{"id":13418391,"url":"https://github.com/google/orbit","last_synced_at":"2026-01-14T15:36:13.616Z","repository":{"id":36954154,"uuid":"104358587","full_name":"google/orbit","owner":"google","description":"C/C++ Performance Profiler","archived":true,"fork":false,"pushed_at":"2025-01-31T10:36:00.000Z","size":156729,"stargazers_count":4310,"open_issues_count":0,"forks_count":359,"subscribers_count":82,"default_branch":"main","last_synced_at":"2026-01-12T05:36:59.482Z","etag":null,"topics":["cpu-profiler","dynamic-instrumentation","etw","hooking","instrumentation","performance","profiler","sampling","visualizer"],"latest_commit_sha":null,"homepage":"https://orbitprofiler.com/","language":"C++","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"bsd-2-clause","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/google.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":"CONTRIBUTING.md","funding":null,"license":"LICENSE","code_of_conduct":"CODE_OF_CONDUCT.md","threat_model":null,"audit":null,"citation":null,"codeowners":"CODEOWNERS","security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null,"zenodo":null}},"created_at":"2017-09-21T14:28:35.000Z","updated_at":"2026-01-09T08:09:50.000Z","dependencies_parsed_at":"2023-02-17T17:16:06.502Z","dependency_job_id":"ec3c788e-0b35-4114-9312-04730da541cf","html_url":"https://github.com/google/orbit","commit_stats":{"total_commits":6628,"total_committers":47,"mean_commits":141.0212765957447,"dds":0.8642124321062161,"last_synced_commit":"d863597a5c15cd0930bf9dd63b0451e2327e105e"},"previous_names":["pierricgimmig/orbitprofiler"],"tags_count":178,"template":false,"template_full_name":null,"purl":"pkg:github/google/orbit","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/google%2Forbit","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/google%2Forbit/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/google%2Forbit/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/google%2Forbit/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/google","download_url":"https://codeload.github.com/google/orbit/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/google%2Forbit/sbom","scorecard":{"id":437594,"data":{"date":"2024-03-18","repo":{"name":"github.com/google/orbit","commit":"3493933c53bb16d7d2a003db54af879c09dd9f6d"},"scorecard":{"version":"v4.8.0","commit":"c40859202d739b31fd060ac5b30d17326cd74275"},"score":7,"checks":[{"name":"Binary-Artifacts","score":2,"reason":"binaries present in source code","details":["Warn: binary detected: third_party/libunwindstack/offline_files/apk_rorx_arm64/run:1","Warn: binary detected: third_party/libunwindstack/offline_files/apk_rorx_unreadable_arm64/run:1","Warn: binary detected: third_party/libunwindstack/offline_files/apk_rx_arm64/run:1","Warn: binary detected: third_party/libunwindstack/offline_files/apk_rx_unreadable_arm64/run:1","Warn: binary detected: third_party/libunwindstack/tests/files/boot_arm.oat:1","Warn: binary detected: third_party/libunwindstack/tests/files/boot_arm.oat.gnu_debugdata:1","Warn: binary detected: third_party/libunwindstack/tests/files/libtest.dll:1","Warn: binary detected: third_party/libunwindstack/tests/files/libtest32.dll:1"],"documentation":{"short":"Determines if the project has generated executable (binary) artifacts in the source repository.","url":"https://github.com/ossf/scorecard/blob/c40859202d739b31fd060ac5b30d17326cd74275/docs/checks.md#binary-artifacts"}},{"name":"Branch-Protection","score":-1,"reason":"internal error: error during branchesHandler.setup: internal error: githubv4.Query: Resource not accessible by integration","details":null,"documentation":{"short":"Determines if the default and release branches are protected with GitHub's branch protection settings.","url":"https://github.com/ossf/scorecard/blob/c40859202d739b31fd060ac5b30d17326cd74275/docs/checks.md#branch-protection"}},{"name":"CI-Tests","score":10,"reason":"30 out of 30 merged PRs checked by a CI test -- score normalized to 10","details":null,"documentation":{"short":"Determines if the project runs tests before pull requests are merged.","url":"https://github.com/ossf/scorecard/blob/c40859202d739b31fd060ac5b30d17326cd74275/docs/checks.md#ci-tests"}},{"name":"CII-Best-Practices","score":0,"reason":"no badge detected","details":null,"documentation":{"short":"Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.","url":"https://github.com/ossf/scorecard/blob/c40859202d739b31fd060ac5b30d17326cd74275/docs/checks.md#cii-best-practices"}},{"name":"Code-Review","score":10,"reason":"30 out of last 30 changesets reviewed before merge -- score normalized to 