ConsoleHost_History-Parser-MCP
Verified Safeby Amier-ge
Overview
Parses PowerShell ConsoleHost_history.txt files from disk images to extract command history for forensic analysis.
Installation
python mcp_server.pyEnvironment Variables
- PYTHONPATH
Security Notes
The code uses established forensic libraries (pytsk3, pyewf) for disk image parsing and does not contain obvious security vulnerabilities like 'eval', direct shell execution without sanitization, or hardcoded credentials. It focuses on file system analysis and decoding content, which is generally robust. The main security considerations would be vulnerabilities in the underlying third-party libraries or potential exploits from extremely malformed disk images.
Similar Servers
TriageMCP
Enables an LLM to perform static analysis and triage of PE files using local security tools.
PowerShell.MCP
Enables AI assistants to execute arbitrary PowerShell commands and CLI tools for system automation, development tasks, and data analysis in a persistent, shared console environment.
mcp-insights
Automatically collects, analyzes, and reports on the public Model Context Protocol server registry, generating trend data and statistics.
MCPAsPowerShellModule
Serves as a Model Context Protocol (MCP) server implemented as a PowerShell module, dynamically exposing C#, PowerShell script, or PowerShell module function tools.