zgy0x01

zgy0x01 / QTrace

Public

qbdi based android arm64 trace tool

22
14
69% credibility
Found Mar 31, 2026 at 22 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
C++
AI Summary

QTrace is a tool for monitoring and logging the inner workings of Android apps on real arm64 devices, tracking code steps, memory changes, and key calls.

How It Works

1
🔍 Discover QTrace

You learn about a handy tool for peeking inside Android apps to see their hidden actions on your phone.

2
📱 Ready your phone

Place the app's inner workings on your phone and prepare it for close inspection.

3
🎯 Choose what to spy on

Pick the specific app secrets or moves you want to watch closely.

4
🛠️ Build your spy

Create a custom spy companion for the app with a simple build step – exciting, it's ready!

5
💉 Slip it in

Quietly add your spy to the running app using a helper trick.

📊 Uncover the secrets

Enjoy detailed stories of every inner step, memory glance, and chat the app makes – mission accomplished!

Sign up to see the full architecture

4 more

Sign Up Free

Star Growth

See how this repo grew from 22 to 22 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is QTrace?

QTrace is a C++ tool for tracing native ARM64 code on real Android devices, leveraging QBDI for dynamic binary instrumentation. It captures instruction-level execution, memory reads/writes, and hooks custom functions, JNI calls, and libc routines like memcpy or fopen—ideal for dissecting obfuscated apps without emulators. Download the QTrace software from GitHub, build via Android Studio, and inject the output library into targets using the bundled Frida script for instant traces dumped to files.

Why is it gaining traction?

Unlike ptrace-based tracers that struggle with anti-debugging, QTrace uses QBDI for precise, low-overhead instrumentation on live devices, with easy config for JNI and libc hooks that reveal hidden behaviors. Developers grab the QTrace app setup for its root-friendly workflow and detailed logs showing register states, strings, and hexdumps—saving hours on reverse engineering compared to manual disassembly.

Who should use this?

Android reverse engineers cracking native protections in games or banking apps, security researchers hunting JNI exploits, or native devs debugging elusive crashes in ARM64 libs. It's perfect for anyone needing on-device traces without full Frida scripting overhead.

Verdict

Grab QTrace if you're deep in Android native reversing—it's a solid niche tool despite 22 stars and thin docs signaling early maturity (credibility score: 0.7%). Test on non-prod devices first; pair with QBDI updates for longevity.

(198 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.