# MITREAttackScrapper
### A simple and easy data scrapper for **MITRE ATT&CK** information for threat intelligence and knowledge bases, written in Python3.
> Un scrapper de datos simple y f찼cil para la informaci처n de **MITRE ATT&CK** para inteligencia de amenazas y bases de conocimiento, escrito en Python3.
```py
# Need to MITRE ATT&CK data? How about using my package?
from MITREAttackScrapper.techniques.enterprise import MITREAttackEnterpriseTechniques
if __name__ == '__main__':
detail = MITREAttackEnterpriseTechniques.get("T1548.001")
print(f"Technique: {detail['name']}")
print(f"Platforms affected by this technique: {detail['platforms']}")
print(f"Number of mitigation suggested: {len(detail['mitigations'])}")
# Technique: Abuse Elevation Control Mechanism
# Platforms affected by this technique: ['Azure AD', 'Google Workspace', 'IaaS', 'Linux', 'Office 365', 'Windows', 'macOS']
# Number of mitigation suggested: 1
```
### Note: Currently under development, not stable!!!
## How to use?
Refer to the **[documentation](https://knightchaser.github.io/MITREAttackScrapper/)**! >_<
- The documentation is based on **`sphinx-apidoc`**, which is an automated documentation tool for lazy Python and other language-based programmers.
- Locally build the Sphinx document if there are some changes on the codebase. The GitHub page action will read the refreshed page built results and the GitHub page will be updated accordingly.
```powershell
sphinx-apidoc -f -o docs/source .\MITREAttackScrapper\
./docs/make.bat html
```
## Coverage
- **TECHNIQUES**
- [x] MITRE ATT&CK Enterprise Techniques
- [ ] MITRE ATT&CK Mobile Techniques
- [ ] MITRE ATT&CK ICS Techniques
- **TACTICS**
- [x] MITRE ATT&CK Enterprise Tactics
- [ ] MITRE ATT&CK Mobile Tactics
- [ ] MITRE ATT&CK ICS Tactics
- **CTI**
- [x] MITRE ATT&CK CTI Groups
- [x] MITRE ATT&CK CTI Software
- [x] MITRE ATT&CK CTI Campaigns
- **Defenses/Mitigations**
- [x] MITRE ATT&CK Enterprise Mitigations(Defenses)
- [ ] MITRE ATT&CK Mobile Mitigations(Defenses)
- [ ] MITRE ATT&CK ICS Mitigations(Defenses)
- **ATT&CK MATRICES**
- [x] MITRE ATT&CK Enterprise Matrices
- [ ] MITRE ATT&CK Mobile Matrices
- [ ] MITRE ATT&CK ICS Matrices
Raw data
{
"_id": null,
"home_page": "https://github.com/KnightChaser/MITREAttackScrapper",
"name": "MITREAttackScrapper",
"maintainer": null,
"docs_url": null,
"requires_python": ">=3.6",
"maintainer_email": null,
"keywords": null,
"author": "KnightChaser",
"author_email": "agerio100@naver.com",
"download_url": "https://files.pythonhosted.org/packages/31/01/5d62d5d63a2ab9f913a1da39a31d890e48b143685a408920c0f03401d611/MITREAttackScrapper-0.1.5.tar.gz",
"platform": null,
"description": "# MITREAttackScrapper\r\n### A simple and easy data scrapper for **MITRE ATT&CK** information for threat intelligence and knowledge bases, written in Python3.\r\n> Un scrapper de datos simple y f\ucc3ccil para la informaci\ucc98n de **MITRE ATT&CK** para inteligencia de amenazas y bases de conocimiento, escrito en Python3.\r\n\r\n```py\r\n# Need to MITRE ATT&CK data? How about using my package?\r\nfrom MITREAttackScrapper.techniques.enterprise import MITREAttackEnterpriseTechniques\r\n\r\nif __name__ == '__main__':\r\n detail = MITREAttackEnterpriseTechniques.get(\"T1548.001\")\r\n print(f\"Technique: {detail['name']}\")\r\n print(f\"Platforms affected by this technique: {detail['platforms']}\")\r\n print(f\"Number of mitigation suggested: {len(detail['mitigations'])}\")\r\n\r\n # Technique: Abuse Elevation Control Mechanism\r\n # Platforms affected by this technique: ['Azure AD', 'Google Workspace', 'IaaS', 'Linux', 'Office 365', 'Windows', 'macOS']\r\n # Number of mitigation suggested: 1\r\n```\r\n\r\n### Note: Currently under development, not stable!!!