Skip to content

Reference: Endpoint Agent Commands

Supported Commands by OS

For commands which emit a report/reply event type from the agent, the corresponding event type is provided.

Command Report/Reply Event macOS Windows Linux Chrome Edge
artifact_get N/A ☑️ ☑️ ☑️
deny_tree N/A ☑️ ☑️ ☑️
dir_find_hash DIR_FINDHASH_REP ☑️ ☑️ ☑️
dir_list DIR_LIST_REP ☑️ ☑️ ☑️
dns_resolve DNS_REQUEST ☑️ ☑️ ☑️ ☑️ ☑️
doc_cache_get GET_DOCUMENT_REP ☑️ ☑️
get_debug_data DEBUG_DATA_REP ☑️ ☑️ ☑️
exfil_add CLOUD_NOTIFICATION ☑️ ☑️ ☑️
exfil_del CLOUD_NOTIFICATION ☑️ ☑️ ☑️
exfil_get GET_EXFIL_EVENT_REP ☑️ ☑️ ☑️
file_del FILE_DEL_REP ☑️ ☑️ ☑️
file_get FILE_GET_REP ☑️ ☑️ ☑️
file_hash FILE_HASH_REP ☑️ ☑️ ☑️
file_info FILE_INFO_REP ☑️ ☑️ ☑️
file_mov FILE_MOV_REP ☑️ ☑️ ☑️
fim_add FIM_ADD ☑️ ☑️ ☑️
fim_del FIM_DEL ☑️ ☑️ ☑️
fim_get FIM_LIST_REP ☑️ ☑️ ☑️
hidden_module_scan HIDDEN_MODULE_DETECTED ☑️ ☑️
history_dump HISTORY_DUMP_REP ☑️ ☑️ ☑️ ☑️ ☑️
log_get N/A ☑️
logoff N/A ☑️ ☑️ ☑️
mem_find_handle MEM_FIND_HANDLES_REP ☑️
mem_find_string MEM_FIND_STRING_REP ☑️ ☑️ ☑️
mem_handles MEM_HANDLES_REP ☑️
mem_map MEM_MAP_REP ☑️ ☑️ ☑️
mem_read MEM_READ_REP ☑️ ☑️ ☑️
mem_strings MEM_STRINGS_REP ☑️ ☑️ ☑️
netstat NETSTAT_REP ☑️ ☑️ ☑️
os_autoruns OS_AUTORUNS_REP ☑️ ☑️
os_drivers N/A ☑️
os_kill_process OS_KILL_PROCESS_REP ☑️ ☑️ ☑️
os_packages OS_PACKAGES_REP ☑️ ☑️ ☑️ ☑️
os_processes OS_PROCESSES_REP ☑️ ☑️ ☑️
os_resume OS_RESUME_REP ☑️ ☑️ ☑️
os_services OS_SERVICES_REP ☑️ ☑️ ☑️
os_suspend OS_SUSPEND_REP ☑️ ☑️ ☑️
os_users OS_USERS_REP ☑️
os_version OS_VERSION_REP ☑️ ☑️ ☑️
put RECEIPT ☑️ ☑️ ☑️
rejoin_network REJOIN_NETWORK ☑️ ☑️ ☑️ ☑️ ☑️
restart N/A ☑️ ☑️ ☑️
run N/A ☑️ ☑️ ☑️
seal ☑️
segregate_network SEGREGATE_NETWORK ☑️ ☑️ ☑️ ☑️ ☑️
set_performance_mode N/A ☑️ ☑️ ☑️
shutdown ☑️ ☑️ ☑️
uninstall N/A ☑️ ☑️ ☑️
yara_scan YARA_DETECTION ☑️ ☑️ ☑️
yara_update N/A ☑️ ☑️ ☑️
epp_status [EPP_STATUS_REP] ☑️
epp_scan [EPP_SCAN_REP] ☑️
epp_list_exclusions [EPP_LIST_EXCLUSIONS_REP] ☑️
epp_add_exclusion [EPP_ADD_EXCLUSION_REP] ☑️
epp_rem_exclusion [EPP_REM_EXCLUSION_REP] ☑️
epp_list_quarantine [EPP_LIST_QUARANTINE_REP] ☑️

Command Descriptions

artifact_get

Retrieve artifacts (pcaps, memory dumps, system files) from a sensor that were previously collected.

Platforms: macOS | Windows | Linux

Parameters: - payload_id (required): The unique identifier of the artifact to retrieve

Response Event: FILE_GET_REP

Usage Example:

limacharlie sensor task <SID> artifact_get --payload_id <PAYLOAD_ID>


dir_list

List files and directories at a specified path on the endpoint.

