A curated list of resources related to Time Travel Debugging (TTD).
Time Travel Debugging tools and platforms.
| Solution | Pricing | Description |
|---|---|---|
| WinDbg TTD | Free | Microsoft's official Time Travel Debugging solution integrated into WinDbg Preview. Allows recording and replaying of Windows application execution for debugging complex issues. Features include reverse execution, memory and register queries at any point in time, and integration with the Windows debugging ecosystem. |
| rr | Free and Open Source | A lightweight recording and deterministic debugging tool for Linux. Developed by Mozilla, rr records native application execution and allows full reverse execution during replay. It's designed to be efficient with low overhead and integrates well with GDB for a familiar debugging experience. |
| undo.io | Commercial | Enterprise-grade reversible debugging platform for Linux and embedded systems. Built on the technology behind UDB (Undo Debugger), it provides time travel debugging capabilities for production systems, continuous integration, and development environments. Supports both live debugging and recording for later analysis. |
| esReverse | Commercial | A full-system record and replay debugger that provides time travel debugging capabilities. Allows stepping backwards through program execution, setting reverse breakpoints, and analyzing program behavior in reverse. Features architecture-neutral dynamic analysis with a focus on ease of use and minimal overhead. |
| Panda-re | Free and Open Source | A platform for architecture-neutral dynamic analysis based on QEMU. PANDA enables whole-system recording and deterministic replay for various architectures. It's particularly useful for malware analysis, reverse engineering, and security research, offering extensive plugin support for custom analyses. |
| GDB Reverse Debugging | Free and Open Source | The GNU Debugger includes built-in reverse debugging capabilities. While not a full time travel debugging solution, GDB supports reverse execution through process recording, allowing reverse-continue, reverse-step, and reverse-next operations. Works with various targets and can be used with rr for enhanced TTD functionality. |
| REnigma | Commercial | Advanced time travel debugging and reverse engineering platform. Provides comprehensive recording and analysis capabilities for security research, malware analysis, and vulnerability discovery. Features include full system state capture, advanced query capabilities, and integration with reverse engineering workflows. |
- Microsoft - Time Travel Debugging Overview - Comprehensive overview of TTD in WinDbg, covering recording traces, replaying execution, and core debugging concepts.
- Microsoft - Time Travel Debugging Object Model - Documentation on the TTD data model, including process objects, session objects, and LINQ-style queries for analyzing traces.
- Microsoft - Time Travel Debugging Release Notes - Release notes tracking TTD features, improvements, and known issues across WinDbg versions.
- Binary Ninja - Time Travel Debugging (Windows) - Guide for using TTD with Binary Ninja on Windows through WinDbg/DbgEng integration.
- Binary Ninja - Time Travel Debugging Dev Build Documentation - Latest TTD documentation for Binary Ninja dev builds, featuring the most recent updates and features.
- Binary Ninja - Time Travel Debugging (Linux) - Documentation for TTD support on Linux using the rr debugger with Binary Ninja.
- IDA Pro - WinDbg TTD Debugging - Documentation for using WinDbg Time Travel Debugging with IDA Pro for reverse engineering and malware analysis.
- Wikipedia - Time Travel Debugging - Comprehensive overview of time travel debugging concepts, history, implementations, and use cases across different platforms and tools.
- Next-Level Reversing: Binary Ninja+TTD - Hands-on tutorial demonstrating how to use TTD with Binary Ninja for reverse engineering, including setup, trace recording, and analysis workflows.
- LRQA - Time Travel Debugging Shellcode with Binary Ninja - Tutorial on using TTD to debug shellcode and non-PE targets with Binary Ninja, useful for malware analysis and vulnerability research.
- Microsoft WinDbg-Samples TTD README - Official Microsoft repository with TTD samples and example scripts for common debugging scenarios.
- Google Cloud - Time Travel Triage: TTD using .NET Process Hollowing - In-depth tutorial on using Time Travel Debugging with WinDbg to analyze advanced malware behaviors, specifically focusing on .NET process hollowing techniques commonly used by threat actors.
- TTD Lab - Educational repository containing presentation slides and hands-on lab instructions for learning Time Travel Debugging, designed to help beginners get familiar with TTD concepts and practical usage.
- Introduction to Working with Time Travel Debugging in Binary Ninja - Getting started video covering the basics of TTD in Binary Ninja, including installation and first steps.
- Hands-on Time Travel Debugging Tutorial - Practical demonstration of TTD features and workflows for debugging complex applications.
- Advanced Time Travel Debugging Techniques - Advanced techniques and tips for effective use of TTD in reverse engineering.
- TTD Walkthrough and Best Practices - Comprehensive walkthrough of TTD capabilities and recommended approaches for various debugging scenarios, demonstrating analysis of the 7th challenge in Flare-On 2025.
- Time Travel Debugging: Root Causing Bugs in Commercial Scale Software - Discussion of using TTD for debugging large-scale commercial software applications and finding root causes of complex bugs.
- Time Travel Debugging - An Introduction - Introductory video covering the fundamentals of time travel debugging and its benefits for software development.
- Reverse Engineering with Time Travel Debugging - Demonstration of TTD techniques for reverse engineering applications and analyzing program behavior.
- Debugging with Time Travel in WinDbg - Practical guide to using time travel debugging features in WinDbg for Windows application debugging.
- Advanced TTD Workflows and Automation - Advanced workflows and automation techniques for time travel debugging in production environments.
- Binary Ninja - FlareOn 11 TTD Challenge - Write-up demonstrating the use of Binary Ninja's Time Travel Debugging capabilities to solve the FlareOn 11 CTF challenge, showcasing practical TTD techniques for reverse engineering.
- Huntress CTF 2025 - Rust Tickler 1 - Write-up for Huntress CTF 2025 Rust Tickler 1 challenge, demonstrating TTD techniques for analyzing Rust binaries.
- Huntress CTF 2025 - Rust Tickler 2 - Write-up for the second Rust Tickler challenge, showing advanced reverse engineering of Rust code with time travel debugging.
- Huntress CTF 2025 - Rust Tickler 3 - Write-up for the third and final Rust Tickler challenge, featuring complex Rust binary analysis using TTD.
- Binary Ninja - DbgEng TTD Adapter - Source code for Binary Ninja's TTD adapter implementation, showing how Binary Ninja integrates with WinDbg's TTD engine.
- ttd-bindings - Python bindings for Microsoft's Time Travel Debugging (TTD) engine, enabling programmatic access to TTD traces and analysis capabilities.
- ttddbg - IDA plugin that adds Time Travel Debugging support to IDA Pro, enabling loading and replaying of WinDbg TTD traces directly within the IDA debugger interface.
- WinDbg-Libraries - Microsoft's official libraries for extending WinDbg and its underlying components, providing a modern C++ abstraction layer over the Debugger Data Model COM APIs to simplify extension development.