- Home
- Security Operations
- Digital Forensics and Incident Response
- Unix-like Artifacts Collector UAC
Unix-like Artifacts Collector UAC
A Live Response collection script for Incident Response that automates the collection of artifacts from various Unix-like operating systems.

Unix-like Artifacts Collector UAC
A Live Response collection script for Incident Response that automates the collection of artifacts from various Unix-like operating systems.
Unix-like Artifacts Collector UAC Description
Unix-like Artifacts Collector UAC is a Live Response collection script for Incident Response that makes use of native binaries and tools to automate the collection of AIX, Android, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler, OpenBSD and Solaris systems artifacts. It was created to facilitate and speed up data collection, and depend less on remote support during incident response engagements. Documentation • Main Features • Supported Operating Systems • Using UAC • Contributing • Support • License 📘 Documentation Project documentation page: https://tclahr.github.io/uac-docs 🌟 Main Features Run everywhere with no dependencies (no installation required). Customizable and extensible collections and artifacts. Respect the order of volatility during artifact collection. Collect information from processes running without a binary on disk. Hash running processes and executable files. Extract information from files and directories to create a bodyfile (including enhanced file attributes for ext4). Collect user and system configuration files and logs. Collect artifacts from applications. Acquire volatile memory from Linux systems using different methods and tools. 💾 Supported Operating Systems AIX, Android, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler, OpenBSD and Solaris.
Unix-like Artifacts Collector UAC FAQ
Common questions about Unix-like Artifacts Collector UAC including features, pricing, alternatives, and user reviews.
Unix-like Artifacts Collector UAC is A Live Response collection script for Incident Response that automates the collection of artifacts from various Unix-like operating systems.. It is a Security Operations solution designed to help security teams with Incident Response, Digital Forensics, Script.
FEATURED
Password manager with end-to-end encryption and identity protection features
VPN service providing encrypted internet connections and privacy protection
Fractional CISO services for B2B companies to accelerate sales and compliance
Stay Updated with Mandos Brief
Get the latest cybersecurity updates in your inbox
TRENDING CATEGORIES
POPULAR
Security platform that provides protection, monitoring and governance for enterprise generative AI applications and LLMs against various threats including prompt injection and data poisoning.
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
OSINTLeak is a tool for discovering and analyzing leaked sensitive information across various online sources to identify potential security risks.
Weekly cybersecurity newsletter for security leaders and professionals