Files
radaree2/man/r2agent.1
2025-08-13 16:13:01 +02:00

81 lines
1.5 KiB
Groff

.Dd Jul 10, 2025
.Dt R2AGENT 1
.Sh NAME
.Nm r2agent
.Nd Radare2 Agent HTTP Server
.Sh SYNOPSIS
.Nm r2agent
.Op Fl adhsuLjv
.Op Fl p Ar port
.Op Fl t Ar file
.Sh DESCRIPTION
An HTTP server providing remote access to Radare2 instances via a RESTful API.
It enables remote debugging and analysis of binaries using Radare2.
.Bl -tag -width Fl
.It Fl a
Listen for everyone (localhost by default)
.It Fl d
Run in daemon mode (background)
.It Fl h
Show help message
.It Fl s
Run in sandbox mode
.It Fl u
Enable HTTP authorization access
.It Fl t Ar file
User:password authentication file
.It Fl p Ar port
Specify listening port (defaults to 8080)
.It Fl v
Show r2 version information and exit
.It Fl L
List currently loaded r2 sessions and exit
.It Fl j
Output JSON when used with -v or -L (modifier; no effect alone)
.El
.Sh ENVIRONMENT
.Pp
r2agent does not use any environment variables.
.Sh EXAMPLES
.Pp
Start r2agent on default port (8080):
.Pp
$ r2agent
.Pp
Start r2agent on port 9090:
.Pp
$ r2agent -p 9090
.Pp
Run r2agent in daemon mode:
.Pp
$ r2agent -d
.Pp
Allow connections from any IP address:
.Pp
$ r2agent -a
.Pp
Run with authentication enabled:
.Pp
$ r2agent -u -t auth.txt
.Pp
Show version (text):
.Pp
$ r2agent -v
.Pp
Show version (JSON):
.Pp
$ r2agent -v -j
.Pp
List currently loaded sessions (text):
.Pp
$ r2agent -L
.Pp
List currently loaded sessions (JSON):
.Pp
$ r2agent -L -j
.Sh SEE ALSO
.Pp
.Xr radare2(1)
.Sh AUTHORS
.Pp
Written by pancake <pancake@nopcode.org>.