M

analyzing-mft-for-deleted-file-recovery

by mukul975

analyzing-mft-for-deleted-file-recovery helps recover deleted-file metadata and possible path or content evidence by analyzing NTFS $MFT records, $LogFile, $UsnJrnl, and MFT slack space. Built for DFIR and Security Audit workflows with MFTECmd, analyzeMFT, and X-Ways Forensics.

Stars0
Favorites0
Comments0
AddedMay 9, 2026
CategorySecurity Audit
Install Command
npx skills add mukul975/Anthropic-Cybersecurity-Skills --skill analyzing-mft-for-deleted-file-recovery
Curation Score

This skill scores 78/100, which means it is a solid directory listing candidate for users doing NTFS forensic recovery work. The repository gives enough concrete workflow, reference material, and supporting scripts to help an agent trigger and execute the task with less guesswork than a generic prompt, though it still leaves some adoption friction because the install path is not explicit.

78/100
Strengths
  • Strong domain specificity: the frontmatter clearly targets NTFS MFT analysis for deleted-file recovery with relevant tags and NIST CSF mappings.
  • Operational support is present: two scripts plus workflow and reference docs cover parsing MFT output, deleted-record filtering, timeline reconstruction, and slack-space recovery.
  • Good install decision value: the repo includes standards, technical references, and a report template, helping users judge fit for DFIR workflows.
Cautions
  • No install command or explicit setup instructions in SKILL.md, so agents may need extra guesswork to wire up execution.
  • Some evidence points to utility around external tools like MFTECmd and analyzeMFT, which means the skill depends on a broader forensic toolchain rather than being fully self-contained.
Overview

Overview of analyzing-mft-for-deleted-file-recovery skill

What this skill does

The analyzing-mft-for-deleted-file-recovery skill helps you analyze the NTFS Master File Table ($MFT) to recover deleted-file metadata and, where possible, evidence of content or path history. It is built for DFIR work where the goal is not just “find deleted files,” but reconstruct what existed, when it changed, and whether timestamps or metadata were manipulated.

Who should install it

Install the analyzing-mft-for-deleted-file-recovery skill if you do incident response, forensic triage, or Security Audit work on NTFS volumes and want a structured workflow for deleted-file recovery. It is a strong fit when you already have an image, a raw $MFT, or MFTECmd output and need repeatable analysis rather than a generic prompt.

Why it is useful

The main value is practical workflow support: it centers on deleted records, timestamps, $UsnJrnl, $LogFile, and MFT slack space. That combination gives better information gain than a simple “parse MFT” prompt because it encourages cross-correlation, not just record listing.

How to Use analyzing-mft-for-deleted-file-recovery skill

Install and inspect the right files

Use the install path shown in the repo instructions: npx skills add mukul975/Anthropic-Cybersecurity-Skills --skill analyzing-mft-for-deleted-file-recovery. After install, read SKILL.md first, then references/workflows.md, references/api-reference.md, and references/standards.md. If you are validating output quality or report shape, open assets/template.md early so your prompts match the expected deliverable.

Give the skill case-ready input

The analyzing-mft-for-deleted-file-recovery usage works best when you provide three things up front: the evidence source, the question, and the constraint. For example: “Analyze this MFTECmd CSV from C:\Users\...\NTFS to identify deleted files, likely deletion time, and timestomping indicators; return a concise Security Audit summary.” That is stronger than “help me recover deleted files,” because it tells the skill what output to prioritize.

Follow the repository workflow order

A practical analyzing-mft-for-deleted-file-recovery guide is: extract or supply $MFT, parse with MFTECmd or analyzeMFT, filter for deleted records (InUse = False), compare $SI and $FN timestamps, then cross-reference $UsnJrnl and $LogFile for sequence and deletion context. If you suspect partial recovery, inspect MFT slack space after the main parse so you do not miss residual attribute data.

Improve prompt quality with output constraints

When asking for analysis, specify the format you need: table, timeline, triage notes, or audit-ready summary. Include whether you want only deleted records, only timestomping candidates, or a full merged timeline. For analyzing-mft-for-deleted-file-recovery for Security Audit, ask for explicit findings, confidence notes, and any evidence gaps so the result is usable in a review packet.

analyzing-mft-for-deleted-file-recovery skill FAQ

Is this only for deleted-file recovery?

No. The skill is centered on deleted-file recovery, but it also supports timeline reconstruction and anti-forensics review. If your actual task is broad NTFS triage with no deleted-file question, a general filesystem forensics prompt may be enough.

Do I need MFTECmd to use it well?

MFTECmd is the most natural input path, but not the only one. The skill also aligns with analyzeMFT and raw MFT review. If you only have a disk image and no parsed output, you will get better results after extracting $MFT or generating CSV first.

Is it suitable for beginners?

Yes, if the user can provide evidence and a clear question. The skill is more useful than a blank prompt for beginners because it points them toward the right artifacts and checks. It is less suitable if the user cannot distinguish an NTFS volume from a generic file listing.

When should I not use it?

Do not use analyzing-mft-for-deleted-file-recovery if the filesystem is not NTFS, if the case has no deletion or timestamp issue, or if you need full content carving rather than metadata-led recovery. In those cases, a different forensic workflow will be faster.

How to Improve analyzing-mft-for-deleted-file-recovery skill

Feed it stronger evidence, not just a goal

Better inputs name the source and scope: “MFTECmd CSV from one workstation, focus on deleted documents in Downloads, include parent path and deletion indicators.” That is better than “analyze the MFT,” because the skill can then prioritize relevant rows instead of summarizing everything.

Ask for the right forensic comparisons

The main quality driver is comparison between $SI, $FN, $UsnJrnl, and $LogFile. If you care about analyzing-mft-for-deleted-file-recovery skill output quality, ask the model to explain mismatches, not just list timestamps. This helps catch timestomping, rename history, and cases where the deleted record still has usable path metadata.

Watch for common failure modes

The most common failure is overclaiming recovery certainty from incomplete metadata. A deleted MFT record may preserve filenames and timestamps without preserving file content. Another failure is missing reallocation risk: if the record has been reused, recovered details may be partial or misleading. Tell the skill to separate confirmed facts from inferred ones.

Iterate with a tighter second pass

After the first output, refine with a narrower prompt: “Re-run the analysis on only deleted records with mismatched $SI and $FN created times; return a short findings table and a one-paragraph Security Audit conclusion.” This improves signal by forcing the skill to rank evidence, not restate it.

Ratings & Reviews

No ratings yet
Share your review
Sign in to leave a rating and comment for this skill.
G
0/10000
Latest reviews
Saving...