11/12 free views
Tool
Script
Incident Response & Management

uac

by tclahr

1.1Kstars
161forks
29watchers
Updated 8 months ago
About

UAC is a lightweight, extensible incident response tool that automates artifact collection across diverse Unix-like systems for forensic and security investigations.

UAC is a powerful and extensible incident response tool designed for forensic investigators, security analysts, and IT professionals. It automates the collection of artifacts from a wide range of Unix-like systems, including AIX, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler, OpenBSD and Solaris.

Primary Use Case

UAC is designed for forensic investigators, security analysts, and IT professionals to automate and streamline the collection of system artifacts during incident response, forensic investigations, or compliance audits. It enables rapid data acquisition from a wide range of Unix-like environments without requiring installation or dependencies, minimizing operational overhead during critical incidents.

Key Features
  • Fully customizable via YAML profiles for tailored data collection
  • Lightweight, portable, and requires no installation or dependencies
  • Adheres to the order of volatility for reliable data acquisition
  • Supports artifact collection from a broad range of Unix-like systems including AIX, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler, OpenBSD, and Solaris
  • Collects information on running processes including those without binaries on disk
  • Hashes running processes and executable files for integrity verification
  • Extracts file and directory status to create forensic bodyfiles
  • Acquires volatile memory on Linux systems using multiple methods

Installation

  • Download or clone the repository from GitHub
  • Ensure the target system has a shell environment available
  • No installation or dependencies required; the tool runs directly as a shell script

Usage

>_ ./uac.sh -p profile.yaml

Run UAC with a specified YAML profile to customize artifact collection

>_ ./uac.sh --help

Display help information and usage options for UAC

Security Frameworks
Collection
Discovery
Response
Credential Access
Defense Evasion
Usage Insights
  • Leverage UAC's YAML customization to create environment-specific artifact profiles for faster triage.
  • Integrate UAC into automated incident response playbooks to speed up forensic data collection.
  • Use UAC in purple team exercises to validate detection capabilities across diverse Unix-like systems.
  • Deploy UAC as a lightweight tool for rapid on-site forensic acquisition without installation overhead.
  • Combine UAC's volatile memory acquisition with endpoint detection tools for comprehensive incident analysis.

Docs Take 2 Hours. AI Takes 10 Seconds.

Ask anything about uac. Installation? Config? Troubleshooting? Get answers trained on real docs and GitHub issues—not generic ChatGPT fluff.

This tool hasn't been indexed yet. Request indexing to enable AI chat.

Admin will review your request within 24 hours

Security Profile
Red Team40%
Blue Team90%
Purple Team75%
Details
LicenseApache License 2.0
LanguageShell
Open Issues78
Topics
incident-response
forensics
computer-forensics
triage
linux
aix
solaris
macos
openbsd
freebsd