Aar0n3906

支持MCP调用的ARM Trace污点追踪与条件搜索工具,集成可视化UI、ARM64污点追踪分析与大文件Trace搜索。

15
10
100% credibility
Found Mar 23, 2026 at 15 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
Rust
AI Summary

A desktop GUI for searching content and visualizing backward data origins in large execution trace files.

How It Works

1
🔍 Discover the trace explorer

You hear about this handy app for digging into big program logs and download it to your computer.

2
📁 Open your log file

Launch the app and pick the massive execution log file you're curious about.

3
🔎 Spot the key moment

Scroll or search quickly to find the exact line where something catches your eye.

4
👆 Tap a value to trace

Click on a number in a register or memory spot, and the app starts revealing its backstory.

5
🌊 See the origin map

A clear diagram lights up, showing the step-by-step journey of where that value came from.

🎉 Unlock the full story

You now perfectly understand the data's path, making debugging or analysis a breeze.

Sign up to see the full architecture

4 more

Sign Up Free

Star Growth

See how this repo grew from 15 to 15 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is Taint-Rev-Trace?

Taint-Rev-Trace is a Rust tool for backward taint tracking on ARM64 execution traces, letting you trace a register or memory value back to its origins—like spotting if a tainted input flows into a sensitive operation. It pairs precise analysis of instructions like loads, arithmetic, and branches with a visualization UI to explore data flow graphs, plus fast content search across massive trace files from tools like MCP. Developers get bit-precise reports on value sources, guards, and confidence levels without loading gigabytes into memory.

Why is it gaining traction?

In a sea of generic disassemblers, it shines for trace-specific reverse engineering: streaming handles files too big for RAM, byte-level memory coverage catches partial overlaps, and the GUI turns complex taint graphs into clickable paths with exact/possible/unknown labels. Rust delivers snappy performance on huge traces where Python tools choke, and built-in search finds patterns across lines instantly.

Who should use this?

Reverse engineers dissecting ARM64 firmware or malware traces from emulators. Security researchers chasing taint propagation in exploits. Embedded devs debugging obscure data flows in production traces without full recompiles.

Verdict

Grab it if ARM trace rev is your jam—solid core for niche workflows, but 1.0% credibility and 15 stars signal early days with thin docs and tests. Polish the UI and add more opcodes to hit escape velocity.

(187 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.