Platforms: macOS | Windows | Linux

Parameters: - dir_path (required): Directory path to list - depth (optional): Recursion depth (default: 0 = no recursion) - file_pattern (optional): File pattern filter (e.g., "*.exe")

Response Event: DIR_LIST_REP

Usage Example:

limacharlie sensor task <SID> dir_list --dir_path "C:\\Windows\\System32" --depth 1

Sample Response:

{
  "event": {
    "DIRECTORY_LIST": [
      {
        "FILE_PATH": "C:\\Windows\\System32\\cmd.exe",
        "FILE_SIZE": 289792,
        "LAST_MODIFIED": 1579000000
      }
    ]
  }
}


dir_findhash

Search for files matching a specific hash across a directory tree.

Platforms: macOS | Windows | Linux

Parameters: - dir_path (required): Root directory to search - hash (required): Hash value to search for (MD5, SHA1, or SHA256) - depth (optional): Maximum recursion depth

Response Event: DIR_FINDHASH_REP

Usage Example:

limacharlie sensor task <SID> dir_findhash --dir_path "/var" --hash <HASH_VALUE>


dns_resolve

Perform DNS resolution on the endpoint to determine what DNS server responds.

Platforms: macOS | Windows | Linux | Chrome | Edge

Parameters: - hostname (required): Hostname to resolve

Response Event: DNS_REQUEST

Usage Example:

limacharlie sensor task <SID> dns_resolve --hostname "example.com"


doc_cache_get

Retrieve a previously cached document from the sensor's local cache.

Platforms: macOS | Windows

Parameters: - hash (required): Hash of the cached document

Response Event: GET_DOCUMENT_REP

Usage Example:

limacharlie sensor task <SID> doc_cache_get --hash <DOC_HASH>


exfil_add

Add an exfiltration detection watch for specific event types and patterns.

Platforms: macOS | Windows | Linux

Parameters: - event (required): Event type to monitor (e.g., "DNS_REQUEST", "NEW_PROCESS") - operator (required): Comparison operator ("is", "contains", "matches", etc.) - path (required): JSON path to the field to watch (e.g., "event/DOMAIN_NAME") - value (required): Value or pattern to match - expire (optional): TTL in seconds for the watch (default: permanent)

Response Event: EXFIL_ADD_REP

Usage Example:

limacharlie sensor task <SID> exfil_add --event "DNS_REQUEST" --operator "contains" --path "event/DOMAIN_NAME" --value "malware" --expire 3600


exfil_del

Remove an exfiltration detection watch by its ID.

Platforms: macOS | Windows | Linux

Parameters: - id (required): Watch ID to remove (from exfil_get response)

Response Event: EXFIL_DEL_REP

Usage Example:

limacharlie sensor task <SID> exfil_del --id <WATCH_ID>


exfil_get

List all active exfiltration detection watches on the sensor.

Platforms: macOS | Windows | Linux

Parameters: None

Response Event: EXFIL_GET_REP

Usage Example:

limacharlie sensor task <SID> exfil_get


file_del

Delete a file from the endpoint filesystem.

Platforms: macOS | Windows | Linux

Parameters: - file_path (required): Path to the file to delete

Response Event: FILE_DEL_REP

Usage Example:

limacharlie sensor task <SID> file_del --file_path "/tmp/suspicious_file"


file_get

Retrieve a file from the endpoint and upload it to LimaCharlie cloud storage.

Platforms: macOS | Windows | Linux

Parameters: - file_path (required): Path to the file to retrieve

Response Event: FILE_GET_REP

Usage Example:

limacharlie sensor task <SID> file_get --file_path "C:\\Windows\\System32\\calc.exe"


file_hash

Calculate cryptographic hashes (MD5, SHA1, SHA256) for a file.

Platforms: macOS | Windows | Linux

Parameters: - file_path (required): Path to the file to hash

Response Event: FILE_HASH_REP

Usage Example:

limacharlie sensor task <SID> file_hash --file_path "/etc/passwd"

Sample Response:

{
  "event": {
    "FILE_PATH": "/etc/passwd",
    "HASH": "abc123...",
    "MD5": "def456...",
    "SHA1": "ghi789...",
    "SHA256": "jkl012..."
  }
}


file_info

Get detailed metadata about a file without retrieving its contents.

