01Hierarchical attack path visualization using AND/OR logic nodes
02Granular attribute tracking for attack cost, time, and expertise required
03Automated path analysis to find easiest, cheapest, or stealthiest attack routes
04Mitigation mapping to identify and track unaddressed security vulnerabilities
05Exportable Python data models and JSON serialization for security documentation
0623,194 GitHub stars