
A Live Response collection script for Incident Response that automates the collection of artifacts from various Unix-like operating systems.

A Live Response collection script for Incident Response that automates the collection of artifacts from various Unix-like operating systems.
Unix-like Artifacts Collector UAC is a Live Response collection script for Incident Response that makes use of native binaries and tools to automate the collection of AIX, Android, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler, OpenBSD and Solaris systems artifacts. It was created to facilitate and speed up data collection, and depend less on remote support during incident response engagements. Documentation • Main Features • Supported Operating Systems • Using UAC • Contributing • Support • License 📘 Documentation Project documentation page: https://tclahr.github.io/uac-docs 🌟 Main Features Run everywhere with no dependencies (no installation required). Customizable and extensible collections and artifacts. Respect the order of volatility during artifact collection. Collect information from processes running without a binary on disk. Hash running processes and executable files. Extract information from files and directories to create a bodyfile (including enhanced file attributes for ext4). Collect user and system configuration files and logs. Collect artifacts from applications. Acquire volatile memory from Linux systems using different methods and tools. 💾 Supported Operating Systems AIX, Android, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler, OpenBSD and Solaris.
Common questions about Unix-like Artifacts Collector UAC including features, pricing, alternatives, and user reviews.
Unix-like Artifacts Collector UAC is A Live Response collection script for Incident Response that automates the collection of artifacts from various Unix-like operating systems. It is a Security Operations solution designed to help security teams with Evidence Collection, Memory Forensics.
Unix-like Artifacts Collector UAC is a free Security Operations tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/tclahr/uac/ for download and installation instructions.
Popular alternatives to Unix-like Artifacts Collector UAC include:
Compare these tools and more at https://cybersectools.com/categories/security-operations
Unix-like Artifacts Collector UAC is for security teams and organizations that need Evidence Collection, Memory Forensics. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Security Operations tools can be found at https://cybersectools.com/categories/security-operations
A library and set of tools for accessing and analyzing storage media devices and partitions for forensic analysis and investigation.
A PowerShell-based incident response and live forensic data acquisition tool for Windows hosts.