This project automates the process of collecting key forensic artifacts during a security incident on a Linux machine. It will help responders capture memory state, user sessions, logs, and system details, then bundles everything in a timestamped archive with hash validation for evidence integrity.
- π Collects system and user session info
- π Captures active processes and open ports
- π Extracts login activity (
last,lastlog) - ποΈ Copies important logs like
auth.log,syslog - π Generates
SHA256hashes for all collected files - π¦ Bundles everything in a
.tar.gzarchive
- Bash (default on most Linux distros)
- Core Linux tools:
ps,ss,last,who,sha256sum,tar - Root access to collect full system logs and ports
-
Clone the repository
git clone https://github.com/your-username/linux-ir-toolkit.git cd linux-ir-toolkit/scripts -
Clone the repository
sudo ./collect_artifacts.sh- Find results in
/tmp/incident-response-YYYYMMDD_HHMMSS/