home / mcp / attack mcp server
This project is an MCP (Model Context Protocol) server for querying ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) techniques and tactics. It provides a way to access and retrieve information about various attack techniques and tactics used by adversaries.
Configuration
View docs{
"mcpServers": {
"alex-llm-attack-mcp-server": {
"url": "http://127.0.0.1:8081/mcp"
}
}
}You have an MCP server that lets you query ATT&CK techniques and tactics through both a local stdio interface and a remote HTTP interface. This makes it easy to integrate with your security tooling, automation pipelines, and CI workflows to retrieve technique details, mitigations, and detections.
You connect an MCP client to the server and use the provided tools to look up ATT&CK techniques by ID or by name, retrieve full technique details, get mitigations, and fetch detections. You can also list all tactics and fetch server information about versions and data sets. The HTTP interface exposes the MCP API over a network port, while the stdio interface runs locally for seamless integration with local tooling.
Prerequisites: Python 3.8+ and pip must be available on your system.
Step 1: Install dependencies.
pip install -r requirements.txtStep 2: Ensure the ATT&CK data set is present in the project root.
Step 3: Run in stdio mode for local integration with clients that support local MCP stdio.
python main.pyStep 4: If you prefer an HTTP interface for remote access or development testing, start the server in HTTP mode.
python main.py --mode http --host 0.0.0.0 --port 8081 --log-level infoThe server can be accessed via two primary MCP configurations: an HTTP endpoint for remote access and a local stdio interface for direct, intra-process integration. If you need to adjust the listening address or port, set the host and port when launching in HTTP mode. No credentials are described in the surface details, so rely on your network controls to restrict access.
- The HTTP interface exposes an endpoint where you can request techniques, full technique details, mitigations, detections, and tactics. - The stdio interface is ideal for local automation suites and CI/CD pipelines that run within the same process or container.
This server provides a set of MCP tools to query ATT&CK data and get supporting information. You can query by technique ID or by technique name, fetch full technique data, retrieve mitigations and detections, list all tactics, and obtain server information.
Query ATT&CK techniques by ID or by name, returning matching technique data.
Fetch full details for techniques by ID or name, including IDs, descriptions, platforms, kill chain phases, references, sub-techniques, and mitigations.
Retrieve mitigations for a specific technique by ID.
Retrieve detections for a specific technique by ID.
List all ATT&CK tactics.
Return server version, dataset version, maintainer, and Git information.