Skip to content

This directory focuses exclusively on Threat Modeling Tools—software, code, libraries, or services that automate, guide, or support the design-time threat modeling process.

Notifications You must be signed in to change notification settings

Toreon/Threat-Modeling-Tool-Directory

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 

Repository files navigation

🛡️ Toreon Threat Modeling Tool Directory

🎯 Purpose and Scope

As part of our research for a presentation on threat modeling automation and tooling, we examined the available threat modeling tools and compiled the list below to share publicly. This directory focuses exclusively on Threat Modeling Tools—software, code, libraries, or services that automate, guide, or support the design-time threat modeling process.

🛠️ Threat Modeling Tools List

We plan to add more information over the next few months, including tool types, licenses, descriptions, and the core methodology used.

Tool Released
ADTool 2013
Adversarial Robustness Toolbox (ART) 2018
Agent Wiz 2024
AI Security Analyzer 2024
Aribot 2023
Arrows 2025
AttackTree 2018
Attack Tree GPT 2024
AttackTree.online 2023
AT-AT 2022
CAIRIS 2012
CyberSage 2023
Deciduous 2021
Devici 2023
Dragon-GPT 2023
Ent 2016
ForkTM 2023
Gram 2023
IriusRisk 2016
itemis SECURE 2020
Threat Modeling GPTs - example 2024
Microsoft Threat Modeling Tool 2008
OVVL (Open Weakness & Vulnerability Modeler) 2018
PILLAR 2024
Prime 2024
PyTM 2018
Raindance 2019
RiskTree 2014
SAP Threat Modeling Tool 2024
SD Elements 2011
SeaMonster 2007
SeaSponge 2014
securiCAD 2014
SecurITree 2001
securityreview.ai 2025
Seezo.io 2024
SPARTA 2018
StartLeft 2021
STRIDE GPT 2023
TaaC-AI 2023
td-ai-modeler 2025
Threagile 2020
Threat Composer 2023
Threat Designer 2025
Threat Dragon 2015
ThreatCanvas 2023
Threatcl 2021
ThreatModeler 2010
ThreatPad 2025
ThreatPlaybook 2018
Threats Manager Studio 2020
Threatspec 2019
Threatware 2022
TicTaaC 2021
Tutamen Threat Model Automator 2015

📖 Methodology and Inclusion Criteria

The threat modeling process is a continuous, design-time activity applied throughout the system development lifecycle. As defined in the Threat Modeling Manifesto, this involves analyzing system representations to highlight security and privacy concerns.

✅ Inclusion Criteria

The primary requirement for inclusion is that the tool must be an actual application, library, or service that performs work. Specifically, it must be:

  1. Software, Code, Library, or Service: An executable artifact.
  2. Automating, Guiding, or Supporting: Must facilitate the design-time threat modeling process.

🚫 Exclusions (What is NOT a Threat Modeling Tool?)

Important Distinction: Threat Modeling Tools are focused on design-time analysis, guiding architectural risk mitigation.

  1. We exclude Threat Intelligence and Threat Hunting tools as they are operational activities focused on the external threat environment or active intrusions in live systems.
  2. Not Solely a Methodology or Framework: Conceptual guides are excluded.

🤝 Contributing and Contact

We welcome contributions to expand and enhance this list! If you have any additional tools you believe should be listed here, please open a pull request or an issue on this repository. Feel free to reach out to us on the Toreon Threat Modeling Page for questions or further discussion.

About

This directory focuses exclusively on Threat Modeling Tools—software, code, libraries, or services that automate, guide, or support the design-time threat modeling process.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published