mitre-mcp

mitre-mcp

3.2

If you are the rightful owner of mitre-mcp and would like to certify it and/or have it hosted online, please leave a comment on the right or send an email to henry@mcphub.com.

The mitre-mcp server is a Model Context Protocol (MCP) server that integrates with the MITRE ATT&CK framework, providing tools for threat intelligence and security analysis using the mitreattack-python library and the official MCP Python SDK.

The mitre-mcp server is designed to bridge the gap between the MITRE ATT&CK knowledge base and AI-driven workflows. It provides a Model Context Protocol (MCP) interface that allows Large Language Models (LLMs) and other AI systems to directly query and utilize MITRE ATT&CK data for threat intelligence, security analysis, and defensive planning. The server supports seamless access to MITRE ATT&CK data, enabling real-time threat intelligence lookups during security conversations and supporting security professionals in understanding attack techniques and appropriate mitigations. It is designed for integration with MCP-compatible clients, such as Claude, Windsurf, and Cursor, for real-time MITRE ATT&CK framework lookups in LLM workflows.

Features

  • Comprehensive access to MITRE ATT&CK framework data including techniques, tactics, groups, and software
  • Support for all MITRE ATT&CK domains: Enterprise, Mobile, and ICS
  • Automatic caching of MITRE ATT&CK data to improve performance
  • Python API for easy integration into your applications
  • Built-in MCP server support for LLM/AI integrations

Tools

  1. get_techniques

    All the technologies in the framework. Supports filtering by domain, including sub-technology and options for handling revoked/deprecated items

  2. get_tactics

    All tactics in the framework. Return to the tactical category of technical organizations

  3. get_groups

    Group

  4. get_software

    All software in the framework. Can be filtered by software type (malware, tools) and domain

  5. get_techniques_by_tactic

    Get techniques related to specific tactics (e.g., 'defense evasion', 'persistent')

  6. get_techniques_used_by_group

    Group')

  7. get_mitigations

    All mitigations in the framework. These are security measures used to combat specific technologies

  8. get_techniques_mitigated_by_mitigation

    Get techniques that can be mitigated by specific mitigation strategies

  9. get_technique_by_id

    For process injection)