CISO Security KitDFIRAI CISO
Linux Artifact Collection
Live and dead-box Linux artifact triage: bash history, systemd units, /tmp, cron, lastlog, suid binaries.
What this skill does
Linux Artifact Collection is a versioned playbook inside the CISO Security Kit. It runs on the AI CISO agent through the Procux skill runtime, producing structured, auditable output suitable for executive review and regulator submission.
- Kit
- CISO Security Kit
- Category
- DFIR
- Primary agent(s)
- AI CISO
- Tags
- dfir, linux, artifacts, triage
How to use it
- Sign in to your Procux workspace and open the platform dashboard.
- Pick the AI CISO agent, then pick Linux Artifact Collection from the CISO Security Kit catalog.
- Provide the required inputs (repo, document, endpoint, jurisdiction) — the agent runs the playbook and returns a structured report.
- Review, iterate, or export (PDF / JSON / Markdown) as part of your internal review cycle.
Related skills
- Incident Timeline ReconstructionCorrelate logs, alerts, and artifacts to build a defensible incident timeline for executive briefing and regulator disclosure.
- LSASS Credential Dumping DetectionDetect Mimikatz / comsvcs / procdump patterns against LSASS via Sysmon event IDs 10 and 8.
- macOS Forensic TriagemacOS live triage: launchd persistence, TCC database inspection, quarantine xattrs, unified logs.