Unix-like Artifacts Collector UAC Logo

Unix-like Artifacts Collector UAC

A Live Response collection script for Incident Response that automates the collection of artifacts from various Unix-like operating systems.

1,255
Visit website
Compare
Compare
0
MCPThe entire cybersecurity market, one prompt awayTry MCP Access

Unix-like Artifacts Collector UAC Description

Unix-like Artifacts Collector UAC is a Live Response collection script for Incident Response that makes use of native binaries and tools to automate the collection of AIX, Android, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler, OpenBSD and Solaris systems artifacts. It was created to facilitate and speed up data collection, and depend less on remote support during incident response engagements. Documentation • Main Features • Supported Operating Systems • Using UAC • Contributing • Support • License 📘 Documentation Project documentation page: https://tclahr.github.io/uac-docs 🌟 Main Features Run everywhere with no dependencies (no installation required). Customizable and extensible collections and artifacts. Respect the order of volatility during artifact collection. Collect information from processes running without a binary on disk. Hash running processes and executable files. Extract information from files and directories to create a bodyfile (including enhanced file attributes for ext4). Collect user and system configuration files and logs. Collect artifacts from applications. Acquire volatile memory from Linux systems using different methods and tools. 💾 Supported Operating Systems AIX, Android, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler, OpenBSD and Solaris.

Unix-like Artifacts Collector UAC FAQ

Common questions about Unix-like Artifacts Collector UAC including features, pricing, alternatives, and user reviews.

Unix-like Artifacts Collector UAC is A Live Response collection script for Incident Response that automates the collection of artifacts from various Unix-like operating systems.. It is a Security Operations solution designed to help security teams with Evidence Collection, Memory Forensics.

Have more questions? Browse our categories or search for specific tools.

ALTERNATIVES

Aurora Incident Response Logo

Incident Response Documentation tool for tracking findings and tasks.

0
libsmdev Logo

A library and set of tools for accessing and analyzing storage media devices and partitions for forensic analysis and investigation.

0
PSRecon Logo

A PowerShell-based incident response and live forensic data acquisition tool for Windows hosts.

0
dfvfs Logo

A digital forensics tool that provides read-only access to file-system objects from various storage media types and file formats.

0
RTIR Logo

Request Tracker for Incident Response (RTIR) is a tool for incident response teams to manage incident reports, correlate data, and facilitate communication.

0

Stay Updated with Mandos Brief

Get strategic cybersecurity insights in your inbox