pytm Logo

pytm

0
Free
Visit Website

Traditional threat modeling often comes late or not at all, but pytm aims to automate and shift it left, generating Data Flow Diagrams, Sequence Diagrams, relevant threats, and system requirements based on your input and architectural design. It requires Linux/MacOS, Python 3.x, Graphviz, and Java (OpenJDK 10 or 11). To get started, run the example model tm.py to generate report and diagram image files.

FEATURES

ALTERNATIVES

Repository of APT-related documents and notes sorted by year.

A comprehensive list of IP addresses for cybersecurity purposes, including threat intelligence, incident response, and security research.

A tool for navigating and annotating ATT&CK matrices with the ability to define custom layers for specific views.

Akamai Hunt is a managed threat hunting service that detects and remediates evasive security risks in network environments using data analysis, AI, and expert investigation.

A project that detects malicious SSL connections by identifying and blacklisting SSL certificates used by botnet C&C servers and identifying JA3 fingerprints to detect and block malware botnet C&C communication.

Platform for the latest threat intelligence information

AbuseIPDB offers tools and APIs to report and check abusive IPs, enhancing network security.

Stay informed with Rapid7's cybersecurity blog and vulnerability news updates.