<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Inoussa Mouiche</title>
    <description>The latest articles on DEV Community by Inoussa Mouiche (@imouiche).</description>
    <link>https://dev.to/imouiche</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3673068%2F7c5f5493-4f12-4258-b1a7-080117060d5a.png</url>
      <title>DEV Community: Inoussa Mouiche</title>
      <link>https://dev.to/imouiche</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/imouiche"/>
    <language>en</language>
    <item>
      <title>Complete MITRE ATT&amp;CK MCP Server</title>
      <dc:creator>Inoussa Mouiche</dc:creator>
      <pubDate>Fri, 26 Dec 2025 22:22:38 +0000</pubDate>
      <link>https://dev.to/imouiche/complete-mitre-attck-mcp-server-4j1k</link>
      <guid>https://dev.to/imouiche/complete-mitre-attck-mcp-server-4j1k</guid>
      <description>&lt;p&gt;&lt;strong&gt;AI-Native Access to the World’s Leading Threat Intelligence Framework&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Overview&lt;/strong&gt;&lt;br&gt;
The MITRE ATT&amp;amp;CK MCP Server transforms the world’s leading adversary knowledge base into an AI-native interface. Built for the Model Context Protocol, it enables LLMs and agentic systems to:&lt;/p&gt;

&lt;p&gt;🔍 Query 200+ techniques, 140+ groups, 700+ software entries&lt;br&gt;
🧠 Reason over complex threat relationships and TTPs&lt;br&gt;
📊 Visualize coverage gaps with ATT&amp;amp;CK Navigator layers&lt;br&gt;
⚡ Scale threat intelligence workflows with structured tools&lt;/p&gt;

&lt;p&gt;Perfect for: Security teams, threat hunters, detection engineers, AI researchers, and anyone building intelligent security systems.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What is this?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;mitre-attack-mcp-server is a self-contained MCP server that provides machine-callable access to the MITRE ATT&amp;amp;CK framework using official STIX data with LLMs friendly structured outputs.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;It enables:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;🤖 LLMs to reason about ATT&amp;amp;CK techniques, groups, software, and mitigations&lt;br&gt;
🧠 Agentic workflows to generate threat explanations and coverage maps&lt;br&gt;
🔍 Security teams to query ATT&amp;amp;CK relationships programmatically&lt;br&gt;
📊 Visualization via ATT&amp;amp;CK Navigator layers&lt;br&gt;
No scraping, No fragile APIs.&lt;/p&gt;

&lt;p&gt;Just official MITRE data, structured and reliable.&lt;/p&gt;

&lt;p&gt;** Key Features**&lt;/p&gt;

&lt;p&gt;✅ &lt;strong&gt;65+ MCP tools&lt;/strong&gt; across ATT&amp;amp;CK domains (Enterprise, Mobile, ICS)&lt;br&gt;
✅ Automatic &lt;strong&gt;STIX download &amp;amp; caching&lt;/strong&gt; on first run&lt;br&gt;
✅ Native &lt;strong&gt;ATT&amp;amp;CK Navigator layer generation&lt;/strong&gt;&lt;br&gt;
✅ Designed for &lt;strong&gt;LLMs &amp;amp; MCP-compatible clients&lt;/strong&gt;&lt;br&gt;
✅ &lt;strong&gt;In-memory caching&lt;/strong&gt; for instant query responses&lt;br&gt;
✅ &lt;strong&gt;Type-safe&lt;/strong&gt; with Pydantic models&lt;br&gt;
✅ Clean, production-ready, self-contained server&lt;br&gt;
✅ Comprehensive test coverage&lt;br&gt;
📦 Installation&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Via PyPI (recommended) — Python Users&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;pip install mitre-mcp-server
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Via npm&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;npm install -g @imouiche/mitre-attack-mcp-server
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;npx (no installation required)&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;npx @imouiche/mitre-attack-mcp-server
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Via uv (Modern Python)&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;uv pip install mitre-mcp-server
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Local Development&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;git clone https://github.com/imouiche/complete-mitre-attack-mcp-server.git
cd complete-mitre-attack-mcp-server
uv sync
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Configure Claude Desktop&lt;/p&gt;

&lt;p&gt;Add to your claude_desktop_config.json:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;macOS: `~/Library/Application Support/Claude/claude_desktop_config.json`

Windows: `%APPDATA%\Claude\claude_desktop_config.json`
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;





