Add & Manage

Add, rename, or delete entities here.

Attackers

Attacker targets

Vulnerabilities

Configuration & Exploration


Attacker selection

Choose the current attacker.

Attacker entry points

Select targets that act as entry points for the attacker.

Attacker exit points

Select targets that act as exit points for the attacker.

Vulnerabilities

Pick an element, then select/unselect the vulnerabilities to associate.

Links between targets


—

Results

Tutorial

  1. Add attackers, targets, and vulnerabilities in the left panel.
  2. Select the current attacker from “Attacker selection”.
  3. Choose attacker entry points, then use “Clear selection” if needed.
  4. Choose attacker exit points, then use “Clear selection” if needed.
  5. Select an element and pick vulnerabilities to associate; use “Clear selection” to reset.
  6. Configure links between targets; use “Clear selection” to reset the link pickers.
  7. Adjust path visibility (include lateral/contains) using the checkboxes.
  8. Click “Compute paths” to generate results.
  9. Select a path to view the attack diagram.
  10. Use the playback controls to play, pause, stop, restart, step back, or step forward the simulation.
  11. Export data as needed (JSON/ODS).

Ă—1.0


Attack diagram

Select a path → Diagram
—