1. Home
  2. /
  3. Downloads

IMPORTANT
The Software and every information provided on this Site are covered by a License: click here to access it.
Usage of any material provided implies acceptance of the License.
SOFTWARE IS PROVIDED “AS IS”. NO WARRANTY OF ANY TYPE IS PROVIDED. LIMITED SUPPORT IS PROVIDED.

ATTENTION
Before installing Threats Manager Studio or any Extension, please check the SHA256 hash of the file and the it is signed with a certificate issued to Simone Curzi by Digicert, and that the signature is valid. Do not install anything else.

The latest version of Threats Manager Studio (TMS), v1.4.2, can be downloaded from the link to the right.
This version of TMS is based on Threats Manager Platform (TMP) v1.4.2.
The SHA256 hash of the distribution file is BD28225172FC7565A489B0F31D07D22911B72724B6F6F205A9CC9C7746BCE620.
Please refer to the What’s New document for details on fixes and improvements over the previous version.

If you need an introduction to TMS or to the Extensions, please refer to the Learning pages.
Guidance on how to install and configure TMS and the Extensions is available here.

Requirements
– At least 4 GBytes of RAM. 8 GBytes of RAM are recommended.
– A screen with FHD resolution (1920×1080) or better. HD resolution (1280×720) may be workable with some limitations.
– A recent x86 CPU. Intel Core i5 6th generation or better is recommended.
– Windows 10 1809 or later.
.Net Framework 4.7.2 or later.
– Microsoft Edge WebView2 Runtime, installed automatically. For offline installation, ensure to download the latest version matching your OS Architecture from Webview2 – Microsoft Edge Developer. In most situations, it should be x64.
Download

Extensions

IMPORTANT
Please note that Extensions can be loaded by TMS only if they support the version of TMP used by TMS.
For example, if TMS has been built with TMP v2.4.2, then an Extension supporting TMP in the version range 2.4.0 to 2.4.99 would be loaded and executed. On the contrary, an Extension supporting TMP in the range of 2.3.0 to 2.3.99 would not be loaded.
Initial versions of the Extensions support a specific version of TMP only.

ExtensionSupported TMPRequirementsHashLinks
Automatic Threat Generation1.4.2NoneSHA256
AF3DCEC89C5B3B5FB0C1148F129ADE4B70D54F37C9DC3888B05CA2EA15A0E56D
Download
Documentation
DevOps1.4.2Internet connectivity for some functionalitiesSHA256
50600CFC2D10F7A106ED345FB653648AE9BF6BD535E25ACA1AA9F6E29664FA9D
Download
Documentation
Importers1.4.2NoneSHA256
EB2B149987078A592CC8090C3B459547F9735BF04CA4E2A09F32C817D3A95468
Download
Documentation
MS Threat Modeling Tool Import1.4.2NoneSHA256
027ABAF516E69496E7DB92966F3A47FAFF04B14537CB7BFE369B3D194AC7C00D
Download
Documentation
Quality1.4.2NoneSHA256
C27665C71224DF93838BF9E057D268CBC0AE5C93CF9685F00BA10729EB395494
Download
Documentation

Additional Tools

TMS allows creating Microsoft Word reports from curated DOCX or DOTX Templates.
To create those templates, it is possible to use a Microsoft Word Add-In, which can be installed from the link at the right.
The SHA256 hash of the installation file is 536CE2D4045A3ADFA27F89557B8AC1784A63D41C6BEEF5E315B9CD5182522DD4.

Requirements
– The same as Microsoft Word.
Download
Command-line tool to perform massive migration of Microsoft Threat Modeling Tool files.
To execute it, extract the content of the archive and then execute TMTImport.exe passing as an argument the path of the folder containing the files to be migrated.
The SHA256 hash of the archive is C2F897F79B8193B080E322B826D97F56F4FB093814CA57AF8C9A260CD042E7C9.
Note: the archive is not signed.

Requirements
.Net Core 3.1 or later.
– Tested on Windows 10. Tests on Linux systems are in progress.
Download