Query and retrieve information about various adversarial tactics and techniques used in cyber attacks. Access a comprehensive knowledge base to enhance your understanding of security risks and adversary behaviors. Utilize the provided tools to efficiently explore ATT&CK techniques and tactics.
Cross-referenced across 55 tracked directories
#18726
Popularity Rank
1 / 55
Listed In
Emerging
Adoption Stage
4/12/2025
First Seen
Recently added to the ecosystem
Acacian
Credential isolation proxy for AI agents. Injects API keys at the network boundary so your agent never sees the raw credential. Supports domain allowlists, agent auth, policy enforcement, and audit logging.
...more59b9f352-8cdc-44d3-9dd9-db3bfa521880
No description available
Jeremiah Lowin
The fast, Pythonic way to build MCP servers and clients.
grafana
🎖️ 🐍 🏠 ☁️ - Search dashboards, investigate incidents and query datasources in your Grafana instance