Open-Awesome
CategoriesAlternativesStacksSelf-HostedExplore
Open-Awesome

© 2026 Open-Awesome. Curated for the developer elite.

TermsPrivacyAboutGitHubRSS
  1. Home
  2. Incident Response
  3. artifactcollector

artifactcollector

MITGov0.17.1

A customizable single-binary agent for collecting forensic artifacts from Windows, macOS, and Linux systems.

GitHubGitHub
307 stars25 forks0 contributors

What is artifactcollector?

artifactcollector is a forensic tool that collects specific artifacts from Windows, macOS, and Linux systems for investigative purposes. It extracts targeted data like files, registry keys, and system outputs without requiring full disk images, streamlining forensic analysis. The tool is distributed as a single binary that can be deployed directly on systems under investigation.

Target Audience

Digital forensic investigators, incident responders, and security professionals who need to collect targeted forensic evidence from diverse operating systems during investigations.

Value Proposition

Developers choose artifactcollector for its portability as a single binary, cross-platform compatibility including legacy Windows versions, and extensible artifact definitions based on the Forensic Artifacts framework, enabling customizable and efficient evidence collection.

Overview

🧭 The artifactcollector is a customizable agent to collect forensic artifacts on any Windows, macOS or Linux system

Use Cases

Best For

  • Collecting targeted forensic artifacts without full disk imaging
  • Cross-platform forensic investigations on Windows, Linux, and macOS
  • Incident response where quick evidence collection is needed
  • Extracting registry keys and system artifacts from Windows machines
  • Using predefined artifact definitions from forensic frameworks
  • Deploying forensic tools as standalone executables on investigated systems

Not Ideal For

  • Investigations requiring full disk imaging for legal or comprehensive evidence
  • Environments with strict anti-malware policies that block unsigned or suspicious binaries
  • Real-time forensic monitoring or continuous data collection scenarios
  • Users needing a graphical interface for ease of use without command-line expertise

Pros & Cons

Pros

Cross-Platform Compatibility

Runs on Windows, Linux, and macOS, including legacy Windows versions like 2000/XP, as highlighted in the features section, ensuring broad investigative reach.

Single Binary Deployment

Distributed as a standalone executable that can be transferred to target systems, minimizing dependencies and simplifying forensic tool deployment in the field.

Extensible Artifact Definitions

Uses the configurable and extensible Forensic Artifacts framework, allowing customization of collection rules through YAML files, as described in the 'Build your own artifactcollector' section.

Embedded Executables Support

Can run additional embedded binaries as part of collection, enabling extended forensic capabilities like running external tools, with examples provided in the 'Embed binaries' section.

Cons

Malware Detection Risk

The README warns it behaves similarly to malware and might be flagged by antivirus software, complicating deployment in security-sensitive environments.

Complex Customization Process

Adding or modifying artifacts requires editing YAML files and recompiling the binary with make commands, which adds overhead for non-developers or rapid adjustments.

Performance Overhead

Collection can take several minutes depending on system resources and artifact definitions, potentially slowing down time-sensitive incident response efforts.

Frequently Asked Questions

Quick Stats

Stars307
Forks25
Contributors0
Open Issues0
Last commit1 year ago
CreatedSince 2020

Tags

#digital-forensics#macos-forensics#forensic-artifacts#dfir#security-tools#incident-response#go#artifact-collection#single-binary#windows-forensics#linux-forensics

Built With

G
Go

Included in

Incident Response8.9k
Auto-fetched 1 day ago

Related Projects

bulk_extractorbulk_extractor

This is the development tree. Production downloads are at:

Stars1,367
Forks219
Last commit3 months ago
UACUAC

UAC is a powerful and extensible incident response tool designed for forensic investigators, security analysts, and IT professionals. It automates the collection of artifacts from a wide range of Unix-like systems, including AIX, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler, OpenBSD and Solaris.

Stars1,352
Forks190
Last commit1 month ago
Forensic Artifact repositoryForensic Artifact repository

Digital Forensics artifact repository

Stars1,239
Forks225
Last commit2 days ago
CyLRCyLR

CyLR - Live Response Collection Tool

Stars724
Forks95
Last commit4 years ago
Community-curated · Updated weekly · 100% open source

Found a gem we're missing?

Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.

Submit a projectStar on GitHub