Skip to content

t1b4n3/pwntrace

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

75 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

PWNTRACE

pwntrace is syscall debugging tool.

Intercepts syscalls in userspace and it allows security researchers to monitor, modify, and control system calls made by applications in real-time, enabling analysis of malware behavior, testing exploits in controlled environments and understanding program interactions with the operating system

Get Started

clone repo

git clone https://github.com/t1b4n3/pwntrace.git && cd pwntrace

Build

make

You should find the tool in ./build/ name pwntrace

WHY?

What it does:

  • intercepts selected syscalls of a target process and logs and/or forwards them to a proxy.
  • policy engine to permit/deny/modify behavior

What can it be used for?

  • Reverse Engineering:

    • Dynamic Analysis (behavioral analysisi): Run the binary using this tool and see exactly what the binary does:
    • Malware unpacking and anti-analysis evasion:
  • Exploit Development:

    • Controlled envir for weaponization: If a specific syscall crashes your exploit in lab environment, you can use this proxy to stub out the syscall to always return success, allowing you to focus on developing the rest of the exploit chain.
    • Exploit Primitive Augmentation:
    • Post Exploitation Analysis & forensics: After a successful exploitation, you can trace everything the exploit payload does.

About

Trace and control syscalls to accelerate exploit development, reverse engineering, and malware analysis. Intercept, log, and optionally modify system calls so you can safely emulate environments, stub problematic syscalls, and produce replayable traces.

Resources

Stars

Watchers

Forks

Packages

 
 
 

Contributors