Query your devices like a database

Osquery uses basic SQL commands to leverage a relational data-model to describe a device.

osquery> SELECT name, path, pid FROM processes WHERE on_disk = 0;name = Drop_Agentpath = /Users/jim/bin/dropagepid = 561

Processes running without a binary on disk

Frequently, attackers will leave a malicious process running but delete the original binary on disk. This query returns any process whose original binary has been deleted, which could be an indicator of a suspicious process.

See Available Tables

Three things you should know about osquery

It's fast and tested

Our build infrastructure ensures that newly introduced code is benchmarked and tested. We perform continuous testing for memory leaks, thread safety, and binary reproducibility on all supported platforms.

View the Code

It runs everywhere

Windows, macOS, CentOS, and almost every Linux OS released since 2011 are supported with no dependencies. osquery powers some of the most demanding companies, including Facebook.

Download Osquery

It's open source

Osquery is released under the Apache License. Ever since we open-sourced it in 2014, organizations and individuals have contributed an ever-growing list of impressive features, useful tools, and helpful documentation.

Read Community Articles

Last updated