&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;{
"mcpServers": {
"mitre-attack": {
"command": "npx",
"args": ["-y", "@imouiche/mitre-attack-mcp-server"]
      }
    }
 }
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Restart Claude Desktop&lt;/p&gt;

&lt;p&gt;Quit Claude Desktop completely (Cmd+Q on macOS) and reopen it.&lt;/p&gt;

&lt;p&gt;Start Querying!&lt;/p&gt;

&lt;p&gt;Ask Claude:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;"What techniques does APT29 use for initial access?"&lt;br&gt;
"Generate an ATT&amp;amp;CK Navigator layer for ransomware groups"&lt;br&gt;
"Show me all Windows persistence techniques"&lt;br&gt;
Data downloads automatically on first run (~59MB, cached at &lt;code&gt;~/.mitre-mcp-server/data/&lt;/code&gt;).&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;MCP Registry&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This server is officially registered in the Model Context Protocol (MCP) Registry.&lt;/p&gt;

&lt;p&gt;Registry ID: &lt;code&gt;io.github.imouiche/mitre-attack-mcp-server&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://registry.modelcontextprotocol.io/?q=mitre-attack-mcp-server" rel="noopener noreferrer"&gt;View in Official Registry&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;🛠️ &lt;strong&gt;Available Tools&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The server exposes 65+ MCP tools covering all major MITRE ATT&amp;amp;CK entities and relationships.&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Tool&lt;/th&gt;
&lt;th&gt;Description&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;get_data_stats&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Show download status, file paths, sizes, and ATT&amp;amp;CK release version&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;generate_layer&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Generate an ATT&amp;amp;CK Navigator layer (JSON output)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;get_layer_metadata&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Return Navigator layer metadata template&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;




&lt;h3&gt;
  
  
  🎯 Techniques
&lt;/h3&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Tool&lt;/th&gt;
&lt;th&gt;Description&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;get_technique_by_id&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Get a technique by ATT&amp;amp;CK ID (e.g., T1055)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;search_techniques&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Search techniques by name or description&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;get_all_techniques&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Retrieve all techniques&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;get_all_parent_techniques&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Parent techniques only&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;get_all_subtechniques&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;All subtechniques&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;get_subtechniques_of_technique&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Subtechniques of a parent&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;get_parent_technique_of_subtechnique&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Parent of a subtechnique&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;get_technique_tactics&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Tactics associated with a technique&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;get_techniques_by_tactic&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Techniques under a tactic&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;get_techniques_by_platform&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Techniques for a platform&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;get_revoked_techniques&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Revoked techniques&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;




&lt;h3&gt;
  
  
  🧑‍💻 Groups (Threat Actors)
&lt;/h3&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Tool&lt;/th&gt;
&lt;th&gt;Description&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;get_group_by_name&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Find group by name or alias&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;search_groups&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Search groups&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;get_all_groups&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;All ATT&amp;amp;CK groups&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;get_groups_by_alias&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Lookup groups by alias&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;get_groups_using_technique&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Groups using a technique&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;get_groups_using_software&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Groups using software&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;get_groups_attributing_to_campaign&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Groups attributed to a campaign&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;




&lt;h2&gt;
  
  
  Software (Malware &amp;amp; Tools)
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Tool&lt;/th&gt;
&lt;th&gt;Description&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;get_software&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Get all software&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;search_software&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Search software&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;get_software_by_alias&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Lookup software by alias&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;get_software_used_by_group&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Software used by a group&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;get_software_used_by_campaign&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Software used in campaigns&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;get_software_using_technique&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Software using a technique&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;




&lt;h3&gt;
  
  
  📌 Campaigns
&lt;/h3&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Tool&lt;/th&gt;
&lt;th&gt;Description&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;get_all_campaigns&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Get all campaigns&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;get_campaigns_by_alias&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Lookup campaigns by alias&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;get_campaigns_using_technique&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Campaigns using a technique&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;get_campaigns_using_software&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Campaigns using software&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;get_campaigns_attributed_to_group&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Campaign attribution&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;




&lt;h3&gt;
  
  
  🛡️ Mitigations
&lt;/h3&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Tool&lt;/th&gt;
&lt;th&gt;Description&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;get_all_mitigations&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Get all mitigations&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;get_mitigations_mitigating_technique&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Mitigations for a technique&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;get_techniques_mitigated_by_mitigation&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Techniques mitigated by a mitigation&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;




&lt;h3&gt;
  
