As part of our research for a presentation on threat modeling automation and tooling, we examined the available threat modeling tools and compiled the list below to share publicly. This directory focuses exclusively on Threat Modeling Tools—software, code, libraries, or services that automate, guide, or support the design-time threat modeling process.
We plan to add more information over the next few months, including tool types, licenses, descriptions, and the core methodology used.
The threat modeling process is a continuous, design-time activity applied throughout the system development lifecycle. As defined in the Threat Modeling Manifesto, this involves analyzing system representations to highlight security and privacy concerns.
The primary requirement for inclusion is that the tool must be an actual application, library, or service that performs work. Specifically, it must be:
- Software, Code, Library, or Service: An executable artifact.
- Automating, Guiding, or Supporting: Must facilitate the design-time threat modeling process.
Important Distinction: Threat Modeling Tools are focused on design-time analysis, guiding architectural risk mitigation.
- We exclude Threat Intelligence and Threat Hunting tools as they are operational activities focused on the external threat environment or active intrusions in live systems.
- Not Solely a Methodology or Framework: Conceptual guides are excluded.
We welcome contributions to expand and enhance this list! If you have any additional tools you believe should be listed here, please open a pull request or an issue on this repository. Feel free to reach out to us on the Toreon Threat Modeling Page for questions or further discussion.