unix_collector is a shell script for basic forensic collection of various artefacts from UNIX systems. It runs on various Unix systems and attempts to collect artefacts which could be analysed in attempt to identify potential system compromise. It does a better job when running as root because it can read more files of course. Available platforms: Sun Solaris, Linux, IBM AIX, HPUX, MacOS, Debian, Ubuntu, CentOS, Red Hat, Android, Probably others as well. Script Activities: * Enumerate basic host information such as kernel version, processes, hostname and save details in output directory. * Enumerate files written to the disk and create basic timeline using 'stat' command. * Enumerate network information and save details in output directory. * Enumerate patch and installed software information and save details in output directory. * Enumerate process list and other process information and save details in output directory. * Enumerate application lists, plist/apk for iOS/Android save them in output directory.
Common questions about unix_collector including features, pricing, alternatives, and user reviews.
unix_collector is A shell script for basic forensic collection of various artefacts from UNIX systems. It is a Security Operations solution designed to help security teams with Unix.
unix_collector is a free Security Operations tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/op7ic/unix_collector/ for download and installation instructions.
Popular alternatives to unix_collector include:
Compare all unix_collector alternatives at https://cybersectools.com/alternatives/unixcollector
unix_collector is for security teams and organizations that need Unix. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Security Operations tools can be found at https://cybersectools.com/categories/security-operations
Head-to-head feature, pricing, and rating breakdowns.
A decentralized network panic button that triggers emergency system shutdowns across networked machines via UDP broadcasts and HTTP to prevent cold boot attacks.
Collaborative case management platform for incident response and investigation
Malware analysis platform for detecting and analyzing threats via sandbox