All Projects → tclahr → uac

tclahr / uac

Licence: Apache-2.0 license
UAC is a Live Response collection script for Incident Response that makes use of native binaries and tools to automate the collection of AIX, Android, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler, OpenBSD and Solaris systems artifacts.

Programming Languages

shell
77523 projects
perl
6916 projects
c
50402 projects - #5 most used programming language
Makefile
30231 projects

Projects that are alternatives of or similar to uac

WendzelNNTPd
A usable and IPv6-ready Usenet-server (NNTP daemon). It is portable (Linux/*BSD/*nix), supports AUTHINFO authentication, contains ACL as well as role based ACL and provides "invisible" newsgroups. It can run on MySQL and SQLite backends.
Stars: ✭ 43 (-83.46%)
Mutual labels:  freebsd, openbsd, netbsd, solaris
default-gateway
Get the default network gateway, cross-platform.
Stars: ✭ 77 (-70.38%)
Mutual labels:  freebsd, openbsd, solaris, aix
InitKit
Neo-InitWare is a modular, cross-platform reimplementation of the systemd init system. It is experimental.
Stars: ✭ 364 (+40%)
Mutual labels:  freebsd, openbsd, netbsd
Fisy Fuzz
This is the full file system fuzzing framework that I presented at the Hack in the Box 2020 Lockdown Edition conference in April.
Stars: ✭ 110 (-57.69%)
Mutual labels:  freebsd, openbsd, netbsd
Packrat
Live system forensic collector
Stars: ✭ 16 (-93.85%)
Mutual labels:  incident-response, forensics, dfir
RdpCacheStitcher
RdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.
Stars: ✭ 176 (-32.31%)
Mutual labels:  incident-response, forensics, dfir
Postinstall
💻 Bash Script to automate post-installation steps
Stars: ✭ 104 (-60%)
Mutual labels:  freebsd, openbsd, netbsd
Libtuntap
The portable Tun/Tap devices configuration utility
Stars: ✭ 107 (-58.85%)
Mutual labels:  freebsd, openbsd, netbsd
Objfw
[Official Mirror] A portable framework for the Objective-C language.
Stars: ✭ 161 (-38.08%)
Mutual labels:  freebsd, openbsd, netbsd
Awesome Bsd
A collection of awesome BSD related stuff
Stars: ✭ 236 (-9.23%)
Mutual labels:  freebsd, openbsd, netbsd
INDXRipper
Carve file metadata from NTFS index ($I30) attributes
Stars: ✭ 32 (-87.69%)
Mutual labels:  incident-response, forensics, dfir
Qtfm
Qt File Manager
Stars: ✭ 73 (-71.92%)
Mutual labels:  freebsd, openbsd, netbsd
Ruby Vmstat
A focused and fast library to gather memory, cpu, network, load avg and disk information
Stars: ✭ 68 (-73.85%)
Mutual labels:  freebsd, openbsd, netbsd
CDIR
CDIR (Cyber Defense Institute Incident Response) Collector - live collection tool based on oss tool/library
Stars: ✭ 122 (-53.08%)
Mutual labels:  incident-response, forensics, dfir
Awesome Unix
All the UNIX and UNIX-Like: Linux, BSD, macOS, Illumos, 9front, and more.
Stars: ✭ 973 (+274.23%)
Mutual labels:  freebsd, openbsd, netbsd
Daemonize
daemonize is a library for writing system daemons in Python.
Stars: ✭ 396 (+52.31%)
Mutual labels:  freebsd, openbsd, netbsd
CCXDigger
The CyberCX Digger project is designed to help Australian organisations determine if they have been impacted by certain high profile cyber security incidents. Digger provides threat hunting functionality packaged in a simple-to-use tool, allowing users to detect certain attacker activities; all for free.
Stars: ✭ 45 (-82.69%)
Mutual labels:  incident-response, forensics, dfir
Cosmopolitan
build-once run-anywhere c library
Stars: ✭ 6,324 (+2332.31%)
Mutual labels:  freebsd, openbsd, netbsd
Ecominit
eComInit is a free init system and service manager designed to scale from lightweight desktops to web-scale cloud deployments. It aims to offer feature-parity with systemd but with a modular, portable architecture compliant with software engineering best-practice.
Stars: ✭ 352 (+35.38%)
Mutual labels:  freebsd, openbsd, netbsd
Mg
Micro (GNU) Emacs-like text editor ❤️ public-domain
Stars: ✭ 117 (-55%)
Mutual labels:  freebsd, openbsd, netbsd

