pytm Logo

pytm

0
Free
Visit Website

Traditional threat modeling often comes late or not at all, but pytm aims to automate and shift it left, generating Data Flow Diagrams, Sequence Diagrams, relevant threats, and system requirements based on your input and architectural design. It requires Linux/MacOS, Python 3.x, Graphviz, and Java (OpenJDK 10 or 11). To get started, run the example model tm.py to generate report and diagram image files.

FEATURES

ALTERNATIVES

Nessus efficiently scans for system vulnerabilities, misconfigurations, and compliance issues.

Knowledge base workflow management dashboard for YARA rules and C2 artifacts.

Automatically curate open-source Yara rules and run scans with YAYA.

C# wrapper around Yara pattern matching library with Loki and Yara signature support.

IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol, with a focus on incident handling automation and threat intelligence processing.

A collection of Yara rules licensed under the DRL 1.1 License.

Collection of Yara rules for file identification and classification

SecurityTrails API provides access to a vast repository of historical DNS lookups, WHOIS records, hostnames, and domains for cyber forensics and investigations.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved