Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
This is the NodeJS module and Browser ready emscripten builds of radare2.
$ npm install r2core
And now you can run things like that:
$ node -e "console.log(new require('r2core')().cmd('?E Hello World'))"
.--. .-------------.
| _| | |
| O O < Hello World |
| | | | |
|| | / `-------------'
|`-'|
`---'
The API provided is similar to the r2pipe one, so you can reuse the same scripts.
You can create multiple instances of RCore and you can open external resources too:
const R2Core = require('r2core');
const c = new R2Core();
const c2 = new R2Core();
console.log(c.cmd('wv 123'));
console.log(c2.cmd('p8 4'));
To get the latest version of r2core.js download it from npm or http://cloud.rada.re/asmjs/r2core.js.
If you are not satisfied by downloading precompiled programs you can also build it yourself by using the radare2-release
tool that is available via r2pm
:
$ r2pm -r r2rls docker_asmjs
Now you may run make
to minify the radare2.js and generating r2core.js.
This process is using uglifyjs and closurejs and requires at least 2GB of RAM.
You can now use this file from nodejs or the browser
FAQs
emscripten build of radare2 with an r2pipe api
We found that r2core demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.