10","details":null,"documentation":{"short":"Determines if the project requires code review before pull requests (aka merge requests) are merged.","url":"https://github.com/ossf/scorecard/blob/c40859202d739b31fd060ac5b30d17326cd74275/docs/checks.md#code-review"}},{"name":"Contributors","score":10,"reason":"4 different organizations found -- score normalized to 10","details":["Info: contributors work for google,googlers,openxla,stadia"],"documentation":{"short":"Determines if the project has a set of contributors from multiple organizations (e.g., companies).","url":"https://github.com/ossf/scorecard/blob/c40859202d739b31fd060ac5b30d17326cd74275/docs/checks.md#contributors"}},{"name":"Dangerous-Workflow","score":10,"reason":"no dangerous workflow patterns detected","details":null,"documentation":{"short":"Determines if the project's GitHub Action workflows avoid dangerous patterns.","url":"https://github.com/ossf/scorecard/blob/c40859202d739b31fd060ac5b30d17326cd74275/docs/checks.md#dangerous-workflow"}},{"name":"Dependency-Update-Tool","score":10,"reason":"update tool detected","details":["Info: Dependabot detected"],"documentation":{"short":"Determines if the project uses a dependency update tool.","url":"https://github.com/ossf/scorecard/blob/c40859202d739b31fd060ac5b30d17326cd74275/docs/checks.md#dependency-update-tool"}},{"name":"Fuzzing","score":10,"reason":"project is fuzzed with [OSSFuzz]","details":null,"documentation":{"short":"Determines if the project uses fuzzing.","url":"https://github.com/ossf/scorecard/blob/c40859202d739b31fd060ac5b30d17326cd74275/docs/checks.md#fuzzing"}},{"name":"License","score":10,"reason":"license file detected","details":["Info: : LICENSE:1"],"documentation":{"short":"Determines if the project has defined a license.","url":"https://github.com/ossf/scorecard/blob/c40859202d739b31fd060ac5b30d17326cd74275/docs/checks.md#license"}},{"name":"Maintained","score":0,"reason":"0 commit(s) out of 30 and 0 issue activity out of 30 found in the last 90 days -- score normalized to 0","details":null,"documentation":{"short":"Determines if the project is \"actively maintained\".","url":"https://github.com/ossf/scorecard/blob/c40859202d739b31fd060ac5b30d17326cd74275/docs/checks.md#maintained"}},{"name":"Packaging","score":-1,"reason":"no published package detected","details":["Warn: no GitHub publishing workflow detected"],"documentation":{"short":"Determines if the project is published as a package that others can easily download, install, easily update, and uninstall.","url":"https://github.com/ossf/scorecard/blob/c40859202d739b31fd060ac5b30d17326cd74275/docs/checks.md#packaging"}},{"name":"Pinned-Dependencies","score":-1,"reason":"internal error: error parsing shell code: third_party/conan/docker/Dockerfile.msvc2019:1:5: (( can only be used to open an arithmetic cmd","details":null,"documentation":{"short":"Determines if the project has declared and pinned the dependencies of its build process.","url":"https://github.com/ossf/scorecard/blob/c40859202d739b31fd060ac5b30d17326cd74275/docs/checks.md#pinned-dependencies"}},{"name":"SAST","score":7,"reason":"SAST tool detected but not run on all commmits","details":["Warn: 0 commits out of 30 are checked with a SAST tool","Info: SAST tool detected: CodeQL"],"documentation":{"short":"Determines if the project uses static code analysis.","url":"https://github.com/ossf/scorecard/blob/c40859202d739b31fd060ac5b30d17326cd74275/docs/checks.md#sast"}},{"name":"Security-Policy","score":10,"reason":"security policy file detected","details":["Info: security policy detected in org repo: github.com/google/.github/SECURITY.md:1"],"documentation":{"short":"Determines if the project has published a security policy.","url":"https://github.com/ossf/scorecard/blob/c40859202d739b31fd060ac5b30d17326cd74275/docs/checks.md#security-policy"}},{"name":"Signed-Releases","score":0,"reason":"0 out of 5 artifacts are signed or have provenance","details":["Warn: release artifact nightly-2024-03-14 does not have provenance: https://api.github.com/repos/google/orbit/releases/146489554","Warn: release artifact nightly-2024-03-14 not signed: https://api.github.com/repos/google/orbit/releases/146489554","Warn: release artifact nightly-2024-03-07 does not have provenance: https://api.github.com/repos/google/orbit/releases/145188015","Warn: release artifact nightly-2024-03-07 not signed: https://api.github.com/repos/google/orbit/releases/145188015","Warn: release artifact nightly-2024-02-29 does not have provenance: https://api.github.com/repos/google/orbit/releases/144117855","Warn: release artifact nightly-2024-02-29 not signed: