1. Home
  2. /
  3. Downloads

IMPORTANT
The Software and every information provided on this Site are covered by a License: click here to access it.
Usage of any material provided implies acceptance of the License.
SOFTWARE IS PROVIDED “AS IS”. NO WARRANTY OF ANY TYPE IS PROVIDED. LIMITED SUPPORT IS PROVIDED.

ATTENTION
Before installing Threats Manager Studio or any Extension, please check the SHA256 hash of the file and the it is signed with a certificate issued to Simone Curzi by Digicert, and that the signature is valid. Do not install anything else.

IMPORTANT
If you have a preview version of Threats Manager Studio v1.5.0, you should remove it and all its Extensions before installing the official release.
Moreover, if you have any previous version of Threats Manager Studio, after installing the new version you will get a number of warnings, telling you that it is not possible to load any Extension due to its signature. This is caused by the renewal of the certificate used to sign the code, which was required because the old one has expired. To fix this, you have to open the Options, and in the Extensions panel you should first remove the certificate from the list, and then click Add Default to replace it. Now you can restart Threats Manager Studio, and the warning should not occur anymore.

The latest version of Threats Manager Studio (TMS), v1.5.2, can be downloaded from the link to the right.
This version of TMS is based on Threats Manager Platform (TMP) v1.5.2.
The SHA256 hash of the distribution file is DC01FF25B7458384EA5313187D217E2405BB392DF5242FC34BA348BBF9D72FCF.
Please refer to the What’s New document for details on fixes and improvements over the previous version.

If you need an introduction to TMS or to the Extensions, please refer to the Learning pages.
Guidance on how to install and configure TMS and the Extensions is available here.

Requirements
– At least 4 GBytes of RAM. 8 GBytes of RAM are recommended.
– A screen with FHD resolution (1920×1080) or better. HD resolution (1280×720) may be workable with some limitations.
– A recent x86 CPU. Intel Core i5 6th generation or better is recommended.
– Windows 10 1809 or later, or Windows 11 RTM or later.
.Net Framework 4.7.2 or later.
– Microsoft Edge WebView2 Runtime, installed automatically. For offline installation, ensure to download the latest version matching your OS Architecture from Webview2 – Microsoft Edge Developer. In most situations, it should be x64.
Download

Most typical Extensions

This section contains a list of the most recommended Extensions, which are typically required. You can find additional Extensions below.

IMPORTANT
Please note that Extensions can be loaded by TMS only if they support the version of TMP used by TMS.
For example, if TMS has been built with TMP v2.4.2, then an Extension supporting TMP in the version range 2.4.0 to 2.4.99 would be loaded and executed. On the contrary, an Extension supporting TMP in the range of 2.3.0 to 2.3.99 would not be loaded.
Initial versions of the Extensions support a specific version of TMP only.

ExtensionSupported TMPRequirementsHashLinks
Automatic Threat Generation1.5.2NoneSHA256
BDF2AB6CD83D5EA44E7A808625768972F023E8EBFEC98BF8FED466BF7AD73A09
Download
Documentation
Quality1.5.2NoneSHA256
DD02F40F34B29004CF4973D188081D9DADCF8DA5BED7C9E72F296DEA826DC1A0
Download
Documentation

Additional Extensions

IMPORTANT
Please note that Extensions can be loaded by TMS only if they support the version of TMP used by TMS.
For example, if TMS has been built with TMP v2.4.2, then an Extension supporting TMP in the version range 2.4.0 to 2.4.99 would be loaded and executed. On the contrary, an Extension supporting TMP in the range of 2.3.0 to 2.3.99 would not be loaded.
Initial versions of the Extensions support a specific version of TMP only.

ExtensionSupported TMPRequirementsHashLinks
DevOps1.5.2Internet connectivity for some functionalitiesSHA256
EAB78E7F0672D20CB86A59E5EAE81351ED907E7438F3AC77A7F15648E463F452
Download
Documentation
Importers and Exporters1.5.2NoneSHA256
1C5EC12939371BB04F3EE0A553465B3F4A31B191D50E03305B4DD751D96834B8
Download
Documentation
MS Threat Modeling Tool Import1.5.2NoneSHA256
2DFF87C391A1F1F35B4A003CB779336C84577D60903600AD9668B8A158172409
Download
Documentation
Quantitative Risk1.5.2NoneSHA256
E270570E85FA376E53CB23F0F27BD5D99A657D1C9C126B219A64FEA20CA3C226
Download
Documentation

Additional Tools

TMS allows creating Microsoft Word reports from curated DOCX or DOTX Templates.
To create those templates, it is possible to use a Microsoft Word Add-In, which can be installed from the link at the right.
The SHA256 hash of the installation file is 2104F2FC5A44BA55553F80AFAFA04643665F3EAA08297DD9FF723ABBFF91545E.

Requirements
– The same as Microsoft Word.
Download
Command-line tool to perform massive migration of Microsoft Threat Modeling Tool files.
To execute it, extract the content of the archive and then execute TMTImport.exe passing as an argument the path of the folder containing the files to be migrated.
The SHA256 hash of the archive is 0D2FFF75231457ABD2576E65D26EC851D6447CA0FE801EB6786D74878E59951A.
Note: the archive is not signed.

Requirements
.Net Core 3.1 or later.
– Tested on Windows 10 and Windows 11. Tests on Linux systems are in progress.
Download