This document covers supported versions, safe use, vulnerability reporting, and data handling for WinFire.
| Version | Status | Support |
|---|---|---|
| 2.1.0 | Current | Full support and security fixes |
| 2.0.2 | Legacy | Critical fixes only |
| 2.0.1 | Legacy | Critical fixes only |
| 2.0.0 | Legacy | Critical fixes only |
| 1.0.x | EOL | No support |
WinFire will often trigger antivirus, EDR, XDR, or SOC detections. This is expected because the script performs legitimate forensic actions that overlap with attacker tradecraft:
- Enumerates processes, command lines, services, drivers, and scheduled tasks.
- Reads sensitive registry locations.
- Collects browser artifacts and user activity traces.
- Reads event logs and PowerShell history.
- Checks security tools, Defender exclusions, Sysmon, WDAC, AppLocker, AMSI, and LSA protection.
- Scans high-risk file system paths and Alternate Data Streams.
- Enumerates named pipes, WMI subscriptions, and ETW/WMI consumers.
Detection does not automatically mean WinFire is malicious. It means the tool is powerful and should be run under formal authorization.
Before running WinFire:
- Obtain written authorization.
- Confirm scope, systems, and data handling requirements.
- Coordinate with the SOC or security tool owners.
- Verify the script hash and source.
- Prepare secure output storage.
- Run from an elevated PowerShell session.
If security tooling blocks WinFire, prefer a temporary folder-specific exclusion over disabling protection globally:
Add-MpPreference -ExclusionPath "C:\Tools\WinFire"If real-time protection must be disabled, document the change and re-enable it immediately after collection:
Set-MpPreference -DisableRealtimeMonitoring $true
.\WinFire.ps1 -Quick -OutputPath "C:\Forensics\Case001"
Set-MpPreference -DisableRealtimeMonitoring $falseDocument security-tool changes in chain-of-custody notes:
Date/Time: 2026-05-06 10:30:00
Action: Added Microsoft Defender exclusion for C:\Tools\WinFire
Reason: Authorized live forensic collection
Approved by: Security Operations
Removed: 2026-05-06 11:15:00
WinFire output can contain sensitive information.
| Category | Examples | Sensitivity |
|---|---|---|
| System | OS, hardware, software, environment variables | Low to Medium |
| Users | User names, SIDs, profiles, group memberships | Medium |
| Processes | Command lines, executable paths, owners | High |
| Network | IP addresses, ports, shares, firewall rules, proxy state | High |
| Browser | Cookies, history, sessions, profile artifacts where accessible | Very High |
| Event logs | Logons, privilege use, PowerShell, Defender, Sysmon | High |
| Security posture | WDAC, AppLocker, AMSI, LSA, BitLocker, TPM | High |
| Credential indicators | LSASS access and hive-copy indicators | Critical |
Handle results as forensic evidence:
- Store on encrypted media.
- Restrict access to authorized personnel.
- Preserve hash manifests.
- Keep chain-of-custody records.
- Follow legal hold and retention requirements.
- Securely delete temporary copies when no longer needed.
Do not report security vulnerabilities in public issues.
Email: sudo3rs@protonmail.com
Subject format:
[SECURITY] Short description
Include:
- Vulnerability description.
- Affected version.
- Steps to reproduce.
- Impact.
- Suggested fix if available.
- Whether you want public credit.
Report:
- Code execution vulnerabilities.
- Privilege escalation caused by WinFire code.
- Unsafe file handling that could overwrite unintended paths.
- Sensitive data exposure beyond documented collection.
- Integrity issues in evidence packaging or hash manifests.
Do not report as security issues:
- AV/EDR detection of WinFire.
- Requests for new collection modules.
- General bugs without security impact.
- Documentation typos.
| Phase | Target |
|---|---|
| Acknowledgment | 48 hours |
| Initial assessment | 7 days |
| Fix plan | 14 days |
| Coordinated disclosure | After fix release, usually within 30 days |
- Confirm written authorization.
- Record target hostname, user, time, and purpose.
- Verify script integrity.
- Prepare encrypted evidence storage.
- Record AV/EDR exclusions or policy changes.
- Run as Administrator.
- Use
-Quickwhen speed and minimal footprint matter. - Use
-ExcludeBrowseror-ExcludeNetworkif scope requires it. - Monitor
WinFire_ExecutionLog.txtand final execution summary.
- Review
Reports\Operation_Metrics.csvfor failed operations. - Review
Raw_Data\Threat_Score.csv. - Preserve
Reports\Hash_Manifest.txt. - Move results to secure storage.
- Remove temporary AV/EDR exclusions.
- Complete chain-of-custody documentation.
The following are expected and should not be treated as script compromise:
- Locked temp files cannot always be hashed.
- Browser files may be locked while browsers are running.
Amcache.hvecan be locked; WinFire records failure rows instead of failing the scan.SeBackupPrivilegeandSeRestorePrivilegemay be disabled even in an elevated session.- Sysmon may not be installed.
- Some systems have no VSS shadow copies.
- Some named pipe and ADS patterns are benign; v2.1.0 classifies these before scoring.
WinFire is intended exclusively for authorized digital forensics, incident response, security assessment, and system administration.
Users are responsible for:
- Authorization.
- Scope control.
- Compliance with applicable laws and regulations.
- Privacy obligations.
- Data protection.
- Chain-of-custody documentation.
The software is provided "as is", without warranty of any kind. The authors and contributors are not responsible for unauthorized use, data loss, system damage, operational disruption, or legal consequences.
Repository: https://github.com/Masriyan/WinFire