Winforensics MCP
W

Winforensics MCP

The Windows Forensics MCP Server is a comprehensive digital forensics toolkit designed specifically for Linux environments. It uses pure Python libraries to natively parse traces from Windows systems without relying on Windows tools. It provides functions such as EVTX log analysis, registry analysis, execution trace analysis, filesystem forensics, user activity analysis, network forensics, malware detection, and API monitoring capture analysis, and supports remote collection and high - level investigation coordinators.
2.5 points
3.4K

What is Windows Forensics MCP Server?

Windows Forensics MCP Server is a Windows digital forensics and incident response toolkit designed specifically for Linux environments. It allows investigators to directly analyze and parse forensic data from Windows systems on Linux systems without installing any Windows tools or dependencies. This tool is implemented using pure Python libraries and can handle various Windows forensic artifacts, such as event logs, registry, execution traces, user activities, etc.

How to use Windows Forensics MCP Server?

This tool runs as an MCP server and can be interacted with through AI assistants such as Claude. You can mount a Windows forensic image to a Linux system and then use this tool to analyze the data within it. The tool provides an advanced investigation coordinator that can automatically correlate multiple data sources to answer complex investigation questions.

Applicable Scenarios

It is applicable to scenarios such as network security incident response, digital forensics investigations, malware analysis, and internal threat investigations. It is particularly suitable for investigators who need to analyze evidence from Windows systems in a Linux environment.

Main Features

Core Forensic Functions
Parse Windows event logs (EVTX), registry (SAM, SYSTEM, SOFTWARE, etc.), and support remote evidence collection via WinRM.
Execution Trace Analysis
Analyze PE files, Prefetch execution evidence, Amcache hash records, and SRUM application resource usage data.
Filesystem Forensics
Parse the MFT master file table, USN change log, and build a unified timeline.
User Activity Analysis
Analyze browser history, LNK shortcuts, ShellBags folder navigation history, and RecentDocs recent document records.
Network Forensics
Parse PCAP/PCAPNG network capture files and analyze network sessions, DNS queries, and HTTP requests.
API Monitoring Analysis
Parse API Monitor capture files, detect attack patterns such as process injection and credential dumping, and contain 26,944 Windows API definitions.
Malware Detection
Use 718 YARA rules to detect threats such as APT, ransomware, and Webshell, integrate VirusTotal threat intelligence, and perform Detect It Easy packing detection.
Investigation Orchestrators
Advanced tools automatically correlate multiple data sources: investigate_execution, investigate_user_activity, hunt_ioc, build_timeline.
Advantages
Runs in a pure Linux environment without relying on Windows tools
Implemented using pure Python, easy to deploy and maintain
Provides an advanced investigation coordinator to automatically correlate multiple data sources
Integrates multiple threat intelligence sources (YARA, VirusTotal)
Supports remote evidence collection (via WinRM)
Contains rich API monitoring and analysis capabilities
Limitations
Requires basic knowledge of the Linux command line
Some functions require external tools (such as Detect It Easy)
The free version of VirusTotal has API call limitations
Requires mounting Windows evidence to a Linux system

How to Use

Install the Tool
Install Windows Forensics MCP Server using the uv package manager.
Add to Claude CLI
Add the MCP server to the Claude command - line interface.
Prepare Forensic Data
Mount a Windows forensic image to a Linux system, for example, mount it to the /mnt/evidence directory.
Start the Investigation
Interact with the MCP server through Claude and use the advanced coordinator for the investigation.

Usage Examples

Example 1: Investigate the Execution of a Suspicious Binary File
Investigate whether mimikatz.exe has been executed on the infected system.
Example 2: Search for Threat Indicators
Search for a specific SHA1 hash value in all forensic artifacts.
Example 3: Analyze User Activity
Investigate the activities of a specific user on the system.
Example 4: Analyze Network Captures
Analyze suspicious network activities in a PCAP file.

Frequently Asked Questions

Do I need a Windows license to use this tool?
How can I obtain a VirusTotal API key?
What is Detect It Easy? How to install it?
Which Windows versions does the tool support?
How to import the output of Eric Zimmerman tools?

Related Resources

GitHub Repository
Source code and documentation for Windows Forensics MCP Server
Memory Forensics MCP Server
Unified memory forensics MCP server that combines the speed of Rust and the coverage of Vol3
macOS Forensics MCP Server
macOS digital forensics and incident response tool
API Monitor
Windows API monitoring tool for capturing API calls
signature - base YARA Rules
A library of 718 YARA rules including APT, ransomware, and Webshell
Detect It Easy Engine
Packing detection and file analysis tool

Installation

Copy the following command to your Client for configuration
Note: Your key is sensitive information, do not share it with anyone.

