1. Home
  2. /
  3. Downloads

IMPORTANT
The Software and every information provided on this Site are covered by a License: click here to access it.
Usage of any material provided implies acceptance of the License.
SOFTWARE IS PROVIDED “AS IS”. NO WARRANTY OF ANY TYPE IS PROVIDED. LIMITED SUPPORT IS PROVIDED.

ATTENTION
Before installing Threats Manager Studio or any Extension, please check the SHA256 hash of the file and the it is signed with a certificate issued to Simone Curzi by Digicert, and that the signature is valid. Do not install anything else.

The latest version of Threats Manager Studio (TMS), v2.1.1, can be downloaded from the link to the right.
This version of TMS is based on Threats Manager Platform (TMP) v2.1.1.
The SHA256 hash of the distribution file is E41C2F38BE6FBD6E72FA8F7E3B0BB1DA5DBE367B743E00D15CD8B6AA1D4B2789.
Please refer to the What’s New document for details on fixes and improvements over the previous version.

If you need an introduction to TMS or to the Extensions, please refer to the Learning pages.
Guidance on how to install and configure TMS and the Extensions is available here.

The SBOM for the latest version of Threats Manager Platform is available here.
The SBOM for the latest version of Threats Manager Studio is available here.

Requirements
– At least 4 GBytes of RAM. 8 GBytes of RAM are recommended.
– A screen with FHD resolution (1920×1080) or better. HD resolution (1280×720) may be workable with some limitations.
– A recent x86 CPU. Intel Core i5 6th generation or better is recommended.
– Windows 10 1809 or later, or Windows 11 RTM or later.
– Internet connectivity.

The following requirements will be automatically installed if you do not have them:
.Net Framework 4.8.1 or later.
– Microsoft Edge WebView2 Runtime, installed automatically. For offline installation, download the latest version matching your OS Architecture from Webview2 – Microsoft Edge Developer. In most situations, it should be x64.
Download
Threats Manager Studio is also available as a portable distribution.
It contains most of the same capabilities in a package that can be extracted anywhere and can be executed without the need to install anything.
The main differences between the installed portable and the normal distributions are:
– The portable distribution does not have integrated guidance.
– The portable distribution does include the following extension libraries: Auto Threat Gen, MS TMT Import, and Quality. The other extension libraries are supported but must be installed and configured.
– The same requirements of the normal distribution apply, but Internet connectivity is not required for the portable distribution.
The SHA256 hash of the distribution file is EF648939B5D3310657B58D045B3B22F1397C0CE4C5A4FF59F578B94210794017.

IMPORTANT
Remember to Unblock the ZIP file before extracting its content. You can do that from its Properties. You can also use the PowerShell command Unblock-File.
Download

Most typical Extensions

This section contains a list of the most recommended Extensions, which are typically required. You can find additional Extensions below.

IMPORTANT
Please note that Extensions can be loaded by TMS only if they support the version of TMP used by TMS.
For example, if TMS has been built with TMP v2.4.2, then an Extension supporting TMP in the version range 2.4.0 to 2.4.99 would be loaded and executed. On the contrary, an Extension supporting TMP in the range of 2.3.0 to 2.3.99 would not be loaded.
Initial versions of the Extensions support a specific version of TMP only.

ExtensionSupported TMPRequirementsHashLinks
Automatic Threat Generation2.1.1NoneSHA256
3F083D85A908A8FE692B9B21F2E56A0CA94038FBAE038346DCC0D5C93FF1C143
Download
Documentation
Quality2.1.1NoneSHA256
A8803820927313E811891E523AE49C25834869427C88D3832FA212099B1F9147
Download
Documentation

Additional Extensions

IMPORTANT
Please note that Extensions can be loaded by TMS only if they support the version of TMP used by TMS.
For example, if TMS has been built with TMP v2.4.2, then an Extension supporting TMP in the version range 2.4.0 to 2.4.99 would be loaded and executed. On the contrary, an Extension supporting TMP in the range of 2.3.0 to 2.3.99 would not be loaded.
Initial versions of the Extensions support a specific version of TMP only.

ExtensionSupported TMPRequirementsHashLinks
DevOps2.1.1Internet connectivity for some functionalitiesSHA256
8B6E48BAF71B338435828C0F2950972C52D7768B6F05E590AB82980F4945C2B8
Download
Documentation
MS Threat Modeling Tool Import2.1.1NoneSHA256
804DD168C810DFC97C3853DD938E396CE56CE6FBD233F36BD6764DF94A4383FD
Download
Documentation

Additional Tools

TMS allows creating Microsoft Word reports from curated DOCX or DOTX Templates.
To create those templates, it is possible to use a Microsoft Word Add-In, which can be installed from the link at the right.
The SHA256 hash of the installation file is 2104F2FC5A44BA55553F80AFAFA04643665F3EAA08297DD9FF723ABBFF91545E.

Requirements
– The same as Microsoft Word.
Download
Command-line tool to perform massive migration of Microsoft Threat Modeling Tool files.
To execute it, extract the content of the archive and then execute TMTImport.exe passing as an argument the path of the folder containing the files to be migrated.
The SHA256 hash of the archive is 0D2FFF75231457ABD2576E65D26EC851D6447CA0FE801EB6786D74878E59951A.
Note: the archive is not signed.

Requirements
.Net Core 3.1 or later.
– Tested on Windows 10 and Windows 11. Tests on Linux systems are in progress.
NOT YET AVAILABLE FOR THE NEW VERSION OF THE ENGINE