mitre-attack-mcp
by stoyky·★ 40·Score 42
MCP server providing 50+ tools for querying MITRE ATT&CK knowledge base with automatic Navigator layer generation.
Overview
The mitre-attack-mcp server provides comprehensive access to the MITRE ATT&CK knowledge base through a well-structured set of API tools. It offers functionality for querying malware, threat actors, and techniques, as well as tools for comparing techniques used by different entities. The server can automatically generate visual ATT&CK Navigator layers, which is particularly useful for threat analysis and visualizing adversary tactics.
Try asking AI
After installing, here are 4 things you can ask your AI assistant:
When to choose this
Choose this server for cybersecurity analysis, threat intelligence, and ATT&CK matrix visualization when working with MITRE ATT&CK data.
When NOT to choose this
Avoid if you need access to non-MITRE threat intelligence sources or require real-time threat data beyond the periodically updated ATT&CK knowledge base.
Tools this server exposes
12 tools extracted from the READMEquery_attack_dataQuery detailed information about MITRE ATT&CK tactics, techniques, or malware
get_threat_actor_infoRetrieve information about specific threat actors in the MITRE ATT&CK database
analyze_technique_overlapCompare techniques used by different threat actors or malware families
generate_attack_navigator_layerCreate an ATT&CK Navigator layer visualization for threat actors or malware
get_malware_infoRetrieve detailed information about specific malware in the MITRE ATT&CK database
find_campaign_overlapsIdentify campaign overlaps between different threat actors or malware families
get_technique_detailsGet comprehensive details about a specific MITRE ATT&CK technique
get_tactics_infoRetrieve information about MITRE ATT&CK tactics
map_techniques_to_threat_actorsMap which threat actors use specific techniques in the MITRE ATT&CK database
get_malware_techniquesGet techniques associated with specific malware families
search_attack_databaseSearch the MITRE ATT&CK database for relevant entries using keywords
get_attack_matrixRetrieve the complete MITRE ATT&CK matrix structure
Note: Tool names inferred from the README's description of features and use cases. The README mentions '50+ Tools for MITRE ATT&CK Querying' but doesn't provide explicit tool names or signatures, only describing functionality. Tools were created
Comparable tools
Installation
Installation
To clone and run this server, you'll need [Git](https://git-scm.com), [Python](https://www.python.org/), and [PipX](https://github.com/pypa/pipx) installed on your computer.
- Ensure Git, Python, and PipX have been installed using their official respective installation instructions for Windows/Mac/Linux
- Install the MCP Server using PipX
pipx install git+https://github.com/stoyky/mitre-attack-mcpConfigure with Claude AI Desktop
Add the following to your claude_desktop_config.json:
{
"mcpServers": {
"mitre-attack": {
"command": "mitre-attack-mcp",
"args": []
}
}
}FAQ
- Where does the server store the MITRE data by default?
- By default, the MCP server stores MITRE-related data in the current user's default cache directory. You can specify a custom data directory using the --data-dir argument in the configuration.
- What version of Python is required to run this server?
- The README doesn't specify a Python version requirement, but since it installs via PipX and depends on mitreattack-python, Python 3.7 or higher should be compatible.
Compare mitre-attack-mcp with
Last updated · Auto-generated from public README + GitHub signals.