https://api.github.com/repos/google/orbit/releases/144117855","Warn: release artifact nightly-2024-02-22 does not have provenance: https://api.github.com/repos/google/orbit/releases/143116064","Warn: release artifact nightly-2024-02-22 not signed: https://api.github.com/repos/google/orbit/releases/143116064","Warn: release artifact nightly-2024-02-15 does not have provenance: https://api.github.com/repos/google/orbit/releases/142097302","Warn: release artifact nightly-2024-02-15 not signed: https://api.github.com/repos/google/orbit/releases/142097302"],"documentation":{"short":"Determines if the project cryptographically signs release artifacts.","url":"https://github.com/ossf/scorecard/blob/c40859202d739b31fd060ac5b30d17326cd74275/docs/checks.md#signed-releases"}},{"name":"Token-Permissions","score":8,"reason":"non read-only tokens detected in GitHub workflows","details":["Info: topLevel permissions set to 'read-all': .github/workflows/build-and-test.yml:29: update your workflow using https://app.stepsecurity.io/secureworkflow/google/orbit/build-and-test.yml/main?enable=permissions","Info: topLevel permissions set to 'read-all': .github/workflows/checks.yml:11: update your workflow using https://app.stepsecurity.io/secureworkflow/google/orbit/checks.yml/main?enable=permissions","Info: topLevel permissions set to 'read-all': .github/workflows/codeql.yml:7: update your workflow using https://app.stepsecurity.io/secureworkflow/google/orbit/codeql.yml/main?enable=permissions","Info: jobLevel 'actions' permission set to 'read': .github/workflows/codeql.yml:18: update your workflow using https://app.stepsecurity.io/secureworkflow/google/orbit/codeql.yml/main?enable=permissions","Info: jobLevel 'contents' permission set to 'read': .github/workflows/codeql.yml:19: update your workflow using https://app.stepsecurity.io/secureworkflow/google/orbit/codeql.yml/main?enable=permissions","Info: topLevel permissions set to 'read-all': .github/workflows/release.yml:11: update your workflow using https://app.stepsecurity.io/secureworkflow/google/orbit/release.yml/main?enable=permissions","Warn: jobLevel 'contents' permission set to 'write': .github/workflows/release.yml:22: update your workflow using https://app.stepsecurity.io/secureworkflow/google/orbit/release.yml/main?enable=permissions","Info: topLevel permissions set to 'read-all': .github/workflows/report-build-and-test.yml:13: update your workflow using https://app.stepsecurity.io/secureworkflow/google/orbit/report-build-and-test.yml/main?enable=permissions","Warn: jobLevel 'checks' permission set to 'write': .github/workflows/report-build-and-test.yml:18: update your workflow using https://app.stepsecurity.io/secureworkflow/google/orbit/report-build-and-test.yml/main?enable=permissions","Warn: jobLevel 'statuses' permission set to 'write': .github/workflows/report-build-and-test.yml:19: update your workflow using https://app.stepsecurity.io/secureworkflow/google/orbit/report-build-and-test.yml/main?enable=permissions","Info: topLevel permissions set to 'read-all': .github/workflows/report-checks.yml:13: update your workflow using https://app.stepsecurity.io/secureworkflow/google/orbit/report-checks.yml/main?enable=permissions","Warn: jobLevel 'checks' permission set to 'write': .github/workflows/report-checks.yml:18: update your workflow using https://app.stepsecurity.io/secureworkflow/google/orbit/report-checks.yml/main?enable=permissions","Warn: jobLevel 'statuses' permission set to 'write': .github/workflows/report-checks.yml:19: update your workflow using https://app.stepsecurity.io/secureworkflow/google/orbit/report-checks.yml/main?enable=permissions","Info: topLevel permissions set to 'read-all': .github/workflows/scorecards.yml:18: update your workflow using https://app.stepsecurity.io/secureworkflow/google/orbit/scorecards.yml/main?enable=permissions"],"documentation":{"short":"Determines if the project's workflows follow the principle of least privilege.","url":"https://github.com/ossf/scorecard/blob/c40859202d739b31fd060ac5b30d17326cd74275/docs/checks.md#token-permissions"}},{"name":"Vulnerabilities","score":10,"reason":"no vulnerabilities detected","details":null,"documentation":{"short":"Determines if the project has open, known unfixed vulnerabilities.","url":"https://github.com/ossf/scorecard/blob/c40859202d739b31fd060ac5b30d17326cd74275/docs/checks.md#vulnerabilities"}}]},"last_synced_at":"2025-08-19T05:02:34.355Z","repository_id":36954154,"created_at":"2025-08-19T05:02:34.355Z","updated_at":"2025-08-19T05:02:34.355Z"},"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":28424374,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-01-14T13:30:50.153Z","status":"ssl_error","status_checked_at":"2026-01-14T13:29:08.907Z","response_time":107,"last_error":"SSL_connect