Unix-like Artifacts Collector

ShellCheck CII Best Practices GitHub release (latest by date including pre-releases) GitHub

UAC is a Live Response collection script for Incident Response that makes use of native binaries and tools to automate the collection of AIX, Android, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler, OpenBSD and Solaris systems artifacts. It was created to facilitate and speed up data collection, and depend less on remote support during incident response engagements.

DocumentationMain FeaturesSupported Operating SystemsUsing UACContributingSupportLicense

Imgur


📘 Documentation

Project documentation page: https://tclahr.github.io/uac-docs


🌟 Main Features

  • Runs everywhere with no dependencies (no installation required).
  • Customizable and extensible collections and artifacts.
  • Respects the order of volatility during artifacts collection.
  • Collects information from processes running without a binary on disk.
  • Extracts information from files and directories to create a bodyfile (including enhanced file attributes for ext4).
  • Hashes running processes and executable files.
  • Collects user and system configuration files and logs.
  • Collects artifacts from applications.
  • Acquires volatile memory from Linux systems using Microsoft's avml tool.

💾 Supported Operating Systems

UAC runs on any Unix-like system (regardless of the processor architecture). All UAC needs is shell :)

AIX Android ESXi FreeBSD Linux macOS NetBSD NetScaler OpenBSD Solaris

Note that UAC even runs on systems like Network Attached Storage (NAS) devices, Network devices such as OpenWrt, and IoT devices.


🚀 Using UAC

UAC does not need to be installed on the target system. You only need to download the latest version from the releases page, uncompress and run it. As simple as that!

A profile name and/or a list of artifacts, and the destination directory need to be provided to run a collection. The remaining parameters are optional.

Common usage scenarios may include the following:

Collect all artifacts based on the full profile, and create the output file in /tmp.

./uac -p full /tmp

Collect all live_response, and the bodyfile/bodyfile.yaml artifact, and create the output file in the current directory.

./uac -a live_response/\*,bodyfile/bodyfile.yaml .

Collect all artifacts based on the full profile, but excludes the bodyfile/bodyfile.yaml artifact, and create the output file in /tmp.

./uac -p full -a \!bodyfile/bodyfile.yaml /tmp

Collect the memory dump, then all artifacts based on the full profile.

./uac -a memory_dump/avml.yaml -p full /tmp

Collect the memory dump, then all artifacts based on the ir_triage profile excluding the bodyfile/bodyfile.yaml artifact.

./uac -a memory_dump/avml.yaml -p ir_triage -a \!bodyfile/bodyfile.yaml /tmp

Collect all artifacts based on the full profile, but limit the data collection based on the date range provided.

./uac -p full /tmp --date-range-start 2021-05-01 --date-range-end 2021-08-31

Collect all but live response artifacts from a Linux disk image mounted in /mnt/ewf.

./uac -p full -a \!live_response/\* /tmp --mount-point /mnt/ewf --operating-system linux

Please check the project documentation page for more information about command line options, how to create your own artifacts, profiles, and more!


💙 Contributing

Have you created your own artifact files? Please share them with us!

You can contribute with new artifacts, profiles, bug fixes or even propose new features. Please read our Contributing Guide before submitting a Pull Request to the project.


👨‍💻 Community Support

For general help using UAC, please refer to the project documentation page. For additional help, you can use one of the channels to ask a question:

  • Discord (For live discussion with the community and UAC team)
  • GitHub (Bug reports and contributions)
  • Twitter (Get the news fast)

📜 License

The UAC project uses the Apache License Version 2.0 software license.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].