# radare2 > Open-source reverse engineering command-line framework **Category:** [[categories/dynamically-reverse-engineer-code-general|Dynamically Reverse-Engineer Code > General]] | **Tier:** Rich (FOR610) **Docs:** [https://docs.remnux.org/discover-the-tools/dynamically+reverse-engineer+code/general](https://docs.remnux.org/discover-the-tools/dynamically+reverse-engineer+code/general) ## Usage ```bash r2 specimen.exe ``` ## Workflows - [[workflows/static-analysis-workflow|Static Properties Analysis]] — Step 7: Disassembly (if needed) - [[workflows/android-analysis-workflow|Android Malware Analysis]] — Step 5: Native Library Analysis ## Related Tools - [[tools/frida|Frida]] — Dynamic instrumentation toolkit — hook and trace running pro - [[tools/wine|Wine]] — Windows compatibility layer — run Windows executables on Lin ## FOR610 **Sections:** 2 #disassembly #cli #open-source