pytm Logo

pytm

0
Free
Visit Website

Traditional threat modeling often comes late or not at all, but pytm aims to automate and shift it left, generating Data Flow Diagrams, Sequence Diagrams, relevant threats, and system requirements based on your input and architectural design. It requires Linux/MacOS, Python 3.x, Graphviz, and Java (OpenJDK 10 or 11). To get started, run the example model tm.py to generate report and diagram image files.

FEATURES

ALTERNATIVES

Knowledge base workflow management dashboard for YARA rules and C2 artifacts.

Maltrail is a malicious traffic detection system utilizing blacklists and heuristic mechanisms.

A threat intelligence dissemination layer for open-source security tools with STIX-2 support and plugin-based architecture.

A Linux distribution designed for threat emulation and threat hunting, integrating attacker and defender tools for identifying threats in your environment.

A collection of public YARA signatures for various malware families.

A comprehensive and unrestricted dataset of security incidents for research and decision-making

Check if an IP address was used as a Tor relay on a given date.

ThreatMiner is a threat intelligence portal that aggregates data from various sources and provides contextual information related to indicators of compromise (IOCs).