Skip to content

A Tauri-based desktop app for MITRE's ATT&CK Navigator cybersecurity framework.

License

Notifications You must be signed in to change notification settings

Athena-OS/mitre-attack-navigator

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 

History

10 Commits
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 

๐Ÿ›ก๏ธ MITRE ATT&CK Navigator

Native Desktop Application with Offline Support

Built with Tauri Angular Frontend STIX Support Cross Platform

๐Ÿ”— Download Latest Release


๐Ÿ“– Overview

This is a native desktop application built with Tauri and Angular, based on the Official MITRE ATT&CK Navigator. It provides complete offline support for both STIX 2.0 and STIX 2.1 datasets.

๐Ÿ’ก The datasets are included as submodules to ensure we can keep the data up-to-date in the future.

โœจ Features

  • ๐Ÿ–ฅ๏ธ Native Desktop Experience - Built with Tauri for performance and security
  • ๐Ÿ“ฑ Cross-Platform - Runs on Windows, macOS, and Linux
  • ๐Ÿ”Œ Offline Support - Complete functionality without internet connection
  • ๐Ÿ“Š STIX 2.0 & 2.1 Support - Latest MITRE ATT&CK data formats
  • ๐ŸŽจ Modern UI - Clean Angular-based interface
  • ๐Ÿ”„ Auto-Updates - Easy dataset synchronization

๐Ÿš€ Quick Start

Prerequisites

  • Node.js (v16 or later)
  • npm or yarn
  • Rust (for Tauri development)
  • webkit2gtk

๐Ÿ“ฅ Installation

Option 1: Download Binary (Recommended)

๐Ÿ“ฆ Download the latest release for your platform.

Option 2: Build from Source

  1. Clone the repository with submodules:

    git clone https://github.com/Athena-OS/mitre-attack-navigator.git --recursive
    cd mitre-attack-navigator
  2. Install dependencies: The following building dependencies are needed:

    cargo
    npm
    pkg-config
    

    The following runtime dependency is needed:

    openssl
    webkit2gtk
    

    Then, run

    npm install
  3. Run in development mode:

    npm run tauri dev
  4. Build for production:

    npm run tauri build

    if you want to get AppImage, .deb and .rpm files, and the binary or

    npm run tauri build -- --no-bundle

    to get only the binary.

๐Ÿ”„ Keeping Data Up-to-Date

To sync the latest MITRE ATT&CK datasets:

git pull
git submodule update --recursive --remote

Learn How ATT&CK Navigator Works

Watch the video

About the MITRE ATT&CKยฎ Framework

The MITRE ATT&CKยฎ framework is a publicly accessible knowledge base describing adversary tactics, techniques, and procedures (TTPs) observed in real-world cyber incidents and attributed threat groups. Developed by The MITRE Corporation, it is designed to improve understanding of how cyber attacks are carried out, enabling both defensive and offensive security teams to better prepare for and respond to threats.

  • Meaning of ATT&CK: The name stands for Adversarial Tactics, Techniques, and Common Knowledge.
  • Purpose and Scope: ATT&CK acts as a reference model for classifying and analyzing adversary behavior, mapping out the phases of an attack lifecycle and identifying the tools, platforms, and operating systems targeted.
  • Use Cases:
    • Offensive Security & Adversary Simulation
      • Red Teams / Penetration Testers โ€“ create realistic attack scenarios to test defenses.
      • Adversary Emulation โ€“ replicate known threat actor TTPs for security testing.
      • Purple Teams โ€“ collaborate across offensive and defensive teams to improve detection and mitigation.
    • Defensive Operations
      • Blue Teams / SOC Analysts โ€“ detect, investigate, and respond to attacks using ATT&CK mappings.
      • Threat Hunters โ€“ proactively search for attacker activity aligned to specific techniques.
      • Incident Responders โ€“ map attacker actions to ATT&CK for better incident analysis.
    • Cyber Threat Intelligence (CTI)
      • Threat Actor Profiling โ€“ associate known TTPs with specific APT groups.
      • Campaign Analysis โ€“ track and compare attacker behaviors over time.
      • Threat Modeling โ€“ prioritize defenses based on adversary capabilities and patterns.
    • Security Architecture & Risk Management
      • Gap Analysis โ€“ identify where security controls do not cover certain ATT&CK techniques.
      • Security Control Mapping โ€“ align EDR, firewall, and detection capabilities to specific techniques.
      • Risk Assessment โ€“ measure exposure to techniques most relevant to your industry.
    • Training & Education
      • Security Awareness Training โ€“ explain attack methods in a structured, relatable way.
      • SOC Analyst Training โ€“ practice detecting and responding to techniques in lab environments.
      • University / Research Programs โ€“ study attacker methodology for academic purposes.
    • Tool & Product Evaluation
      • Security Product Benchmarking โ€“ evaluate tools (e.g., EDR, IDS) against known ATT&CK techniques.
      • MITRE ATT&CK Evaluations Participation โ€“ test vendor products in simulated threat scenarios.
      • Automation โ€“ integrate ATT&CK mappings into dashboards, SIEMs, and threat intelligence platforms.
    • Policy, Compliance & Reporting
      • Executive Reporting โ€“ communicate security posture in business terms using ATT&CK categories.
      • Regulatory Alignment โ€“ map ATT&CK to frameworks like NIST, ISO 27001, or CIS Controls.
      • Post-incident Lessons Learned โ€“ report incidents using standardized ATT&CK terminology.

Tactics, Techniques & Procedures (TTPs)

  • Tactics define the adversaryโ€™s tactical objectives โ€” the โ€œwhyโ€ behind each step of their attack methodology.
  • Techniques explain โ€œhowโ€ those tactical objectives are achieved.
  • Sub-techniques give detailed descriptions of specific variations of a technique.
  • Procedures document real-world examples of how a technique or sub-technique has been executed.

Why ATT&CK?

  • Provides a shared, standardized reference for adversary behavior based on real-world attack analysis and threat campaigns.
  • Organizes and contextualizes adversary actions across the full attack lifecycle.
  • Uses consistent terminology when describing TTPs and APT groups.
  • Is continuously updated to reflect evolving threats and new intelligence.

ATT&CKยฎ is a registered trademark of The MITRE Corporation.

About

A Tauri-based desktop app for MITRE's ATT&CK Navigator cybersecurity framework.

Resources

License

Code of conduct

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 2

  •  
  •