Skip to content
/ uac Public

UAC is a powerful and extensible incident response tool designed for forensic investigators, security analysts, and IT professionals. It automates the collection of artifacts from a wide range of Unix-like systems, including AIX, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler, OpenBSD and Solaris.

License

Notifications You must be signed in to change notification settings

tclahr/uac

Folders and files

NameName
Last commit message
Last commit date

Latest commit

1a945f3 Β· Mar 20, 2025
Jan 9, 2025
Mar 20, 2025
Jan 11, 2025
Jul 3, 2024
Feb 27, 2025
Jul 3, 2024
Feb 5, 2025
Feb 8, 2025
Mar 20, 2025
Jan 31, 2025
Jan 31, 2025
Feb 4, 2020
Jul 3, 2024
Jan 31, 2025
Feb 4, 2020
Mar 5, 2025
Mar 20, 2025

Repository files navigation

logo

Unix-like Artifacts Collector (UAC)

shellcheck_badge bestpractices_badge release_badge license_badge

About β€’ Documentation β€’ Main Features β€’ Supported Operating Systems β€’ Usage β€’ Contributing β€’ Support β€’ License

πŸ”Ž About UAC

UAC (Unix-like Artifacts Collector) is a powerful and extensible incident response tool designed for forensic investigators, security analysts, and IT professionals. It automates the collection of artifacts from a wide range of Unix-like systems, including AIX, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler, OpenBSD and Solaris.

Whether you're handling an intrusion, conducting forensic investigations, or performing compliance checks, UAC simplifies and accelerates data collection while minimizing reliance on external support during critical incidents.

Key Highlights

  • πŸ“‚ Fully customizable via YAML profiles for tailored data collection.
  • ⚑ Lightweight, portable, and requires no installation or dependencies.
  • πŸ”’ Adheres to the order of volatility to ensure reliable data acquisition.
  • πŸ›  Designed for diverse environments, including IoT devices and NAS systems.

UAC in Action

πŸ“˜ Documentation

Full documentation is available at the project documentation page.

🌟 Main Features

  • Run everywhere with no dependencies (no installation required).
  • Customizable and extensible collections and artifacts.
  • Respect the order of volatility during artifact collection.
  • Collect information about current running processes (including processes without a binary on disk).
  • Hash running processes and executable files.
  • Extract files and directories status to create a bodyfile.
  • Collect system and user-specific data, configuration files, and logs.
  • Acquire volatile memory from Linux systems using different methods and tools.
  • Support to write output to various cloud platforms.

πŸ’Ύ Supported Operating Systems

UAC runs on any Unix-like system, regardless of the processor architecture. All UAC needs is shell :)

AIX ESXi FreeBSD Linux macOS NetBSD NetScaler OpenBSD Solaris

Note: UAC even runs on systems like Network Attached Storage (NAS) devices, Network devices such as OpenWrt, and IoT devices.

πŸš€ Usage

UAC does not need to be installed on the target system. Simply download the latest version from the releases page, uncompress it, and launch. It's that simple!

πŸ›  Getting Started

  1. Download the latest release from the Releases page.
  2. Uncompress the archive.
  3. Execute the tool directly from the terminal.

Examples

Click to view usage examples

Collect all artifacts based on the ir_triage profile:

./uac -p ir_triage /tmp

Collect memory dump and all artifacts based on the full profile:

./uac -a ./artifacts/memory_dump/avml.yaml -p full /tmp

Collect all artifacts excluding a specific one:

./uac -p full -a \!artifacts/bodyfile/bodyfile.yaml .

Collect all artifacts based on the ir_triage profile, along with all artifacts located in the /my_custom_artifacts directory:

./uac -p ir_triage -a /my_custom_artifacts/\* /mnt/sda1

Collect all artifacts based on a custom profile:

./uac -p /my_custom_uac_data/my_custom_uac_profile.yaml /tmp

πŸ’™ Contributing

Contributions make the open-source community such an amazing place to learn, inspire, and create. Any contributions you make are greatly appreciated.

Have you created any artifacts? Please share them with us!

You can contribute with new artifacts, profiles, bug fixes, or propose new features. Please read our Contributing Guide before submitting a Pull Request to the project.

πŸ‘¨β€πŸ’» Support

For general help using UAC, please refer to the project documentation page. For additional help, you can use one of the following channels:

  • Discord (For live discussion with the community and UAC team)
  • GitHub (Bug reports and contributions)
  • Twitter (Get the news fast)

⭐ Support the Project

If you find UAC helpful, please give us a ⭐ on GitHub! This helps others discover the project and motivates us to improve it further.

πŸ“œ License

The UAC project uses the Apache License Version 2.0 software license.

About

UAC is a powerful and extensible incident response tool designed for forensic investigators, security analysts, and IT professionals. It automates the collection of artifacts from a wide range of Unix-like systems, including AIX, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler, OpenBSD and Solaris.

Topics

Resources

License

Code of conduct

Stars

Watchers

Forks