01Adversary Persona Profiling for targeted and opportunistic threat actors
02Automated Attack Tree construction for visualizing exploitation paths
03Customizable analysis depth ranging from quick audits to expert-level simulations
04Comprehensive Supply Chain analysis for third-party dependency risks
05Direct mapping of system entry points to MITRE ATT&CK techniques
066 GitHub stars