Unix-like Artifacts Collector UAC Logo

Unix-like Artifacts Collector UAC

0
Free
Visit Website

Unix-like Artifacts Collector UAC is a Live Response collection script for Incident Response that makes use of native binaries and tools to automate the collection of AIX, Android, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler, OpenBSD and Solaris systems artifacts. It was created to facilitate and speed up data collection, and depend less on remote support during incident response engagements. Documentation • Main Features • Supported Operating Systems • Using UAC • Contributing • Support • License 📘 Documentation Project documentation page: https://tclahr.github.io/uac-docs 🌟 Main Features Run everywhere with no dependencies (no installation required). Customizable and extensible collections and artifacts. Respect the order of volatility during artifact collection. Collect information from processes running without a binary on disk. Hash running processes and executable files. Extract information from files and directories to create a bodyfile (including enhanced file attributes for ext4). Collect user and system configuration files and logs. Collect artifacts from applications. Acquire volatile memory from Linux systems using different methods and tools. 💾 Supported Operating Systems AIX, Android, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler, OpenBSD and Solaris.

FEATURES

ALTERNATIVES

A robust and flexible hunt and incident response tool for investigating AzureAD, Azure, and M365 environments.

Fast Intercept is a security automation platform that empowers users to maximize their existing security products and automate routine tasks.

jimi is an orchestration automation tool for multi-team collaboration and automation in IT/Security operations, Development, and CI/CD pipelines.

Companion repository for deploying osquery in a production environment with tailored query packs.

An open-source SOAR tool for automating threat and incident response workflows using CACAO security playbooks.

Incident response and case management solution for efficient incident response and management.

A multi-platform open source tool for triaging suspect systems and hunting for Indicators of Compromise (IOCs) across thousands of endpoints.

A defense-in-depth security automation and monitoring framework utilizing threat intelligence, machine learning, and serverless technologies.