The Windows Forensics MCP Server is a Linux-native, Python-based toolkit for comprehensive Windows Digital Forensics and Incident Response, enabling artifact parsing and AI-assisted analysis without Windows dependencies.
Core Capabilities:
Event Log Analysis (EVTX): List/discover EVTX files, generate statistics (event counts, time ranges, Event ID distributions), search with advanced filtering (time, Event ID, keywords, providers), execute pre-built security queries (logons, process creation, lateral movement, credential access, log clearing, etc.), and get Event ID explanations.
Registry Forensics: Read keys/values from offline hives (SAM, SYSTEM, SOFTWARE, SECURITY, NTUSER.DAT), search by pattern, extract persistence mechanisms (Run keys, services), parse user accounts, analyze USB device history, retrieve system information (OS version, computer name, timezone), and extract network configuration.
Execution Artifact Analysis: Perform static PE analysis (hashes, imports, exports, packer detection), parse Prefetch files, extract SHA1 hashes and timestamps from Amcache.hve, and analyze SRUDB.dat for application resource usage and network activity.
File System Forensics: Parse Master File Table (MFT) with timestomping detection and USN Journal for file operations and deleted file recovery.
User Activity Tracking: Parse browser history and downloads (Edge, Chrome, Firefox), analyze LNK files, examine ShellBags for folder navigation, and correlate RecentDocs.
Orchestrated Investigations: Correlate multiple artifacts to prove binary execution, hunt for IOCs (hashes, filenames, IPs, domains) across all sources, build unified forensic timelines, and map comprehensive user activity timelines.
Remote Collection: Collect artifacts and system information via WinRM (password or pass-the-hash authentication).
Data Import: Ingest CSV output from Eric Zimmerman tools (MFTECmd, PECmd, AmcacheParser, SrumECmd) for workflow integration.
Forensic Reference: List important Event IDs by channel and forensically significant registry keys by category.
Enables forensic analysis of Firefox browser history and downloads to reconstruct user activity on Windows systems.
Click on "Install Server".
Wait a few minutes for the server to deploy. Once ready, it will show a "Started" state.
In the chat, type
@followed by the MCP server name and your instructions, e.g., "@Windows Forensics MCP Servershow me failed logon attempts in Security.evtx"
That's it! The server will respond to your query, and you can continue using it as needed.
Here is a step-by-step guide with screenshots.
Windows Forensics MCP Server
Windows DFIR from Linux - A comprehensive forensics toolkit designed entirely for Linux environments with zero Windows tool dependencies. Parse Windows artifacts natively using pure Python libraries.
Why This Matters
Traditional Windows forensics often requires:
Running analysis tools on Windows
Commercial forensic suites with expensive licenses
Eric Zimmerman tools that only run on Windows/.NET
WinForensics-MCP changes this. Built from the ground up for Linux-based analysis:
No Windows Required - Analyze Windows disk images directly from your Linux forensics workstation
No Wine/Mono Hacks - Pure Python implementations using battle-tested open-source libraries
AI-Assisted Analysis - Integrates with Claude CLI and any MCP-compatible client for intelligent artifact correlation
Related Projects
Project | Focus | Link |
memoryforensics-mcp | Memory dump analysis with Volatility3 - process anomalies, code injection, C2 connections, credential extraction | |
mac_forensics-mcp | macOS DFIR - Unified Logs, FSEvents, Spotlight, Plists, SQLite databases, Extended Attributes |
Use together for complete incident response across platforms.
Features
Core Forensics
Category | Capabilities |
EVTX Logs | Parse Windows Event Logs with filtering, search, and pre-built security queries |
Registry | Analyze SAM, SYSTEM, SOFTWARE, SECURITY, NTUSER.DAT hives |
Remote Collection | Collect artifacts via WinRM (password or pass-the-hash) |
Execution Artifacts
Category | Capabilities |
PE Analysis | Static analysis with hashes (MD5/SHA1/SHA256/imphash), imports, exports, packer detection |
Prefetch | Execution evidence with run counts, timestamps, loaded files |
Amcache | SHA1 hashes and first-seen timestamps from Amcache.hve |
SRUM | Application resource usage, CPU time, network activity from SRUDB.dat |
File System Artifacts
Category | Capabilities |
MFT | Master File Table parsing with timestomping detection |
USN Journal | Change journal for file operations and deleted file recovery |
Timeline | Unified timeline from MFT, USN, Prefetch, Amcache, EVTX |
User Activity
Category | Capabilities |
Browser | Edge, Chrome, Firefox history and downloads |
LNK Files | Windows shortcut analysis for recently accessed files |
ShellBags | Folder navigation history with suspicious path detection |
RecentDocs | Registry-based recent document tracking |
Network Forensics
Category | Capabilities |
PCAP Analysis | Parse PCAP/PCAPNG files - conversations, DNS queries, HTTP requests, suspicious connections |
Malware Detection
Category | Capabilities |
YARA Scanning | 718 rules from signature-base - APT, ransomware, webshells, hacktools |
VirusTotal | Hash/IP/domain reputation lookups with caching and rate limiting (free tier supported) |
DiE Integration | Detect packers (UPX, Themida, VMProtect), compilers, .NET, installers via Detect It Easy |
Orchestrators
Tool | What It Does |
| Correlates Prefetch + Amcache + SRUM to answer "Was this binary executed?" |
| Correlates Browser + ShellBags + LNK + RecentDocs for user activity timeline |
| Searches for IOC (hash/filename/IP/domain) across ALL artifact sources + optional YARA scanning |
| Builds unified forensic timeline from multiple sources |
Utilities
Tool | What It Does |
| Import Eric Zimmerman tool CSV output (MFTECmd, PECmd, AmcacheParser) |
Installation
Prerequisites
Install
Verify
Adding to Claude CLI
Recommended: Using claude mcp add
Alternative: Manual JSON
Edit ~/.claude.json:
Verify
LLM Integration (CLAUDE.md)
For AI-assisted forensic analysis, include CLAUDE.md in your case directory. It provides:
Orchestrator-first guidance - Ensures LLMs use high-level tools before low-level parsers
Token efficiency - Reduces API costs by 50%+ through proper tool selection
Investigation workflow - Step-by-step methodology for consistent analysis
Usage
Copy CLAUDE.md to your case directory:
The LLM will automatically follow the orchestrator-first approach:
Question | Orchestrator Used |
"Was malware.exe executed?" |
|
"What did the user do?" |
|
"Find this hash everywhere" |
|
"Build incident timeline" |
|
Quick Start Examples
Was This Binary Executed?
The investigate_execution orchestrator checks Prefetch, Amcache, and SRUM:
Hunt for IOC Across All Artifacts
The hunt_ioc tool searches Prefetch, Amcache, SRUM, MFT, USN, Browser, EVTX, and optionally YARA:
Hunt with YARA Scanning
For filename IOCs, enable YARA scanning to get threat intelligence in the same call:
User Activity Investigation
The investigate_user_activity orchestrator correlates browser, shellbags, LNK, and RecentDocs:
Detect Timestomping
Analyze Network Traffic
The pcap_find_suspicious tool detects C2 indicators, beaconing, and DNS tunneling:
Detect Packers with DiE
The die_analyze_file tool detects packers, compilers, and protectors:
Look Up Hash on VirusTotal
Scan for Malware with YARA
The yara_scan_directory tool uses 718 rules from signature-base:
Import Eric Zimmerman CSV Output
Already ran MFTECmd on Windows? Import the CSV:
Tool Reference
Orchestrators (High-Level Investigation)
Tool | Description |
| Correlate Prefetch/Amcache/SRUM to prove binary execution |
| Correlate Browser/ShellBags/LNK/RecentDocs for user activity |
| Hunt IOC (hash/filename/IP/domain) across all artifacts; |
| Build unified timeline from multiple artifact sources |
Execution Artifacts
Tool | Description |
| Static PE analysis - hashes, imports, exports, packer detection |
| Parse Prefetch for execution evidence |
| Parse Amcache.hve for SHA1 hashes and timestamps |
| Parse SRUDB.dat for app resource and network usage |
Malware Detection (YARA)
Tool | Description |
| Scan file with 718 YARA rules (Mimikatz, CobaltStrike, webshells, APT, ransomware) |
| Batch scan directory for malware |