  
  🧭 Tactics, Data Sources &amp;amp; ICS
&lt;/h3&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Tool&lt;/th&gt;
&lt;th&gt;Description&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;get_all_tactics&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Get all tactics&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;get_all_datasources&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Get all data sources&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;get_all_datacomponents&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Get all data components&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;get_datacomponents_detecting_technique&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Data components detecting a technique&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;get_all_assets&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Get ICS assets&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;get_assets_targeted_by_technique&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Assets targeted by a technique&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;




&lt;p&gt;💡 Example Queries&lt;/p&gt;

&lt;p&gt;Threat Intelligence&lt;/p&gt;

&lt;h3&gt;
  
  
  Threat Intelligence
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;"What techniques does APT29 use for initial access?"
"Which groups target financial institutions?"
"Show me all ransomware-related software"
"What are the aliases for the Lazarus Group?"
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  Detection Engineering
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;"What data sources detect credential dumping?"
"Generate a coverage map for EDR capabilities"
"List all techniques for Windows privilege escalation"
"What can detect T1055 (Process Injection)?"
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  Threat Hunting
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;"What techniques use PowerShell?"
"Show me lateral movement techniques for Linux"
"Which groups use Cobalt Strike?"
"What persistence techniques target macOS?"
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  Mitigation &amp;amp; Defense
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;"What mitigations exist for phishing attacks?"
"Show me all mitigations for privilege escalation"
"What techniques does MFA mitigate?"
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Compliance &amp;amp; Gap Analysis&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;"Generate a layer for all techniques our EDR covers"
"Compare APT29 TTPs against our detection capabilities"
"Show unmitigated techniques in our environment"
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;📊 &lt;strong&gt;ATT&amp;amp;CK Navigator Visualization&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The &lt;code&gt;generate_layer&lt;/code&gt; tool produces ATT&amp;amp;CK Navigator–compatible JSON.&lt;/p&gt;

&lt;p&gt;Usage:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Ask Claude to generate a layer:
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;"Generate an ATT&amp;amp;CK Navigator layer for all techniques used by APT29"
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Save the JSON output to a file (e.g., &lt;code&gt;apt29_layer.json&lt;/code&gt;)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Upload to &lt;a href="https://mitre-attack.github.io/attack-navigator/" rel="noopener noreferrer"&gt;ATT&amp;amp;CK Navigator&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Visualize technique coverage, threat actor usage, or mitigation mapping&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Real-World Example Using LangGraph&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Read my Medium blog demonstrating how a multi-agent LangGraph system leverages these tools to perform a real-world threat investigation.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://medium.com/@nsangouinoussa515/from-mitre-att-ck-to-agentic-threat-investigation-58336c22f482" rel="noopener noreferrer"&gt;Blog&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Red Team Coverage:&lt;/strong&gt; Map all techniques used in an exercise&lt;br&gt;
&lt;strong&gt;Detection Gaps:&lt;/strong&gt; Highlight unmonitored techniques&lt;br&gt;
&lt;strong&gt;Threat Actor Profile:&lt;/strong&gt; Visualize group TTPs&lt;br&gt;
&lt;strong&gt;Mitigation Coverage:&lt;/strong&gt; Show what’s protected vs. exposed&lt;/p&gt;

&lt;p&gt;&lt;a href="https://huggingface.co/spaces/Inoussa-guru/mitre-agentic-threat-investigation" rel="noopener noreferrer"&gt;Live Demo&lt;/a&gt;&lt;br&gt;
Explore the interactive Gradio 6.2 demo on Hugging Face Spaces.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Technical Details:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Enterprise ATT&amp;amp;CK: v18.1+ (~50.9MB)&lt;br&gt;
Mobile ATT&amp;amp;CK: v18.1+ (~4.9MB)&lt;br&gt;
ICS ATT&amp;amp;CK: v18.1+ (~3.5MB)&lt;br&gt;
Total: ~59MB cached locally&lt;br&gt;
Storage: &lt;code&gt;~/.mitre-mcp-server/data/v{version}/&lt;/code&gt;&lt;br&gt;
Update: Auto-downloads on install, uses cached data on subsequent runs.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Performance:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;In-memory caching: All domains loaded at startup&lt;/li&gt;
&lt;li&gt;Query speed: Sub-second for most operations&lt;/li&gt;
&lt;li&gt;Graph traversal: Efficient relationship queries&lt;/li&gt;
&lt;li&gt;Concurrent: Handles multiple simultaneous requests&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Requirements:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Python:&lt;/strong&gt; 3.12 or higher&lt;br&gt;
&lt;strong&gt;Node.js:&lt;/strong&gt; 16+ (for NPM installation)&lt;br&gt;
&lt;strong&gt;Disk Space:&lt;/strong&gt; ~150MB (includes dependencies + data)&lt;br&gt;
&lt;strong&gt;Memory:&lt;/strong&gt; ~200MB RAM when running&lt;/p&gt;

