1. Home
  2. /
  3. Downloads

IMPORTANT
The Software and every information provided on this Site are covered by a License: click here to access it.
Usage of any material provided implies acceptance of the License.
SOFTWARE IS PROVIDED “AS IS”. NO WARRANTY OF ANY TYPE IS PROVIDED. LIMITED SUPPORT IS PROVIDED.

ATTENTION
Before installing Threats Manager Studio or any Extension, please check the SHA256 hash of the file and the it is signed with a certificate issued to Simone Curzi by Digicert, and that the signature is valid. Do not install anything else.

IMPORTANT
If you have a preview version of Threats Manager Studio v1.5.0, you should remove it and all its Extensions before installing the official release.
Moreover, if you have any previous version of Threats Manager Studio, after installing the new version you will get a number of warnings, telling you that it is not possible to load any Extension due to its signature. This is caused by the renewal of the certificate used to sign the code, which was required because the old one has expired. To fix this, you have to open the Options, and in the Extensions panel you should first remove the certificate from the list, and then click Add Default to replace it. Now you can restart Threats Manager Studio, and the warning should not occur anymore.

The latest version of Threats Manager Studio (TMS), v1.5.0, can be downloaded from the link to the right.
This version of TMS is based on Threats Manager Platform (TMP) v1.5.0.
The SHA256 hash of the distribution file is F20E46DC03EC7FFFE33005C351E4698D83F2AB580F301A43EAD496135ABDBA1F.
Please refer to the What’s New document for details on fixes and improvements over the previous version.

If you need an introduction to TMS or to the Extensions, please refer to the Learning pages.
Guidance on how to install and configure TMS and the Extensions is available here.

Requirements
– At least 4 GBytes of RAM. 8 GBytes of RAM are recommended.
– A screen with FHD resolution (1920×1080) or better. HD resolution (1280×720) may be workable with some limitations.
– A recent x86 CPU. Intel Core i5 6th generation or better is recommended.
– Windows 10 1809 or later, or Windows 11 RTM or later.
.Net Framework 4.7.2 or later.
– Microsoft Edge WebView2 Runtime, installed automatically. For offline installation, ensure to download the latest version matching your OS Architecture from Webview2 – Microsoft Edge Developer. In most situations, it should be x64.
Download

Most typical Extensions

This section contains a list of the most recommended Extensions, which are typically required. You can find additional Extensions below.

IMPORTANT
Please note that Extensions can be loaded by TMS only if they support the version of TMP used by TMS.
For example, if TMS has been built with TMP v2.4.2, then an Extension supporting TMP in the version range 2.4.0 to 2.4.99 would be loaded and executed. On the contrary, an Extension supporting TMP in the range of 2.3.0 to 2.3.99 would not be loaded.
Initial versions of the Extensions support a specific version of TMP only.

ExtensionSupported TMPRequirementsHashLinks
Automatic Threat Generation1.5.0NoneSHA256
4B50BEE1A08E25F0FE2780A052C7AC0761EAD09A3874E53FC3237084883A775D
Download
Documentation
Quality1.5.0NoneSHA256
88DC6B0F88195D42424E7BE1B5800BCDA430DAE53A4CA99EFF3A065601C24221
Download
Documentation

Additional Extensions

IMPORTANT
Please note that Extensions can be loaded by TMS only if they support the version of TMP used by TMS.
For example, if TMS has been built with TMP v2.4.2, then an Extension supporting TMP in the version range 2.4.0 to 2.4.99 would be loaded and executed. On the contrary, an Extension supporting TMP in the range of 2.3.0 to 2.3.99 would not be loaded.
Initial versions of the Extensions support a specific version of TMP only.

ExtensionSupported TMPRequirementsHashLinks
DevOps1.5.0Internet connectivity for some functionalitiesSHA256
1F0432FD7C49653BCFCCEFC79CC9E013736AAF787041766F5BF55E928D488398
Download
Documentation
Importers and Exporters1.5.0NoneSHA256
7D02CD30F44F98D8B08A4A4BFC68F8FDB659985F9A4B9AE252C84A513DD92695
Download
Documentation
MS Threat Modeling Tool Import1.5.0NoneSHA256
6946CF9146B0A10AC6013E03226D899A85C67FF85C1368409972E10D785876C9
Download
Documentation

Additional Tools

TMS allows creating Microsoft Word reports from curated DOCX or DOTX Templates.
To create those templates, it is possible to use a Microsoft Word Add-In, which can be installed from the link at the right.
The SHA256 hash of the installation file is C587A29CB261212E47E767B10A3201FBE422E23474E09E7A443E93562F856F17.

Requirements
– The same as Microsoft Word.
Download
Command-line tool to perform massive migration of Microsoft Threat Modeling Tool files.
To execute it, extract the content of the archive and then execute TMTImport.exe passing as an argument the path of the folder containing the files to be migrated.
The SHA256 hash of the archive is 1C7DF234715EB718774F8778B91937C709EBD710A1692AC3F3721D2134624379.
Note: the archive is not signed.

Requirements
.Net Core 3.1 or later.
– Tested on Windows 10. Tests on Linux systems are in progress.
Download