View Issue Details
| ID | Project | Category | View Status | Date Submitted | Last Update |
|---|---|---|---|---|---|
| 0009643 | Kali Linux | New Tool Requests | public | 2026-04-17 01:14 | 2026-04-17 01:59 |
| Reporter | mutasem | Assigned To | |||
| Priority | normal | Severity | minor | Reproducibility | have not tried |
| Status | new | Resolution | open | ||
| Summary | 0009643: New Tool: procscope - Process-scoped runtime eBPF investigator | ||||
| Description | Tool Name: procscope Homepage: https://github.com/Mutasem-mk4/procscope License: MIT Description / Pitch: Procscope is a modern, Linux-first, process-scoped runtime investigator designed specifically for malware triage, dynamic reverse engineering, and threat hunting. While tools like sysdig are overly heavy and strace gets bogged down by sheer volume, procscope leverages eBPF to generate clean, perfectly isolated, zero-noise timelines of a singular target process and its child tree. It tracks: Process lifecycle (exec/fork/exit) Zero Runtime Dependencies: The entire user-space wrapper is strictly written in Go and completely statically compiled as a standalone binary (CGO_ENABLED=0). Activity: Active development Intended Usage Example: Attach to an unknown binary to surgically observe exactly what it touchessudo procscope -- /tmp/suspicious-payload | ||||
| Date Modified | Username | Field | Change |
|---|---|---|---|
| 2026-04-17 01:14 | mutasem | New Issue |