v2.0 - Now with syscall intelligence

|

Syscall Detective reverse-engineers any Linux binary through real strace data, AI analysis, and live kernel visualization. No source code required.

2,400+developers·180,000syscalls analyzed·Open Sourcecore
LIVE
$
0
Programs Analyzed
0
Syscalls Traced
0%
Accuracy Rate
0
Core Features
HOW IT WORKS

From Binary to Insight in Seconds

01

SELECT OR UPLOAD

Choose a program from our library or upload your own ELF binary or script. No terminal expertise required.

02

SANDBOX ANALYSIS

We run strace in an isolated Docker container with full syscall capture — safe, fast, and reproducible.

03

RESULTS DASHBOARD

Get call graphs, histograms, AI explanation, weirdness score, latency breakdown, and more.

FEATURES

Everything You Need to Understand Any Binary

Visual Call Graph

Interactive node graph showing syscall relationships, call frequency, and execution flow.

readopenatmmapwrite

Syscall Histogram

Color-coded bar chart with sorting and filtering

Weirdness Score

AI-powered 0-100 risk score

23

Time Heatmap

Syscall density over execution time

AI Explanation

"This program opened 47 files and made 3 network connections to fetch a TLS-secured resource..."

AI: This program opened 47 files and made 3 network connections to fetch a TLS-secured resource on port 443. No suspicious behavior detected. DNS resolution took 45ms. Recommend using connection pooling for performance...

Compare Mode

Side-by-side diff of any two programs

A: ls
4,832 calls
Score: 12
vs
B: curl
12,441 calls
Score: 61
TRY IT NOW

Live Demo — No Sign-In Required

Select a program and analyze its syscall fingerprint instantly

↑ Select a program above and click Analyze to see live results
TESTIMONIALS

What Developers Are Saying

"I found a npm package sending data to an unknown IP. Syscall Detective flagged it in 3 seconds."

AS
Arjun S.
Security Researcher
COMPARISON

Why Syscall Detective?

See how we compare to traditional Linux tracing tools

FeatureSyscall Detectivestrace (raw)ltracegdb
Visual Call Graph
YES
AI Explanation
YES
Weirdness Score
YES
Compare Programs
YES
No Terminal Needed
YES
Custom Upload
YES
Web Interface
YES
Share Results
YES
LEARN

The Linux Call Stack

Click any layer to understand what happens at each level

User Program
Your application code
glibc / libc wrapper
C standard library
Syscall Interface
INT 0x80 / SYSCALL instruction
Linux Kernel
Kernel space — privileged mode
VFS (Virtual File System)
Unified filesystem abstraction
Device Drivers
Hardware abstraction layer
Hardware
Physical CPU, memory, disk, network

Syscall Detective traces every interaction at the syscall boundary in real-time

Contact Syscall Detective

Send feedback, report issues, or ask for a feature. Messages go directly to Host.

DEFAULT INBOX

Host