# sec_android__ZenTracer
**Repository Path**: yeahmao/sec_android__ZenTracer
## Basic Information
- **Project Name**: sec_android__ZenTracer
- **Description**: https://github.com/hluwa/ZenTracer
- **Primary Language**: Unknown
- **License**: Not specified
- **Default Branch**: master
- **Homepage**: None
- **GVP Project**: No
## Statistics
- **Stars**: 0
- **Forks**: 1
- **Created**: 2021-05-26
- **Last Updated**: 2021-10-06
## Categories & Tags
**Categories**: Uncategorized
**Tags**: None
## README
### screenshot

### problem
1. the commandline trace script is not intuitive, so i use the PyQt draw UI.
2. * maybe has some bug, please fix when using..
### usage
1. require `PyQt5` & `frida`.
2. manage Match/Black Pattern of target in `Action`.
3. support double match mode: 'M'(match),'E'(equal); such as: 'M:android.content.', 'E:android.content.ContextImpl'.
4. `Import jadx-jobf` can modify classname to sync jadx deobfuscate.
5. `Export\Import JSON` can save\restore call tree.
### changelog
#### 20190926
1. [untested\imperfect] support multiprocess.
2. merge ui code.
3. fix bugs.
4. add README :)
#### ....