returned=1 errno=0 peeraddr=140.82.121.5:443 state=error: unexpected eof while reading","robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":false,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["cpu-profiler","dynamic-instrumentation","etw","hooking","instrumentation","performance","profiler","sampling","visualizer"],"created_at":"2024-07-30T22:01:01.739Z","updated_at":"2026-01-14T15:36:13.596Z","avatar_url":"https://github.com/google.png","language":"C++","readme":"# ORBIT\n![builds and tests](https://github.com/google/orbit/actions/workflows/build-and-test.yml/badge.svg?branch=main)\n![Debian package](https://github.com/google/orbit/actions/workflows/release.yml/badge.svg?branch=main)\n[![OpenSSF Scorecard](https://api.securityscorecards.dev/projects/github.com/google/orbit/badge)](https://api.securityscorecards.dev/projects/github.com/google/orbit)\n\n\u003cimg alt=\"ORBIT Logo\" src=\"contrib/logos/orbit_logo_simple.png\" align=\"right\" width=\"520\" \u003e\n\n**This project is not maintained by Google engineers anymore at this point.**\n\nOrbit, the **O**pen **R**untime **B**inary **I**nstrumentation **T**ool is a\nstandalone **native** application profiler for Windows and Linux. It supports\nnative applications written in languages such as C, C++, Rust, or Go. Its main\npurpose is to help developers identify the performance bottlenecks of a complex\napplication. Orbit can be also used to visualize the execution flow of such\napplications.\n\nThe key differentiator with many existing tools is that no alteration to the\ntarget process is necessary. Orbit does not require you to change a single line\nof code. It doesn't require you to recompile or even relaunch the application\nyou want to profile. Everything is done seamlessly, right when you need it. It\nrequires zero integration time and zero iteration time.\n\nOrbit combines sampling and dynamic instrumentation to optimize the profiling\nworkflow. Sampling can quickly identify interesting functions to instrument.\nDynamic instrumentation results in exact function entry and exit information\nwhich is presented in the form of per-thread hierarchical call graphs.\nManual instrumentation markers can be added to the source code and further\nallows for value-tracking. Scheduling events are also shown to visualize when a\nthread was running and on what core. Furthermore, Orbit visualizes thread\ndependencies, showing which thread got blocked or unblocked by which other\nthread. For AMD GPUs, the submission, scheduling and hardware execution timings\nof a job is visualized. Additional GPU data, such as Vulkan debug markers can be\nretrieved using Orbit's Vulkan layer. Memory consumption and page-fault\ninformation is visualized as well.\n\nAn introduction to Orbit's key features can be found in the following YouTube\nvideo:\n[![Orbit Presentation][orbit_youtube_presentation]](https://www.youtube.com/watch?v=8V-EPBPGZPs)\n\n## Features\n\n- Dynamic Instrumentation (no code change required)\n- Callstack Sampling\n- Wine/Proton Mixed-Callstack Profiling\n- Thread Scheduling and Dependency Tracing\n- Memory Tracing\n- GPU Driver Tracepoints (AMD only)\n- Vulkan Debug Label and Command Buffer Tracing (AMD only)\n- Manual Instrumentation\n- Source Code and Disassembly View\n- Remote Profiling\n- Debug Symbol Parsing (ELF, DWARF, PE and PDB)\n- Full Serialization of Captured Data\n\n### Note\n\nOrbit's focus has shifted to the Linux version. Windows local profiling is\ncurrently only supported partially and major features, such as dynamic\ninstrumentation, are not yet implemented. It is possible however to profile\nLinux executables from a Windows UI instance. For Windows local profiling,\nyou can still use the released\n[binaries](https://github.com/google/orbit/releases), but please note that\nthey are deprecated and mostly undocumented.\n\n## Build\n\nPlease have a look at the first three sections of our\n[development documentation](DEVELOPMENT.md). It describes how to build Orbit and\nwhich compilers, platforms, and tools are supported and needed.\n\n## Workflow\n\n\u003e **Note** An extensive documentation of the usage of Orbit can be found in our\n\u003e [usage documentation](documentation/DOCUMENTATION.md).\n\nThe following describes the basic workflow of Orbit:\n1. Select a process in the list of currently running processes in the connection\n   setup dialog, and click **Start Session**.\n2. The list of loaded modules will appear at the top of the **Symbols** tab.