Tracium
Tracium is a comprehensive system forensics tool that collects 16 categories of forensic artifacts from live systems or forensic images.
Overview
Tracium gathers extensive system and user activity data through platform-specific collectors. It captures browser history, command shells, USB devices, network activity, and much more.
Scope
Tracium is designed for incident response and digital investigations.
What Tracium Collects
System Information
- CPU information and specifications
- Memory configuration and usage
- Disk hardware information
- Network interfaces and configurations
Forensic Artifacts (16 Categories)
- Browser Artifacts - Chrome, Firefox, Safari, Edge history
- Communication Artifacts - Email clients, messaging applications
- Recent Files - Recent documents and downloads
- Command History - bash, zsh, PowerShell, cmd history
- Network History - ARP cache, DNS cache, connections
- System Logs - System event logs, authentication logs
- Scheduled Tasks - Windows Task Scheduler, cron jobs
- USB History - Device connection history
- Prefetch Files (Windows) - Application execution history
- Recycle Bin - Deleted files metadata
- Clipboard - Current clipboard contents
- SSH Keys - Authorized keys and known hosts
- Installed Software - Installed packages and versions
- Environment Variables - System and user variables
- Download History - Browser downloads
- Active Connections - Established connections, listening ports
Key Structs
SystemData
type SystemData struct {
CaseID string
System SystemInfo
Hardware HardwareInfo
Network NetworkInfo
Security SecurityInfo
Forensics ForensicsData
Tree FilesystemTree
CustodyChain *CustodyChainEntry
}
Collector Interface
type Collector interface {
OSName() string
Architecture() string
Hostname() (string, error)
GetCurrentUser() (string, error)
GetProcessID() int
GetUptime() int64
GetCPUInfo() CPUInfo
GetMemoryInfo() MemoryInfo
// ... 30+ more methods
}