Platforms: macOS | Windows | Linux

Parameters: - file_path (required): Path to the file

Response Event: FILE_INFO_REP

Usage Example:

limacharlie sensor task <SID> file_info --file_path "C:\\Program Files\\app.exe"

Sample Response:

{
  "event": {
    "FILE_PATH": "C:\\Program Files\\app.exe",
    "FILE_SIZE": 1048576,
    "CREATED": 1579000000,
    "MODIFIED": 1580000000,
    "ACCESSED": 1581000000
  }
}


file_mov

Move or rename a file on the endpoint filesystem.

Platforms: macOS | Windows | Linux

Parameters: - src_path (required): Source file path - dst_path (required): Destination file path

Response Event: FILE_MOV_REP

Usage Example:

limacharlie sensor task <SID> file_mov --src_path "/tmp/file.txt" --dst_path "/tmp/renamed.txt"


fim_add

Add a File Integrity Monitoring (FIM) watch for a specific path or pattern.

Platforms: macOS | Windows | Linux

Parameters: - file_path (required): Path or pattern to monitor (supports wildcards)

Response Event: FIM_ADD_REP

Usage Example:

limacharlie sensor task <SID> fim_add --file_path "C:\\Windows\\System32\\*.dll"


fim_del

Remove a File Integrity Monitoring watch.

Platforms: macOS | Windows | Linux

Parameters: - file_path (required): Path pattern to stop monitoring

Response Event: FIM_REMOVE (note: event name is FIM_REMOVE, not FIM_DEL_REP)

Usage Example:

limacharlie sensor task <SID> fim_del --file_path "C:\\Windows\\System32\\*.dll"


fim_get

List all active File Integrity Monitoring watches on the sensor.

Platforms: macOS | Windows | Linux

Parameters: None

Response Event: FIM_LIST_REP

Usage Example:

limacharlie sensor task <SID> fim_get


get_debug_data

Retrieve internal sensor debug data for troubleshooting.

Platforms: Windows

Parameters: None

Response Event: DEBUG_DATA_REP

Usage Example:

limacharlie sensor task <SID> get_debug_data


hidden_module_scan

Scan for hidden or stealthy modules loaded in process memory that may not appear in normal module lists.

Platforms: Windows

Parameters: - pid (optional): Specific process ID to scan (default: all processes)

Response Event: HIDDEN_MODULE_DETECTED

Usage Example:

limacharlie sensor task <SID> hidden_module_scan --pid 1234


history_dump

Export a dump of recent events from the sensor's local event cache.

Platforms: macOS | Windows | Linux | Chrome | Edge

Parameters: None

Response Event: HISTORY_DUMP_REP

Usage Example:

limacharlie sensor task <SID> history_dump


log_get

Retrieve Windows Event Logs or macOS Unified Logs from the endpoint.

Platforms: Windows (Event Logs) | macOS (Unified Logs)

Parameters: - source (Windows required): Event log source name (e.g., "Security", "System") - predicate (macOS optional): Unified log filter predicate

Response Event: LOG_GET_REP

Usage Example:

# Windows
limacharlie sensor task <SID> log_get --source "Security"

# macOS
limacharlie sensor task <SID> log_get --predicate "eventType == logEvent"


mem_find_string

Search process memory for specific string patterns.

Platforms: macOS | Windows | Linux

Parameters: - pid (required): Process ID to scan - strings (required): String or list of strings to search for

Response Event: MEM_FIND_STRING_REP

Usage Example:

limacharlie sensor task <SID> mem_find_string --pid 1234 --strings "password"


mem_find_handle

Find handles (file, registry, process) held by a process on Windows.

Platforms: Windows

Parameters: - pid (optional): Specific process ID (default: all processes) - needle (optional): Handle name pattern to search for

Response Event: MEM_FIND_HANDLE_REP

Usage Example:

limacharlie sensor task <SID> mem_find_handle --pid 1234 --needle "malware.exe"


mem_map

Get memory map of a process showing loaded modules and memory regions.

Platforms: macOS | Windows | Linux

Parameters: - pid (required): Process ID to map

Response Event: MEM_MAP_REP

Usage Example:

limacharlie sensor task <SID> mem_map --pid 1234


mem_read

Read raw memory from a process at a specific address.

Platforms: macOS | Windows | Linux

Parameters: - pid (required): Process ID - base_address (required): Memory address to read from (hex format) - size (required): Number of bytes to read

Response Event: MEM_READ_REP

Usage Example:

limacharlie sensor task <SID> mem_read --pid 1234 --base_address 0x00400000 --size 1024


mem_strings

Extract all readable strings from a process's memory.

