|
Syscall Detective reverse-engineers any Linux binary through real strace data, AI analysis, and live kernel visualization. No source code required.
From Binary to Insight in Seconds
SELECT OR UPLOAD
Choose a program from our library or upload your own ELF binary or script. No terminal expertise required.
SANDBOX ANALYSIS
We run strace in an isolated Docker container with full syscall capture — safe, fast, and reproducible.
RESULTS DASHBOARD
Get call graphs, histograms, AI explanation, weirdness score, latency breakdown, and more.
Everything You Need to Understand Any Binary
Visual Call Graph
Interactive node graph showing syscall relationships, call frequency, and execution flow.
Syscall Histogram
Color-coded bar chart with sorting and filtering
Weirdness Score
AI-powered 0-100 risk score
Time Heatmap
Syscall density over execution time
AI Explanation
"This program opened 47 files and made 3 network connections to fetch a TLS-secured resource..."
Compare Mode
Side-by-side diff of any two programs
4,832 calls
Score: 12
12,441 calls
Score: 61
Live Demo — No Sign-In Required
Select a program and analyze its syscall fingerprint instantly
What Developers Are Saying
"I found a npm package sending data to an unknown IP. Syscall Detective flagged it in 3 seconds."
Why Syscall Detective?
See how we compare to traditional Linux tracing tools
| Feature | Syscall Detective★ | strace (raw) | ltrace | gdb |
|---|---|---|---|---|
| Visual Call Graph | YES | |||
| AI Explanation | YES | |||
| Weirdness Score | YES | |||
| Compare Programs | YES | |||
| No Terminal Needed | YES | |||
| Custom Upload | YES | |||
| Web Interface | YES | |||
| Share Results | YES |
The Linux Call Stack
Click any layer to understand what happens at each level
Syscall Detective traces every interaction at the syscall boundary in real-time
Contact Syscall Detective
Send feedback, report issues, or ask for a feature. Messages go directly to Host.
DEFAULT INBOX
Host