# sec_android__ZenTracer **Repository Path**: yeahmao/sec_android__ZenTracer ## Basic Information - **Project Name**: sec_android__ZenTracer - **Description**: https://github.com/hluwa/ZenTracer - **Primary Language**: Unknown - **License**: Not specified - **Default Branch**: master - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 0 - **Forks**: 1 - **Created**: 2021-05-26 - **Last Updated**: 2021-10-06 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README

Logo

### screenshot ![](./screenshot.png) ### problem 1. the commandline trace script is not intuitive, so i use the PyQt draw UI. 2. * maybe has some bug, please fix when using.. ### usage 1. require `PyQt5` & `frida`. 2. manage Match/Black Pattern of target in `Action`. 3. support double match mode: 'M'(match),'E'(equal); such as: 'M:android.content.', 'E:android.content.ContextImpl'. 4. `Import jadx-jobf` can modify classname to sync jadx deobfuscate. 5. `Export\Import JSON` can save\restore call tree. ### changelog #### 20190926 1. [untested\imperfect] support multiprocess. 2. merge ui code. 3. fix bugs. 4. add README :) #### ....