\r\n\r\n## How to use?\r\nRefer to the **[documentation](https://knightchaser.github.io/MITREAttackScrapper/)**! >_<\r\n- The documentation is based on **`sphinx-apidoc`**, which is an automated documentation tool for lazy Python and other language-based programmers.\r\n- Locally build the Sphinx document if there are some changes on the codebase. The GitHub page action will read the refreshed page built results and the GitHub page will be updated accordingly.\r\n```powershell\r\nsphinx-apidoc -f -o docs/source .\\MITREAttackScrapper\\\r\n./docs/make.bat html\r\n```\r\n\r\n## Coverage\r\n- **TECHNIQUES**\r\n - [x] MITRE ATT&CK Enterprise Techniques\r\n - [ ] MITRE ATT&CK Mobile Techniques\r\n - [ ] MITRE ATT&CK ICS Techniques\r\n- **TACTICS**\r\n - [x] MITRE ATT&CK Enterprise Tactics\r\n - [ ] MITRE ATT&CK Mobile Tactics\r\n - [ ] MITRE ATT&CK ICS Tactics\r\n- **CTI**\r\n - [x] MITRE ATT&CK CTI Groups\r\n - [x] MITRE ATT&CK CTI Software\r\n - [x] MITRE ATT&CK CTI Campaigns\r\n- **Defenses/Mitigations**\r\n - [x] MITRE ATT&CK Enterprise Mitigations(Defenses)\r\n - [ ] MITRE ATT&CK Mobile Mitigations(Defenses)\r\n - [ ] MITRE ATT&CK ICS Mitigations(Defenses)\r\n- **ATT&CK MATRICES**\r\n - [x] MITRE ATT&CK Enterprise Matrices\r\n - [ ] MITRE ATT&CK Mobile Matrices\r\n - [ ] MITRE ATT&CK ICS Matrices\r\n",
"bugtrack_url": null,
"license": null,
"summary": "A package for conveniently retrieving MITRE ATT&CK data",
"version": "0.1.5",
"project_urls": {
"Homepage": "https://github.com/KnightChaser/MITREAttackScrapper"
},
"split_keywords": [],
"urls": [
{
"comment_text": "",
"digests": {
"blake2b_256": "fb7f7cdbfd9655fd78816f87679b4cfa282e6e5ac90bf307e7a4941a1f9a8d96",
"md5": "a1218ea48e00dce8b83cfad332ac34d6",
"sha256": "d8d7023e6de049cde658aabc0d74a6784b519efa6e8f3e1db39ecee782a4da29"
},
"downloads": -1,
"filename": "MITREAttackScrapper-0.1.5-py3-none-any.whl",
"has_sig": false,
"md5_digest": "a1218ea48e00dce8b83cfad332ac34d6",
"packagetype": "bdist_wheel",
"python_version": "py3",
"requires_python": ">=3.6",
"size": 29436,
"upload_time": "2024-07-15T05:08:47",
"upload_time_iso_8601": "2024-07-15T05:08:47.523017Z",
"url": "https://files.pythonhosted.org/packages/fb/7f/7cdbfd9655fd78816f87679b4cfa282e6e5ac90bf307e7a4941a1f9a8d96/MITREAttackScrapper-0.1.5-py3-none-any.whl",
"yanked": false,
"yanked_reason": null
},
{
"comment_text": "",
"digests": {
"blake2b_256": "31015d62d5d63a2ab9f913a1da39a31d890e48b143685a408920c0f03401d611",
"md5": "cf65f27455951f097489aa9166d317b2",
"sha256": "9bf4658d5ba9a81ec7d6803576dddc2d44cb0af362ba1db77b8e645671f28b2b"
},
"downloads": -1,
"filename": "MITREAttackScrapper-0.1.5.tar.gz",
"has_sig": false,
"md5_digest": "cf65f27455951f097489aa9166d317b2",
"packagetype": "sdist",
"python_version": "source",
"requires_python": ">=3.6",
"size": 15904,
"upload_time": "2024-07-15T05:08:49",
"upload_time_iso_8601": "2024-07-15T05:08:49.857893Z",
"url": "https://files.pythonhosted.org/packages/31/01/5d62d5d63a2ab9f913a1da39a31d890e48b143685a408920c0f03401d611/MITREAttackScrapper-0.1.5.tar.gz",
"yanked": false,
"yanked_reason": null
}
],
"upload_time": "2024-07-15 05:08:49",
"github": true,
"gitlab": false,
"bitbucket": false,
"codeberg": false,
"github_user": "KnightChaser",
"github_project": "MITREAttackScrapper",
"travis_ci": false,
"coveralls": false,
"github_actions": false,
"lcname": "mitreattackscrapper"
}