pytm Logo

pytm

0
Free
Updated 11 March 2025
Visit Website

Traditional threat modeling often comes late or not at all, but pytm aims to automate and shift it left, generating Data Flow Diagrams, Sequence Diagrams, relevant threats, and system requirements based on your input and architectural design. It requires Linux/MacOS, Python 3.x, Graphviz, and Java (OpenJDK 10 or 11). To get started, run the example model tm.py to generate report and diagram image files.

FEATURES

EXPLORE BY TAGS

SIMILAR TOOLS

Repository of YARA rules for identifying and classifying malware.

A command-line tool that fetches known URLs from various sources to identify potential security threats and vulnerabilities.

A collection of APT and cybercriminals campaigns with various resources and references.

Knowledge base workflow management dashboard for YARA rules and C2 artifacts.

Public access to Indicators of Compromise (IoCs) and other data for readers of Security Scorecard's technical blog posts and reports.

Parse IOCs from text

A simple, self-contained modular host-based IOC scanner for incident responders.

A mapping tool that correlates MITRE ATT&CK techniques with atomic tests and detection rules to analyze security detection coverage.

Automatically create yara rules based on images embedded in office documents.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved