Windows Forensics MCP Server
Author: xtk
A comprehensive Model Context Protocol (MCP) server for Windows digital forensics, enabling AI-assisted analysis of Windows artifacts directly from Claude CLI or any MCP-compatible client.
Features
EVTX Parsing - Windows Event Log analysis with filtering, search, and pre-built security queries
Registry Analysis - Parse SAM, SYSTEM, SOFTWARE, SECURITY, NTUSER.DAT hives
Remote Collection - Collect artifacts via WinRM with password or pass-the-hash authentication
Forensic Reference - Built-in knowledge of important Event IDs and registry keys
Installation
Prerequisites
Install the Package
Verify Installation
Adding to Claude CLI
Method 1: Using claude mcp add (Recommended)
Method 2: Manual JSON Configuration
Edit ~/.claude.json:
Verify
Tool Reference
EVTX Tools
Tool | Description |
| List EVTX files in a directory |
| Get event counts, time range, Event ID distribution |
| Search with filters (time, Event ID, keywords) |
| Pre-built security event searches |
| Get Event ID description |
Registry Tools
Tool | Description |
| Get specific key and values |
| Search values by pattern |
| Get Run keys and services |
| Get user accounts from SAM |
| Get USB device history |
| Get OS version, hostname, timezone |
| Get network configuration |
Reference Tools
Tool | Description |
| List important Event IDs by channel |
| List forensic registry keys by category |
Remote Tools
Tool | Description |
| Collect artifacts via WinRM (password or pass-the-hash) |
| Get remote system info |
Usage Examples with Sample Output
1. List Available Event Logs
Request:
Output:
2. Get Event Log Statistics
Request:
Output:
3. Search for Failed Logon Attempts
Request:
Output:
4. Analyze User Accounts from SAM
Request:
Output:
5. Check Persistence Mechanisms
Request:
Output:
6. Get System Information
Request:
Output:
7. Get Network Configuration
Request:
Output:
8. Search Registry for Suspicious Entries
Request:
Output:
9. Get USB Device History
Request:
Output:
10. Remote Artifact Collection
Request with Password:
Request with Pass-the-Hash:
Output:
Important Event IDs Reference
Security Log
Event ID | Description |
4624 | Successful Logon |
4625 | Failed Logon |
4672 | Special Privileges Assigned |
4688 | Process Creation |
4697 | Service Installed |
4698-4702 | Scheduled Task Events |
4720 | User Account Created |
1102 | Audit Log Cleared |
System Log
Event ID | Description |
7045 | New Service Installed |
7036 | Service Started/Stopped |
104 | Event Log Cleared |
Sysmon
Event ID | Description |
1 | Process Creation |
3 | Network Connection |
11 | File Created |
12-14 | Registry Events |
22 | DNS Query |
Typical Investigation Workflow
1. Mount or Collect Evidence
2. Discover Available Logs
3. Get Overview
4. Hunt for Suspicious Activity
5. Analyze Registry
6. Correlate Findings
Troubleshooting
"Module not found" errors
"Permission denied" on registry hives
Registry hives may be locked. Either:
Use offline/copied hives from a mounted image
Use VSS (Volume Shadow Copy) collection via WinRM
WinRM connection issues
Remove MCP Server
Development
License
MIT License
Credits
python-evtx - EVTX parsing
python-registry - Registry parsing
MCP - Model Context Protocol