Click any tag below to further narrow down your results
Links
UAC is an incident response tool for collecting artifacts from various Unix-like systems. It automates data collection for forensic investigations, compliance checks, and more, using customizable YAML profiles without requiring installation. The tool supports diverse environments, including IoT devices and NAS systems.
This article details the architecture and techniques of Singularity, a Loadable Kernel Module rootkit for Linux 6.x. It covers methods for process concealment, file system stealth, and privilege escalation, highlighting how it evades detection through advanced hooking and anti-forensic tactics.