harpoon
syscall tracer
Tools for tracing and analyzing system calls in user-space functions using eBPF
🔍 Trace syscalls from user-space functions, by using eBPF
92 stars
5 watching
4 forks
Language: C
last commit: 2 months ago ebpfebpf-programsgolanghacktoberfestseccompsecurity-auditsecurity-toolssyscallssystem-calls
Related projects:
Repository | Description | Stars |
---|---|---|
| An OCI hook that generates seccomp profiles by tracing syscalls in containers | 305 |
| Tool to analyze and debug Go program execution by tracing function calls with eBPF uprobes | 301 |
| Utilities and tests for instrumenting and analyzing Erlang/OTP systems for performance and reliability monitoring | 17 |
| A toolset for working with direct system calls in Cobalt Strike's Beacon Object Files via Syswhispers2 | 178 |
| A tracing library for Elixir that allows events in the BEAM VM to be traced and observed across a cluster of nodes. | 161 |
| A tool for tracing and inspecting Python code during execution to aid in debugging and analysis. | 804 |
| Tools for distilling and displaying network trace data in an interactive web page format | 12 |
| An Elixir wrapper around Recon Trace tracing functionality | 58 |
| Automatically adds tracing code to Go functions and methods | 232 |
| Monitors network traffic and CPU performance using eBPF to collect performance data and diagnose issues. | 206 |
| A tool for monitoring and analyzing software applications in real-time | 38 |
| Provides a platform-agnostic tracing library for Elixir applications | 336 |
| A lightweight tracing library for Go applications. | 86 |
| An interceptor for vue-resource that adds tracing functionality to HTTP requests. | 8 |
| A Common Lisp library for recording and replaying code execution traces, enabling logging, tracing, testing, and persistence. | 39 |