Skip to main content

A Model-Context Protocol server for the MITRE ATT&CK knowledge base

Project description


MITRE ATT&CK MCP Server

A Model-Context Protocol server for the MITRE ATT&CK knowledge base

Key FeaturesInstallationHow To UseUse CasesCredits

Key Features

  • 50+ Tools for MITRE ATT&CK Querying
    • Comprehensive access to the MITRE ATT&CK knowledge base through structured API tools
  • Automatic ATT&CK Navigator Layer Generation
    • Generate visual representations of techniques used by threat actors
  • Threat Actor and Malware Attribution
    • Query relationships between malware, threat actors, and techniques
  • Technique Overlap Analysis
    • Compare techniques used by different threat actors or malware families

Installation

To clone and run this server, you'll need Git, Python, and PipX installed on your computer.

  1. Ensure Git, Python, and PipX have been installed using their official respective installation instructions for Windows/Mac/Linux
  2. Install the MCP Server using PipX
pipx install git+https://github.com/stoyky/mitre-attack-mcp

How To Use

Configure with Claude AI Desktop

  1. Open Claude's MCP server configuration file.

Windows

C:\Users\[YourUsername]\AppData\Roaming\Claude\claude_desktop_config.json
# or
C:\Users\[YourUsername]\AppData\Local\AnthropicClaude\claude_desktop_config.json

Linux / Mac

~/.config/Claude/claude_desktop_config.json
  1. Add the following to that file if it doesn't already exist. If it already exists, merge the two JSON structures accordingly.
{
  "mcpServers": {
    "mitre-attack": {
      "command": "mitre-attack-mcp",
      "args": [
      ]
    }
  }
}

Note: By default the MCP server stores the mitre-related data in the current users default cache directory. You can specify a custom data directory to use with the following config:

{
  "mcpServers": {
    "mitre-attack": {
      "command": "mitre-attack-mcp",
      "args": [
        "--data-dir",
        "<path-to-data-dir>"
      ]
    }
  }
}

Changelog

  • v1.0.2 - Now installable via PipX on Windows, Mac, and Linux. "data directory" argument is now optional and will use the default cache directory if omitted.
  • v1.0.0 - Initial release
  • V1.0.1 - Improved robustness of layer metadata generation and error handling in layer generation function

Use Cases

  • Query for detailed information about specific malware, tactics, or techniques
  • Discover relationships between threat actors and their tools
  • Generate visual ATT&CK Navigator layers for threat analysis
  • Find campaign overlaps between different threat actors
  • Identify common techniques used by multiple malware families

Please see my blog for more information and examples.

Credits


Created by Remy Jaspers

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

iflow_mcp_stoyky_mitre_attack_mcp-1.0.2.tar.gz (11.9 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

File details

Details for the file iflow_mcp_stoyky_mitre_attack_mcp-1.0.2.tar.gz.

File metadata

  • Download URL: iflow_mcp_stoyky_mitre_attack_mcp-1.0.2.tar.gz
  • Upload date:
  • Size: 11.9 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: uv/0.10.0 {"installer":{"name":"uv","version":"0.10.0","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Debian GNU/Linux","version":"13","id":"trixie","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":null}

File hashes

Hashes for iflow_mcp_stoyky_mitre_attack_mcp-1.0.2.tar.gz
Algorithm Hash digest
SHA256 799bdafcf2a7a43b18f8a9021af34e7bf5d027b72a69d123f077f5256ed9dc0b
MD5 de90fed5f25d2a5858fa8ed485fd9bce
BLAKE2b-256 0f5deeb38b4bfe7505c63db0407d940738f4e2783b03a1672c91b511cc0d3647

See more details on using hashes here.

File details

Details for the file iflow_mcp_stoyky_mitre_attack_mcp-1.0.2-py3-none-any.whl.

File metadata

  • Download URL: iflow_mcp_stoyky_mitre_attack_mcp-1.0.2-py3-none-any.whl
  • Upload date:
  • Size: 11.5 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: uv/0.10.0 {"installer":{"name":"uv","version":"0.10.0","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Debian GNU/Linux","version":"13","id":"trixie","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":null}

File hashes

Hashes for iflow_mcp_stoyky_mitre_attack_mcp-1.0.2-py3-none-any.whl
Algorithm Hash digest
SHA256 26c4f133de7c3e525022dec862c1d307e289f8fd352c5882885323f3952bd926
MD5 85d644b4375e2680989bf53b738eb174
BLAKE2b-256 5dea844602d7a29abea81da97a7b22ed84e7b705a54ed2c55acc017f4896e6b9

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page