Metadata-Version: 2.1
Name: attackcti
Version: 0.3.4.3
Summary: ATTACK CTI Libary
Home-page: https://github.com/OTRF/ATTACK-Python-Client
Author: Roberto Rodriguez
License: BSD
Description: # ATT&CK Python Client
        
        [![Binder](https://mybinder.org/badge_logo.svg)](https://mybinder.org/v2/gh/OTRF/ATTACK-Python-Client/master)
        [![Open_Threat_Research Community](https://img.shields.io/badge/Open_Threat_Research-Community-brightgreen.svg)](https://twitter.com/OTR_Community)
        [![Open Source Love svg1](https://badges.frapsoft.com/os/v3/open-source.svg?v=103)](https://github.com/ellerbrock/open-source-badges/)
        
        A Python module to access up to date ATT&CK content available in STIX via public TAXII server. This project leverages the python classes and functions of the [cti-python-stix2](https://github.com/oasis-open/cti-python-stix2) and [cti-taxii-client](https://github.com/oasis-open/cti-taxii-client) libraries developed by MITRE.
        
        ## Goals
        
        * Provide an easy way to access and interact with up to date ATT&CK content available in STIX via public TAXII server
        * Allow security analysts to quickly explore ATT&CK content and apply it in their daily operations
        * Allow the integration of ATT&Ck content with other platforms to host up to date information from the framework
        * Help security analysts during the transition from the ATT&CK MediaWiki API to the STIX/TAXII 2.0 API
        * Learn STIX2 and TAXII Client Python libraries
        
        ## Current Status: Production/Stable
        
        The project is currently in a Production/Stable stage, which means that the current main functions are more stable. I would love to get your feedback to make it a better project.
        
        ## Updates
        
        * 11/23/2020 - Added ICS ATT&CK functionality (PRE-ATTACK is deprecated but still available through the library to not break current deployments that leverage it)
        
        ## Resources
        
        * [MITRE CTI](https://github.com/mitre/cti)
        * [OASIS CTI TAXII Client](https://github.com/oasis-open/cti-taxii-client)
        * [OASIS CTI Python STIX2](https://github.com/oasis-open/cti-python-stix2)
        * [MITRE ATT&CK Framework](https://attack.mitre.org/wiki/Main_Page)
        * [ATT&CK MediaWiki API](https://attack.mitre.org/wiki/Using_the_API)
        * [Invoke-ATTACKAPI](https://github.com/Cyb3rWard0g/Invoke-ATTACKAPI)
        * [Mitre-Attack-API](https://github.com/annamcabee/Mitre-Attack-API)
        
        ## Getting Started
        
        [Attackcti Docs](https://attackcti.readthedocs.io/en/latest/)
        
        ### Requirements
        
        Python 3+
        
        ### Installation
        
        You can install it via PIP:
        
        ```
        pip install attackcti
        ```
        
        Or you can also do the following:
        
        ```
        git clone https://github.com/OTRF/ATTACK-Python-Client
        cd ATTACK-Python-Client
        pip install .
        ```
        
        ## Author
        
        * Roberto Rodriguez [@Cyb3rWard0g](https://twitter.com/Cyb3rWard0g)
        
        ## Official Committers
        
        * Jose Luis Rodriguez [@Cyb3rPandaH](https://twitter.com/Cyb3rPandaH)
        
Keywords: threat hunting dfir cti cyber threat intelligence mitre att&ck
Platform: UNKNOWN
Classifier: Development Status :: 5 - Production/Stable
Classifier: Operating System :: OS Independent
Classifier: Topic :: Security
Classifier: License :: OSI Approved :: BSD License
Classifier: Programming Language :: Python :: 3
Classifier: Programming Language :: Python :: 3.3
Classifier: Programming Language :: Python :: 3.4
Classifier: Programming Language :: Python :: 3.5
Classifier: Programming Language :: Python :: 3.6
Classifier: Programming Language :: Python :: 3.7
Classifier: Programming Language :: Python :: 3.8
Description-Content-Type: text/markdown