\n3. Orbit tries to automatically retrieve debug information of the modules.\n   See [here](documentation/DOCUMENTATION.md#load-symbols) on how to load\n   symbols for modules Orbit failed to load. For successfully loaded module\n   symbols, the **Functions** tab will get populated.\n4. Select functions you wish to dynamically instrument in the **Functions** tab\n   by \u003ckbd\u003eRight-Click\u003c/kbd\u003e and choosing **Hook**.\n5. Start profiling by pressing \u003ckbd\u003eF5\u003c/kbd\u003e. To stop profiling, press\n   \u003ckbd\u003eF5\u003c/kbd\u003e again. You can either zoom time using \u003ckbd\u003eW\u003c/kbd\u003e and\n   \u003ckbd\u003eS\u003c/kbd\u003e or \u003ckbd\u003eCtrl\u003c/kbd\u003e + the scroll wheel. You can also\n   \u003ckbd\u003eCtrl\u003c/kbd\u003e+\u003ckbd\u003eRight-Click\u003c/kbd\u003e and drag to zoom to a specific time\n   range. To scale the UI, press \u003ckbd\u003eCtrl\u003c/kbd\u003e + \u003ckbd\u003e+\u003c/kbd\u003e/\u003ckbd\u003e-\u003c/kbd\u003e.\n   Press \u003ckbd\u003eSPACE\u003c/kbd\u003e to see the last 2 seconds of capture.\n6. You can select sections of the per-thread sampling event track to get a\n   sampling report of your selection.\n\n## Presets\n\nOnce you have loaded the debug information for your modules and have chosen\nfunctions of interest to dynamically instrument, you can save your profiling\npreset so that you won't have to do this manually again. To save a preset, go to\n**File** \u003e **Save Preset**\n\n### Feedback\n\nQuestions and comments are more than welcome: please open an\n[issue](https://github.com/google/orbit/issues/new).\n\n## About\n\nOrbit was created by [Pierric Gimmig](https://www.linkedin.com/in/pgimmig/). It was \nfurther developed and maintained by a team of engineers at Google. As of now, the \nproject is however not being maintained by Google engineers anymore. \n\nThe following people worked on Orbit: \n* [@akopich](https://github.com/akopich)\n* [@antonrohr](https://github.com/antonrohr)\n* [@beckerhe](https://github.com/beckerhe)\n* [@danielfenner](https://github.com/danielfenner)\n* [@dimitry-](https://github.com/dimitry-)\n* [@dpallotti](https://github.com/dpallotti)\n* [@florian-kuebler](https://github.com/florian-kuebler)\n* [@karupayun](https://github.com/karupayun)\n* [@pierricgimmig](https://github.com/pierricgimmig)\n* [@reichlfl](https://github.com/reichlfl)\n* [@ronaldfw](https://github.com/ronaldfw)\n* [@vickyliu-go4it](https://github.com/vickyliu-go4it)\n* [@vwbaker](https://github.com/vwbaker)\n\n## License\n\n[License (BSD 2-clause)](./LICENSE)\n\n\u003ca href=\"http://opensource.org/licenses/BSD-2-Clause\" target=\"_blank\"\u003e\n\u003cimg style=\"float: right\" src=\"http://opensource.org/trademarks/opensource/OSI-Approved-License-100x137.png\" alt=\"OSI Approved License\"\u003e\n\u003c/a\u003e\n\n```text\nCopyright (c) 2020 The Orbit Authors. All rights reserved.\n\nBSD 2-Clause License\n\nRedistribution and use in source and binary forms, with or without\nmodification, are permitted provided that the following conditions are met:\n\n* Redistributions of source code must retain the above copyright notice, this\n  list of conditions and the following disclaimer.\n\n* Redistributions in binary form must reproduce the above copyright notice,\n  this list of conditions and the following disclaimer in the documentation\n  and/or other materials provided with the distribution.\n\nTHIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS \"AS IS\"\nAND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE\nIMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE\nDISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE\nFOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL\nDAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR\nSERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER\nCAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,\nOR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE\nOF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n```\n\n\n[orbit_youtube_presentation]: contrib/logos/orbit_presentation_youtube.png\n","funding_links":[],"categories":["TODO scan for Android support in followings","C++","Game-BenchMark/Metric/Tool","Debugging \u0026 Profiling \u0026 Tracing","Performance Analysis and Debugging Tool"],"sub_categories":["For C++/C","RPC (_Remote Procedure Call_)"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fgoogle%2Forbit","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fgoogle%2Forbit","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fgoogle%2Forbit/lists"}