Platforms: macOS | Windows | Linux

Parameters: - pid (required): Process ID to scan

Response Event: MEM_STRINGS_REP

Usage Example:

limacharlie sensor task <SID> mem_strings --pid 1234


netstat

Get current network connections on the endpoint (similar to netstat command).

Platforms: macOS | Windows | Linux

Parameters: None

Response Event: NETWORK_CONNECTIONS

Usage Example:

limacharlie sensor task <SID> netstat

Sample Response:

{
  "event": {
    "NETWORK_ACTIVITY": [
      {
        "STATE": "ESTABLISHED",
        "LOCAL_ADDRESS": "192.168.1.100",
        "LOCAL_PORT": 50234,
        "REMOTE_ADDRESS": "93.184.216.34",
        "REMOTE_PORT": 443,
        "PID": 1234,
        "PROCESS": "chrome.exe"
      }
    ]
  }
}


network_summary

Get aggregated network statistics and active connections summary.

Platforms: macOS | Windows | Linux

Parameters: None

Response Event: NETWORK_SUMMARY

Usage Example:

limacharlie sensor task <SID> network_summary


os_kill_process

Terminate a running process.

Platforms: macOS | Windows | Linux

Parameters: - pid (required): Process ID to terminate

Response Event: OS_KILL_PROCESS_REP

Usage Example:

limacharlie sensor task <SID> os_kill_process --pid 1234


os_packages

List installed software packages on the endpoint.

Platforms: Windows (via registry) | macOS (future) | Linux (future)

Response Event: OS_PACKAGES_REP

Usage Example:

limacharlie sensor task <SID> os_packages

Sample Response:

{
  "event": {
    "PACKAGES": [
      {
        "NAME": "Google Chrome",
        "VERSION": "120.0.6099.130",
        "PUBLISHER": "Google LLC"
      }
    ]
  }
}


os_processes

Get a list of all running processes with detailed information.

Platforms: macOS | Windows | Linux

Parameters: None

Response Event: EXISTING_PROCESS (multiple events, one per process)

Usage Example:

limacharlie sensor task <SID> os_processes

Sample Response:

{
  "event": {
    "PROCESS_ID": 1234,
    "PARENT_PROCESS_ID": 5678,
    "COMMAND_LINE": "C:\\Windows\\System32\\notepad.exe",
    "FILE_PATH": "C:\\Windows\\System32\\notepad.exe",
    "USER_NAME": "DOMAIN\\user"
  }
}


os_resume

Resume a suspended process.

Platforms: macOS | Windows | Linux

Parameters: - pid (required): Process ID to resume

Response Event: OS_RESUME_REP

Usage Example:

limacharlie sensor task <SID> os_resume --pid 1234


os_services

List all services/daemons running on the endpoint.

Platforms: macOS | Windows | Linux

Parameters: None

Response Event: OS_SERVICES_REP

Usage Example:

limacharlie sensor task <SID> os_services


os_suspend

Suspend (pause) a running process.

Platforms: macOS | Windows | Linux

Parameters: - pid (required): Process ID to suspend

Response Event: OS_SUSPEND_REP

Usage Example:

limacharlie sensor task <SID> os_suspend --pid 1234


os_autoruns

List programs configured to run automatically at system startup.

Platforms: macOS | Windows | Linux

Parameters: None

Response Event: OS_AUTORUNS_REP

Usage Example:

limacharlie sensor task <SID> os_autoruns


os_drivers

List all loaded kernel drivers/modules.

Platforms: macOS | Windows | Linux

Parameters: None

Response Event: OS_DRIVERS_REP

Usage Example:

limacharlie sensor task <SID> os_drivers


os_version

Get detailed operating system version information.

Platforms: macOS | Windows | Linux

Parameters: None

Response Event: OS_VERSION_REP

Usage Example:

limacharlie sensor task <SID> os_version

Sample Response:

{
  "event": {
    "OS_NAME": "Windows 11",
    "OS_VERSION": "10.0.22631",
    "ARCHITECTURE": "x64"
  }
}


rejoin_network

Re-enable network connectivity for a sensor that was previously isolated.

Platforms: macOS | Windows | Linux | Chrome | Edge

Parameters: None

Response Event: None (sensor reconnects)

Usage Example:

limacharlie sensor task <SID> rejoin_network


run

Execute a command or script on the endpoint (out-of-band execution).

Platforms: macOS | Linux

Parameters: - command (required): Command line to execute

Response Event: EXEC_OOB

Usage Example:

limacharlie sensor task <SID> run --command "ps aux | grep chrome"


segregate_network

Isolate a sensor from the network (except LimaCharlie cloud connectivity).

