
Teams today often face a difficult trade-off:
Using whiteboards or simple diagramming tools that don't scale or integrate with code.
Using powerful commercial platforms that are locked behind high licensing fees.
We provide an open foundation that supports enterprise scale without sacrificing accessibility or developer freedom.
Nested components, trust zones, trust boundaries. Built on React Flow.
MITRE ATT&CK, CAPEC, LINDDUN, STRIDE. Packs for AWS, Azure, GCP, banking.
Import/export TM-BOM JSON. No vendor lock-in.
DORA, CRA, ASVS, NIST CSF, SOC 2 traceability.
REST API + OpenAPI docs. Foundation for AI assistants.
Workspace-based threat modeling with real-time collaboration.
Scale threat modeling across your org.
Build AI assistants on a structured CRUD foundation. REST API + OpenAPI included.
Deliver workshops with reference images, collaboration, structured programs.
Link threat models to ASVS, CRA, DORA, NIST CSF, SOC 2.
git clone https://github.com/precogly/precogly.git cd precogly docker compose up --build
Open http://localhost:5173 and log in with admin@precogly.dev / admin123
Don't just consume the tools. Build them. We're inviting select security engineers to define the primitives of the next generation of threat modeling.
Equip your consultancy with the industry's first open-source, enterprise-grade threat modeling platform. Be the first to bring a modern, AI-ready alternative to your clients.
Platform publicly available on GitHub under Apache 2.0.
AWS, Azure, GCP, banking, and compliance packs available.
Growing contributor ecosystem and partner network.
Native AI assistant workflows and enhanced API capabilities.
Yes. Released under Apache 2.0. Full source on GitHub.
Precogly is compliance-aware out of the box, ships with structured library packs (MITRE ATT&CK, STRIDE, LINDDUN, and more), includes a full REST API for automation and AI agents, and has no licensing fees. It fills the gap between ad-hoc open tools and expensive commercial platforms.
Vikramaditya - Threat Modeling Connect Chapter Lead (Bangalore) and an experienced developer. Advised by senior practitioners from Fortune 500 enterprises.
Docker and Docker Compose. Clone the repo, run docker compose up --build, and open localhost:5173. Three commands to a running instance.
Absolutely. We welcome contributions to the core platform, library packs, documentation, and bug reports. Head to GitHub to get started.
MITRE ATT&CK, CAPEC, LINDDUN, STRIDE for threat identification. DORA, CRA, ASVS, NIST CSF, and SOC 2 for compliance mapping. More packs are added by the community.