EN
ENNA

osquery

๐Ÿง  Threat Intelligence ยท C++

osquery, developed at Facebook, exposes an operating system as a high-performance relational database. This allows you to write SQL queries to explore operating system data - running processes, loaded kernel modules, open network connections, browser plugins, hardware events, file hashes, and hundreds of other system attributes are all available as SQL tables. For security teams, this means you can query your fleet in real-time: 'SELECT * FROM processes WHERE name LIKE \'%miner%\'' finds cryptominers, 'SELECT * FROM listening_ports WHERE port = 4444' finds suspicious listeners. osquery supports scheduled queries that log differential changes over time, making it powerful for continuous security monitoring and compliance verification. It runs on Linux, macOS, Windows, and FreeBSD, and integrates with fleet management tools like Fleet (formerly Kolide) for centralized querying and alerting across thousands of endpoints.

23.2kstars
2.6kforks
626issues
Updated 5d ago

Installation

brew (macOS)

$ brew install osquery

apt (Debian/Ubuntu)

$ sudo apt install osquery

choco (Windows)

$ choco install osquery

Download

$ Download packages from https://osquery.io/downloads

Use Cases

  • Querying running processes, network connections, and system state with SQL
  • Detecting malware, cryptominers, and suspicious services across endpoint fleets
  • Continuous compliance monitoring with scheduled differential queries
  • Investigating incidents by querying file hashes, user sessions, and system logs
  • Building custom detection rules as SQL queries for endpoint security monitoring

Tags

endpoint-visibilitysqlfleet-managementcompliancecontinuous-monitoringhacktoberfestintrusion-detectionmonitoringsecurity

More in Threat Intelligence