MCP Catalogs
Home

mitre-attack-mcp

by stoyky·40·Score 42

MCP server providing 50+ tools for querying MITRE ATT&CK knowledge base with automatic Navigator layer generation.

securityknowledge-graphdeveloper-tools
10
Forks
1
Open issues
10 mo ago
Last commit
2d ago
Indexed

Overview

The mitre-attack-mcp server provides comprehensive access to the MITRE ATT&CK knowledge base through a well-structured set of API tools. It offers functionality for querying malware, threat actors, and techniques, as well as tools for comparing techniques used by different entities. The server can automatically generate visual ATT&CK Navigator layers, which is particularly useful for threat analysis and visualizing adversary tactics.

Try asking AI

After installing, here are 4 things you can ask your AI assistant:

you:Query detailed information about specific malware, tactics, or techniques
you:Generate visual ATT&CK Navigator layers for threat analysis
you:Discover relationships between threat actors and their tools
you:Where does the server store the MITRE data by default?

When to choose this

Choose this server for cybersecurity analysis, threat intelligence, and ATT&CK matrix visualization when working with MITRE ATT&CK data.

When NOT to choose this

Avoid if you need access to non-MITRE threat intelligence sources or require real-time threat data beyond the periodically updated ATT&CK knowledge base.

Tools this server exposes

12 tools extracted from the README
  • query_attack_data

    Query detailed information about MITRE ATT&CK tactics, techniques, or malware

  • get_threat_actor_info

    Retrieve information about specific threat actors in the MITRE ATT&CK database

  • analyze_technique_overlap

    Compare techniques used by different threat actors or malware families

  • generate_attack_navigator_layer

    Create an ATT&CK Navigator layer visualization for threat actors or malware

  • get_malware_info

    Retrieve detailed information about specific malware in the MITRE ATT&CK database

  • find_campaign_overlaps

    Identify campaign overlaps between different threat actors or malware families

  • get_technique_details

    Get comprehensive details about a specific MITRE ATT&CK technique

  • get_tactics_info

    Retrieve information about MITRE ATT&CK tactics

  • map_techniques_to_threat_actors

    Map which threat actors use specific techniques in the MITRE ATT&CK database

  • get_malware_techniques

    Get techniques associated with specific malware families

  • search_attack_database

    Search the MITRE ATT&CK database for relevant entries using keywords

  • get_attack_matrix

    Retrieve the complete MITRE ATT&CK matrix structure

Note: Tool names inferred from the README's description of features and use cases. The README mentions '50+ Tools for MITRE ATT&CK Querying' but doesn't provide explicit tool names or signatures, only describing functionality. Tools were created

Comparable tools

mitre-attack-pythonattck-navigatorthreatfox-api-mcp

Installation

Installation

To clone and run this server, you'll need [Git](https://git-scm.com), [Python](https://www.python.org/), and [PipX](https://github.com/pypa/pipx) installed on your computer.

  1. Ensure Git, Python, and PipX have been installed using their official respective installation instructions for Windows/Mac/Linux
  2. Install the MCP Server using PipX
pipx install git+https://github.com/stoyky/mitre-attack-mcp

Configure with Claude AI Desktop

Add the following to your claude_desktop_config.json:

{
  "mcpServers": {
    "mitre-attack": {
      "command": "mitre-attack-mcp",
      "args": []
    }
  }
}

FAQ

Where does the server store the MITRE data by default?
By default, the MCP server stores MITRE-related data in the current user's default cache directory. You can specify a custom data directory using the --data-dir argument in the configuration.
What version of Python is required to run this server?
The README doesn't specify a Python version requirement, but since it installs via PipX and depends on mitreattack-python, Python 3.7 or higher should be compatible.

Compare mitre-attack-mcp with

GitHub →

Last updated · Auto-generated from public README + GitHub signals.