and return control to GDB
Execute one machine instruction, then stop and return to the debugger
Continue to the next source line in the current (innermost) stack frame (step over)
Execute one machine instruction, but if it is a function call, proceed until the function returns
Continue running until just after function in the selected stack frame returns. Print the returned value (if any)
Print an expression
Examine memory
Print all global and static variable names
Print all local variables of current stack frame
Print all local arguments of current stack frame
Print lines from a source file
Show disassembly
A summary of the call stack - one line per frame
Move to a specific frame from the backtrace to view locals or arguments
Show current status of all threads in process
Apply command to all threads
Make thread number ThreadNumber the current thread
Continue running until a source line past the current line, in the current stack frame, is reached.
Show info about a specific address
Report the memory address space ranges accessible in the program
Show info about ELF file
Print an ASCII string
Combines a breakpoint with formatted printing of the program’s data
Display hex-view of address content
Cause GDB to print structures in an indented format with one member per line
Print the index of each element when displaying arrays
Set the default base for numeric display
Set a limit on how many elements of an array GDB will print
Dumps a memory range to a file
Set disassemmbly syntax to Intel style
Display the machine instruction about to be executed each time execution stops
Fetch documents/files from servers
Fetch documents/files from servers, send a cookie as input
Fetch documents/files from servers with a POST request
Fetch documents/files from servers with a JSON request
Fetch documents/files from servers, encode part of the request
Fetch headers only
Template Injection: Dump Flask configuration
Template Injection: Dump Flask session
Decode Flask cookie
Encode Flask cookie
Raw HTTP GET request
Raw HTTP GET with Cookie
Opening listening port
Base64-encode resource
Brute force directories and files in websites
List Samba Details
Access SMB share folder
List Samba Details
Get file over SMB
SSH to host
SSH to host on custom port
Connect to SSH using private key
SSH Port Tunneling
Allows using plaintext SSH password
View certificate details
Fetch HTTPS URL while ignoring certificate verification
Scan host for TLS vulnerabilities
Copy file from a remote host to local host
Copy file from local host to a remote host
Display frames which contain a given string
Export files from the HTTP layer
Follow all streams using a tshark script:
Receive JSON-encoded structure of all TCP packets which contain data
View PCAP file
Display all frames from a network capture which comply with filter
Scan all streams using a tshark script
Decode TLS stream
Export HTTPS objects
Extract HTTP objects
Display Protocol Statistics
Combine the passwd and shadow files so John can use them
Encode a zip file's password in a format John can crack
Convert JWT to a format John can crack
Attempt to crack password
Display a password after cracking it
Attempt to crack password using a dictionary attack
Decompile Python executable
Bypass sandbox restrictions to access built in types
Automate the process of detecting and exploiting SQL injection flaws
Discover databases in case an SQL vulnerability is previously found
Discover tables in case an SQL vulnerability is previously found
Discover columns in case an SQL vulnerability is previously found
Dump table in case an SQL vulnerability is previously found
Automate the process of detecting and exploiting SQL injection flaws using a POST form
Use an "Arbitrary Injection Point" for an SQL Injection attack
Don't use the SQLMap user agent when performing SQL Injections
Set the maximum size of core dump files created to unlimited
Set the location to save a core dump