&lt;p&gt;🚀** Roadmap &amp;amp; Vision**&lt;br&gt;
This project is the first component of a larger vision to build comprehensive agentic security automation by integrating multiple security knowledge bases and frameworks.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Planned Integrations&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;CVE/NVD — Vulnerability intelligence and exploit mapping&lt;/li&gt;
&lt;li&gt;MITRE D3FEND — Defensive countermeasure knowledge graph&lt;/li&gt;
&lt;li&gt;Sigma Rules— Detection rule translation and management&lt;/li&gt;
&lt;li&gt;CAPEC — Common Attack Pattern Enumeration&lt;/li&gt;
&lt;li&gt;CWE — Software weakness enumeration&lt;/li&gt;
&lt;li&gt;Agentic Pentesting— Multi-agent autonomous security testing
Ultimate Goal&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Enable AI agents to autonomously:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Map attack surfaces and identify vulnerabilities&lt;/li&gt;
&lt;li&gt;Recommend defensive countermeasures&lt;/li&gt;
&lt;li&gt;Generate detection rules and validate coverage&lt;/li&gt;
&lt;li&gt;Orchestrate multi-stage security assessments
Reason about complete attack-defense lifecycles
Get Involved&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;We welcome contributions.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Areas of Interest:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Integrating additional security frameworks (CVE, D3FEND, Sigma)&lt;br&gt;
Building agentic workflows for pentesting and red teaming&lt;br&gt;
Developing detection rule generation pipelines&lt;br&gt;
Creating threat intelligence reasoning systems&lt;br&gt;
Improving MCP tooling and documentation&lt;br&gt;
Interested? Open an issue, start a discussion, or reach out directly!&lt;/p&gt;

&lt;p&gt;Contributing&lt;/p&gt;

&lt;p&gt;Found a bug? Have a feature request? Want to contribute to the roadmap?&lt;/p&gt;

&lt;p&gt;All contributions welcome!&lt;/p&gt;

&lt;p&gt;Inoussa Mouiche, Ph.D.&lt;/p&gt;

&lt;p&gt;AI/ML Researcher | Cybersecurity | Agentic AI Systems | Software Engineering&lt;/p&gt;

&lt;p&gt;🎓 University of Windsor— WASP Lab&lt;/p&gt;

&lt;p&gt;🔬 &lt;strong&gt;Research Focus:&lt;/strong&gt; Threat Intelligence Automation, Machine Learning, Multi-Agent Security Systems, LLM-Powered Security Operations&lt;/p&gt;

&lt;p&gt;Connect&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;🐙 &lt;strong&gt;GitHub:&lt;/strong&gt; &lt;a href="https://github.com/imouiche" rel="noopener noreferrer"&gt;@imouiche&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Email:&lt;/strong&gt; &lt;a href="mailto:mouiche@uwindsor.ca"&gt;mouiche@uwindsor.ca&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;💼 LinkedIn: &lt;a href="https://www.linkedin.com/in/inoussa-mouiche-ph-d-b5b5138b/" rel="noopener noreferrer"&gt;Inoussa Mouiche, Ph.D.&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;📚 &lt;a href="https://dev.tourl"&gt;Google Scholar:&lt;/a&gt; &lt;a href="https://scholar.google.com/citations?user=_d4cEVoAAAAJ&amp;amp;hl=en" rel="noopener noreferrer"&gt;Publications&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Award Nomination&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Gold Medal:&lt;/strong&gt; The Governor General’s Academic Medal&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Open to opportunities in:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;AI/ML Engineering &amp;amp; Research&lt;br&gt;
Cybersecurity &amp;amp; Threat Intelligence&lt;br&gt;
Agentic AI Development&lt;br&gt;
Security Automation &amp;amp; Orchestration&lt;br&gt;
Academic &amp;amp; Industry Collaborations&lt;/p&gt;

&lt;p&gt;Interested in collaborating on agentic engineering systems? [Let’s connect!]&lt;/p&gt;

&lt;p&gt;Made with ❤️ for the cybersecurity and AI communities&lt;/p&gt;

</description>
      <category>mcp</category>
      <category>agents</category>
      <category>cybersecurity</category>
      <category>machinelearning</category>
    </item>
  </channel>
</rss>