Platforms: macOS | Windows | Linux | Chrome | Edge

Parameters: None

Response Event: None (sensor becomes isolated)

Usage Example:

limacharlie sensor task <SID> segregate_network


yara_scan

Scan files or process memory with YARA rules.

Platforms: macOS | Windows | Linux

Parameters: - rule (required): YARA rule content - file_path (optional): Specific file to scan - pid (optional): Specific process to scan - process_expr (optional): Process name pattern to scan

Response Event: YARA_DETECTION

Usage Example:

# Scan a file
limacharlie sensor task <SID> yara_scan --file_path "C:\\suspicious.exe" --rule "rule test { strings: $a = \"malware\" condition: $a }"

# Scan process memory
limacharlie sensor task <SID> yara_scan --pid 1234 --rule "rule test { strings: $a = \"malware\" condition: $a }"


pcap_ifaces

List available network interfaces for packet capture.

Platforms: macOS | Windows | Linux

Parameters: None

Response Event: PCAP_INTERFACES_REP

Usage Example:

limacharlie sensor task <SID> pcap_ifaces


pcap_start

Start capturing network packets on a specified interface.

Platforms: macOS | Windows | Linux

Parameters: - iface (required): Network interface ID or name - max_size (optional): Maximum capture size in MB

Response Event: PCAP_START_REP

Usage Example:

limacharlie sensor task <SID> pcap_start --iface eth0 --max_size 100


pcap_stop

Stop an active packet capture and upload the PCAP file.

Platforms: macOS | Windows | Linux

Parameters: - iface (optional): Specific interface to stop (default: all)

Response Event: PCAP_STOP_REP, followed by EXPORT_COMPLETE

Usage Example:

limacharlie sensor task <SID> pcap_stop


reg_list

List Windows registry keys and values.

Platforms: Windows

Parameters: - reg_path (required): Registry path to list (e.g., "HKEY_LOCAL_MACHINE\SOFTWARE")

Response Event: REG_LIST_REP

Usage Example:

limacharlie sensor task <SID> reg_list --reg_path "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run"


epp_scan

Trigger an Endpoint Protection (EPP) scan on a file or directory.

Platforms: Windows

Parameters: - file_path (required): Path to scan

Response Event: EPP_SCAN_REP

Usage Example:

limacharlie sensor task <SID> epp_scan --file_path "C:\\Users\\Public"


epp_list_exclusions

List EPP scan exclusions currently configured on the sensor.

Platforms: Windows

Parameters: None

Response Event: EPP_LIST_EXCLUSIONS_REP

Usage Example:

limacharlie sensor task <SID> epp_list_exclusions


epp_add_exclusion

Add a path or process to EPP scan exclusions.

Platforms: Windows

Parameters: - file_path (optional): File/directory path to exclude - process (optional): Process name to exclude

Response Event: EPP_ADD_EXCLUSION_REP

Usage Example:

limacharlie sensor task <SID> epp_add_exclusion --file_path "C:\\safe_app"


epp_rem_exclusion

Remove a path or process from EPP scan exclusions.

Platforms: Windows

Parameters: - file_path (optional): File/directory path to remove from exclusions - process (optional): Process name to remove from exclusions

Response Event: EPP_REM_EXCLUSION_REP

Usage Example:

limacharlie sensor task <SID> epp_rem_exclusion --file_path "C:\\safe_app"


epp_list_quarantine

List files currently in EPP quarantine.

Platforms: Windows

Parameters: None

Response Event: EPP_LIST_QUARANTINE_REP

Usage Example:

limacharlie sensor task <SID> epp_list_quarantine


Command Usage Notes

General Syntax:

limacharlie sensor task <SENSOR_ID> <COMMAND_NAME> [--param value ...]

Platform Abbreviations: - macOS: Apple macOS and OS X - Windows: Microsoft Windows (7, 8, 10, 11, Server editions) - Linux: Linux distributions (Ubuntu, CentOS, Debian, etc.) - Chrome: Chrome browser extension sensor - Edge: Microsoft Edge browser extension sensor

Response Events: Most commands generate a response event (typically ending in _REP) that can be: - Viewed in the LimaCharlie web interface under Sensor > Timeline - Retrieved via API - Triggered on with D&R rules

Error Handling: Response events typically include an ERROR field: - ERROR: 0 indicates success - Non-zero ERROR values indicate specific error conditions

Permissions: Some commands require elevated privileges (root/administrator) on the endpoint to execute successfully.

Timeouts: Commands have default timeouts (typically 30-60 seconds). Long-running operations may timeout and can be made persistent using the Reliable Tasking extension.