Marketplace

forensics-osquery

SQL-powered forensic investigation and system interrogation using osquery to query operating systems as relational databases. Enables rapid evidence collection, threat hunting, and incident response across Linux, macOS, and Windows endpoints. Use when: (1) Investigating security incidents and collecting forensic artifacts, (2) Threat hunting across endpoints for suspicious activity, (3) Analyzing running processes, network connections, and persistence mechanisms, (4) Collecting system state during incident response, (5) Querying file hashes, user activity, and system configuration for compromise indicators, (6) Building detection queries for continuous monitoring with osqueryd.

$ Instalar

git clone https://github.com/AgentSecOps/SecOpsAgentKit /tmp/SecOpsAgentKit && cp -r /tmp/SecOpsAgentKit/skills/incident-response/forensics-osquery ~/.claude/skills/SecOpsAgentKit

// tip: Run this command in your terminal to install the skill