| List available/bundled YARA rules |
Threat Intelligence (VirusTotal)
Tool | Description |
| Look up file hash (MD5/SHA1/SHA256) on VirusTotal |
| Get IP address reputation and geolocation |
| Get domain reputation and categorization |
| Calculate file hashes and look up on VirusTotal |
Network Forensics (PCAP)
Tool | Description |
| Get PCAP statistics - packet counts, protocols, top talkers |
| Extract TCP/UDP conversations with byte counts |
| Extract DNS queries and responses |
| Extract HTTP requests with URLs, methods, user-agents |
| Search packet payloads for strings or regex patterns |
| Detect C2 indicators, beaconing, DNS tunneling |
Packer Detection (DiE)
Tool | Description |
| Analyze file for packers, compilers, protectors, .NET |
| Batch scan directory for packed executables |
| Get info about packer (difficulty, unpack tools) |
File System
Tool | Description |
| Parse $MFT with timestomping detection |
| Parse $J for file operations and deleted files |
User Activity
Tool | Description |
| Parse Edge/Chrome/Firefox history and downloads |
| Parse Windows shortcuts for target paths |
| Parse ShellBags for folder navigation history |
Event Logs
Tool | Description |
| List EVTX files in a directory |
| Get event counts, time range, Event ID distribution |
| Search with filters (time, Event ID, keywords) |
| Pre-built security event searches (logon, process creation, etc.) |
| Get Event ID description |
Registry
Tool | Description |
| Get specific key and values |
| Search values by pattern |
| Get Run keys and services |
| Get user accounts from SAM |
| Get USB device history |
| Get OS version, hostname, timezone |
| Get network configuration |
Utilities
Tool | Description |
| Import Eric Zimmerman CSV output (MFTECmd, PECmd, AmcacheParser, SrumECmd) |
| List important Event IDs by channel |
| List forensic registry keys by category |
Remote Collection
Tool | Description |
| Collect artifacts via WinRM (password or pass-the-hash) |
| Get remote system info |
Typical Investigation Workflow
1. Mount Evidence
2. Quick Triage
3. Hunt for Known IOCs
4. User Activity Deep Dive
5. Timeline Analysis
6. Persistence Check
7. Malware Analysis
8. Threat Intelligence
Configuration
VirusTotal API Key
For threat intelligence lookups, configure your VirusTotal API key:
Get your free API key at virustotal.com.
Note: Free tier is rate-limited to 4 requests/minute. The client automatically handles rate limiting and caches results for 24 hours.
Adjusting Response Limits
Edit winforensics_mcp/config.py:
Troubleshooting
Missing dependencies
VirusTotal API errors
If you see "API key not configured":
If you see rate limit errors, wait 15 seconds between requests (automatic) or use cached results.
DiE (Detect It Easy) not found
Install diec (command-line version):
Permission denied on registry hives
Registry hives may be locked. Use offline/copied hives from a mounted image.
Remove MCP Server
Dependencies
All parsing is done with pure Python libraries:
Library | Purpose |
EVTX parsing | |
Registry hive parsing | |
PE file analysis | |
Prefetch parsing | |
ESE database (SRUM) parsing | |
MFT parsing (Rust-based, Python bindings) | |
LNK file parsing | |
YARA rule scanning (optional) | |
VirusTotal API client (optional) | |
PCAP/PCAPNG parsing (optional) |
Bundled YARA Rules
718 rules from Neo23x0/signature-base are included:
Category | Examples |
APT | Lazarus, APT28, APT29, Turla, Sofacy, CobaltStrike |
Crimeware | Emotet, TrickBot, Ransomware families |
Generic | Mimikatz, webshells, PowerShell obfuscation |
Exploits | Log4Shell, ProxyShell, PrintNightmare |
Hacktools | BruteRatel, Empire, Metasploit payloads |
Changelog
v0.4.0 - Threat Intel & Network Edition
YARA Scanning: 718 bundled rules from signature-base (APT, ransomware, hacktools, webshells)
VirusTotal Integration: Hash/IP/domain lookups with rate limiting and 24h caching
PCAP Analysis: Network forensics with conversation extraction, DNS/HTTP parsing, C2 detection
DiE Integration: Packer/compiler detection via Detect It Easy CLI
hunt_ioc Enhancement: Optional
yara_scan=Trueparameter to scan found files with YARA rulesNew Tools:
yara_scan_*,vt_lookup_*,pcap_*,die_*Total Tools: 46
v0.3.x
Core forensics: EVTX, Registry, PE analysis, Prefetch, Amcache, SRUM
File system: MFT parsing with timestomping detection, USN Journal
User activity: Browser history, LNK files, ShellBags
Orchestrators:
investigate_execution,investigate_user_activity,hunt_ioc,build_timeline
License
MIT License
Author
xtk
Built for the DFIR community. No Windows required.