Open-Awesome
CategoriesAlternativesStacksSelf-HostedExplore
Open-Awesome

© 2026 Open-Awesome. Curated for the developer elite.

TermsPrivacyAboutGitHubRSS
  1. Home
  2. Incident Response
  3. UAC

UAC

Apache-2.0Shellv3.3.0

A portable, extensible incident response tool that automates forensic artifact collection across Unix-like systems.

Visit WebsiteGitHubGitHub
1.3k stars188 forks0 contributors

What is UAC?

UAC (Unix-like Artifacts Collector) is an open-source incident response tool that automates the collection of forensic artifacts from Unix-like systems. It helps security analysts, forensic investigators, and IT professionals gather critical system data during security incidents, investigations, or compliance checks. The tool is designed to be portable, extensible, and dependency-free, running on a wide range of environments from servers to IoT devices.

Target Audience

Forensic investigators, security analysts, incident responders, and IT professionals who need to collect digital evidence from Unix-like systems during security incidents or forensic examinations.

Value Proposition

Developers choose UAC for its portability (no installation required), extensibility via YAML profiles, and broad OS support, making it a reliable tool for time-sensitive forensic data collection across diverse environments.

Overview

UAC is a powerful and extensible incident response tool designed for forensic investigators, security analysts, and IT professionals. It automates the collection of artifacts from a wide range of Unix-like systems, including AIX, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler, OpenBSD and Solaris.

Use Cases

Best For

  • Automating forensic artifact collection during security incident response
  • Conducting compliance checks on Unix-like systems
  • Performing digital forensics on IoT devices or NAS systems
  • Gathering volatile memory and process information from Linux systems
  • Creating customizable data collection profiles for specific investigation needs
  • Collecting system and user data across heterogeneous Unix-like environments

Not Ideal For

  • Investigations requiring artifact collection from Windows or non-Unix systems
  • Teams needing an all-in-one forensic suite with built-in analysis and visualization tools
  • Real-time incident response scenarios where active system remediation or continuous monitoring is required
  • Environments with highly restricted shell access or where executing external scripts is prohibited

Pros & Cons

Pros

Portable and Dependency-Free

Runs anywhere with just a shell and no installation required, as emphasized in the 'Portable & Dependency-Free' feature and usage examples where you simply download and execute.

Highly Customizable Collections

Fully configurable via YAML profiles for tailored data acquisition, allowing users to define specific artifacts and exclude others, as shown in the usage examples with '-p' and '-a' flags.

Broad System Compatibility

Supports a wide range of Unix-like OS including AIX, ESXi, macOS, and even IoT devices, evidenced by the extensive list and badges in the 'Supported Operating Systems' section.

Volatility-Aware Data Acquisition

Adheres to the order of volatility to ensure reliable forensic data collection, a key feature highlighted in the README that prioritizes volatile data like memory and processes.

Cons

Limited Memory Acquisition Scope

Memory acquisition is primarily focused on Linux systems using specific tools like AVML, not uniformly available across all supported Unix-like OS, as noted in the 'Memory Acquisition' feature.

No Built-In Analysis Capabilities

UAC only collects artifacts; users must rely on external tools for data analysis, which adds complexity and time to the forensic workflow beyond the collection phase.

Shell Dependency and Configuration Complexity

Requires shell access and familiarity with YAML configuration, which can be a barrier in locked-down environments or for users less experienced with command-line forensics, despite the documentation.

Frequently Asked Questions

Quick Stats

Stars1,321
Forks188
Contributors0
Open Issues8
Last commit16 days ago
CreatedSince 2020

Tags

#digital-forensics#unix-like#security-tools#compliance#linux#forensics#incident-response#computer-forensics#macos#freebsd#openbsd#yaml-configuration#memory-acquisition

Built With

Y
YAML
s
shell

Links & Resources

Website

Included in

Incident Response8.9k
Auto-fetched 1 day ago

Related Projects

bulk_extractorbulk_extractor

This is the development tree. Production downloads are at:

Stars1,363
Forks219
Last commit3 months ago
Forensic Artifact repositoryForensic Artifact repository

Digital Forensics artifact repository

Stars1,240
Forks224
Last commit3 days ago
Community-curated · Updated weekly · 100% open source

Found a gem we're missing?

Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.

Submit a projectStar on GitHub