Skip to content

ananya-5420/linux-ir-toolkit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

4 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ”’ Project Purpose

This project automates the process of collecting key forensic artifacts during a security incident on a Linux machine. It will help responders capture memory state, user sessions, logs, and system details, then bundles everything in a timestamped archive with hash validation for evidence integrity.

βš™οΈ Features

  • πŸ“Œ Collects system and user session info
  • πŸ” Captures active processes and open ports
  • 🌐 Extracts login activity (last, lastlog)
  • πŸ—ƒοΈ Copies important logs like auth.log, syslog
  • πŸ” Generates SHA256 hashes for all collected files
  • πŸ“¦ Bundles everything in a .tar.gz archive

πŸ› οΈ Requirements

  • Bash (default on most Linux distros)
  • Core Linux tools: ps, ss, last, who, sha256sum, tar
  • Root access to collect full system logs and ports

πŸš€ Usage

  1. Clone the repository

    git clone https://github.com/your-username/linux-ir-toolkit.git
    cd linux-ir-toolkit/scripts
  2. Clone the repository

sudo ./collect_artifacts.sh
  1. Find results in /tmp/incident-response-YYYYMMDD_HHMMSS/

About

A Bash-based Linux Incident Response Toolkit

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors