OWASP Threat Dragon version 2.4

Installation

Threat Dragon comes in two variants, a desktop application and a web application.

Web application

The web application can be run locally or from a server, and is downloaded from the Threat Dragon repo. There is some configuration necessary, so see the install instructions for configuring the application.

The web application is also provided in a Docker image, and this is provided by dockerhub. Follow the Docker instructions to download, configure and run a Docker container.

Desktop application

Various installers can be downloaded from the Threat Dragon releases area:

  • Windows (64 bit) executable / installer
  • MacOS installers (.dmg) for X86 and Apple silicon
  • Linux AppImage used for most Linux distributions and hardware platforms
  • Linux Snap image is available from the official snapcraft distribution
  • Package .rpm for Red Hat Linux, AIX, CentOS, Fedora
  • Package .deb for debian based Linux such as Ubuntu, Trisqel and Debian itself

See the desktop install instructions.


Threat Dragon: making threat modeling less threatening