Alternatives

V
Vestige
Vestige is an AI memory engine based on cognitive science. By implementing 29 neuroscience modules such as prediction error gating, FSRS - 6 spaced repetition, and memory dreaming, it provides long - term memory capabilities for AI. It includes a 3D visualization dashboard and 21 MCP tools, runs completely locally, and does not require the cloud.
Rust
5.4K
4.5 points
M
Moltbrain
MoltBrain is a long-term memory layer plugin designed for OpenClaw, MoltBook, and Claude Code, capable of automatically learning and recalling project context, providing intelligent search, observation recording, analysis statistics, and persistent storage functions.
TypeScript
5.1K
4.5 points
B
Bm.md
A feature-rich Markdown typesetting tool that supports multiple style themes and platform adaptation, providing real-time editing preview, image export, and API integration capabilities
TypeScript
5.4K
5 points
S
Security Detections MCP
Security Detections MCP is a server based on the Model Context Protocol that allows LLMs to query a unified security detection rule database covering Sigma, Splunk ESCU, Elastic, and KQL formats. The latest version 3.0 is upgraded to an autonomous detection engineering platform that can automatically extract TTPs from threat intelligence, analyze coverage gaps, generate SIEM-native format detection rules, run tests, and verify. The project includes over 71 tools, 11 pre-built workflow prompts, and a knowledge graph system, supporting multiple SIEM platforms.
TypeScript
5.6K
4 points
P
Paperbanana
Python
6.9K
5 points
B
Better Icons
An MCP server and CLI tool that provides search and retrieval of over 200,000 icons, supports more than 150 icon libraries, and helps AI assistants and developers quickly obtain and use icons.
TypeScript
6.6K
4.5 points
A
Assistant Ui
assistant - ui is an open - source TypeScript/React library for quickly building production - grade AI chat interfaces, providing composable UI components, streaming responses, accessibility, etc., and supporting multiple AI backends and models.
TypeScript
6.7K
5 points
A
Apify MCP Server
The Apify MCP Server is a tool based on the Model Context Protocol (MCP) that allows AI assistants to extract data from websites such as social media, search engines, and e-commerce through thousands of ready-to-use crawlers, scrapers, and automation tools (Apify Actors). It supports OAuth and Skyfire proxy payment and can be integrated into MCP clients such as Claude and VS Code through HTTPS endpoints or local stdio.
TypeScript
6.7K
5 points
G
Gitlab MCP Server
Certified
The GitLab MCP server is a project based on the Model Context Protocol that provides a comprehensive toolset for interacting with GitLab accounts, including code review, merge request management, CI/CD configuration, and other functions.
TypeScript
26.0K
4.3 points
M
Markdownify MCP
Markdownify is a multi-functional file conversion service that supports converting multiple formats such as PDFs, images, audio, and web page content into Markdown format.
TypeScript
36.0K
5 points
N
Notion Api MCP
Certified
A Python-based MCP Server that provides advanced to-do list management and content organization functions through the Notion API, enabling seamless integration between AI models and Notion.
Python
21.7K
4.5 points
D
Duckduckgo MCP Server
Certified
The DuckDuckGo Search MCP Server provides web search and content scraping services for LLMs such as Claude.
Python
74.4K
4.3 points
U
Unity
Certified
UnityMCP is a Unity editor plugin that implements the Model Context Protocol (MCP), providing seamless integration between Unity and AI assistants, including real - time state monitoring, remote command execution, and log functions.
C#
32.9K
5 points
F
Figma Context MCP
Framelink Figma MCP Server is a server that provides access to Figma design data for AI programming tools (such as Cursor). By simplifying the Figma API response, it helps AI more accurately achieve one - click conversion from design to code.
TypeScript
64.4K
4.5 points
G
Gmail MCP Server
A Gmail automatic authentication MCP server designed for Claude Desktop, supporting Gmail management through natural language interaction, including complete functions such as sending emails, label management, and batch operations.
TypeScript
22.2K
4.5 points
C
Context7
Context7 MCP is a service that provides real-time, version-specific documentation and code examples for AI programming assistants. It is directly integrated into prompts through the Model Context Protocol to solve the problem of LLMs using outdated information.
TypeScript
97.7K
4.7 points
AIBase
Zhiqi Future, Your AI Solution Think Tank
© 2026AIBase