u/Classic_Impression22

Made an eBPF syscall tracer with a live TUI
▲ 33 r/redteamsec+2 crossposts

Made an eBPF syscall tracer with a live TUI

Built snoop - like strace but uses eBPF so your process doesn't slow down. Has a real-time TUI with search, filters, and a top-syscalls panel. Or just --raw for classic strace-style output.

Decodes arguments for 60+ syscalls into stuff you can actually read. Also does TLS decryption, record/replay, and trace diffing.

Rust, no kernel modules, no C toolchain. Needs Linux 5.8+ and root.

Open source. Link in comments, drop a star if it's useful.

github.com
u/Classic_Impression22 — 3 days ago