#r2ai — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #r2ai, aggregated by home.social.
-
🚀 Big update in r2ai 1.2.6 -- Fixes command/script edition + add comments in commands. Interrupting the auto mode permits a last call to resolve. Added conversation compact, prompts are markdown-only now, r2ai -E to edit the configuration file and more! #r2ai #radare2 #reverseengineering https://github.com/radareorg/r2ai/releases/tag/1.2.6
-
“Go Malware Meets IoT” - Challenges, Blind Spots, and Botnets - by Asher Davila - #r2ai #radare2 #defcon #reverseengineering #golang #llm https://www.youtube.com/watch?v=TtPicirB6G4
-
📣Tomorrow (wed18) I will be presenting the last news in the #radare2 ecosystem and showcase some real world #reverseengineering usecases with #r2ai @NowSecure
#Connect25 — https://infosec.exchange/@NowSecure/114597238407822896 -
#Connect25 is bringing an #AI + reverse engineering session diving into #r2ai!
@pancake Creator of #radare2 and Senior Mobile Security Research Engineer at NowSecure, will show how AI is transforming reverse engineering. In this session, you’ll see how AI can:
- Analyze mobile apps
- Detect privacy issues
- Help you understand what’s going on step by stepSee the #r2 session and register here: https://events.bizzabo.com/nowsecure-connect-2025/agenda/session/1628655?utm_source=mastodon&utm_medium=organic&utm_campaign=connect25&utm_content=may30
-
Watching @cryptax ‘s talk analyzing iot malware at @NorthSec about #r2ai cc @radareorg
Live stream: https://www.youtube.com/watch?v=PmG_NcXUPmc
-
Watching #NorthSec online at https://www.youtube.com/watch?v=J4rGZBxUzYo ... looking forward @cryptax 's presentation on #r2ai analyzing #iot malware https://nsec.io/session/2025-linux-and-iot-malware-analysis-with-r2ai.html
-
Comparing #meta #llama 4 (maverick / scout) vs #qwen 32b for decompilation purposes #r2ai #reverseengineering
PD: groq is the best place to try all these models if you don't have the hardware
PD: qwen-qwq reasoning takes more time, but improves the output, much better than openai/claude/meta for decompilation usecases -
If anyone is curious about r2mcp, yes, it now runs in local with openwebui and mcpo #r2ai #radare2 #reverseengineering #llm
-
“Analyzing a shellcode with #r2ai" article posted in the latest PagedOut ezine! https://pagedout.institute/download/PagedOut_006.pdf by @cryptax #shellcodes #reverseengineering #radare2
-
“Analyzing a shellcode with #r2ai" article posted in the latest PagedOut ezine! https://pagedout.institute/download/PagedOut_006.pdf by @cryptax #shellcodes #reverseengineering #radare2
-
“Analyzing a shellcode with #r2ai" article posted in the latest PagedOut ezine! https://pagedout.institute/download/PagedOut_006.pdf by @cryptax #shellcodes #reverseengineering #radare2
-
“Analyzing a shellcode with #r2ai" article posted in the latest PagedOut ezine! https://pagedout.institute/download/PagedOut_006.pdf by @cryptax #shellcodes #reverseengineering #radare2
-
“Analyzing a shellcode with #r2ai" article posted in the latest PagedOut ezine! https://pagedout.institute/download/PagedOut_006.pdf by @cryptax #shellcodes #reverseengineering #radare2
-
Some updates on #r2ai:
- decai now support auto mode for function calling, with ANY model
- Added support for Gemini and X.AI endpoints
- Start the full rewrite of the Python/JS code in plain C
- Switch to gpt4-turbo for 128K context instead of 8K on OpenAI backend
- Recursive decompilation mode for inlining stubs and better type propagation