DOWNLOAD CONTEXTCYPHER
Get started with ContextCypher - the AI-powered threat modeling platform. Install via npm, run instantly in SaaS, or work from the new open source repository.
INSTALL VIA NPM
The recommended way to install ContextCypher
npm install -g @threatvectorsecurity/contextcypher✓ Easy installation and updates
✓ Works on Windows, macOS, and Linux
✓ No manual download required
OPEN SOURCE REPOSITORY
The ContextCypher core application is now open source on GitHub under Apache 2.0. npm installation and the hosted SaaS experience remain available.
OSS Links
Quick Start from Source
git clone https://github.com/Threat-Vector-Security/contextcypher.gitcd contextcypher && npm install && cd server && npm install && cd ..See the Guide for a full open source setup and contribution walkthrough.
INSTANT ACCESS•NO INSTALL REQUIRED
Just want to check it out? Try the hosted version right now:
🚀LAUNCH CONTEXTCYPHER ONLINE⚠️Hosted Version Limitations:
- • Only public AI providers available (OpenAI, Claude, Gemini)
- • No local AI models or Ollama support
- • Requires internet connection
✨ Additional SaaS AI options and features coming soon!
INCLUDED FEATURES
Free for Personal & Educational Use
All features included — no restrictions
- 150+ security-focused node types (firewalls, AI gateways, SCADA systems, cloud services)
- 35 security zones (DMZ, Internal, Cloud, OT/ICS, Zero Trust, and more)
- AI-powered diagram generation from text descriptions
- Automated threat analysis with MITRE ATT&CK mapping
- 3D Security Visualization
- Professional threat reports (HTML/Text)
- Drawing & annotation layer
- Diagram import (Mermaid, DrawIO, PlantUML, Graphviz, JSON)
- AI chat analysis (Ollama local LLM or OpenAI/Claude/Gemini)
- GRC module for governance, risk, and compliance
- Attack path modeling with STRIDE categorization and GRC integration
- 25+ themes including cyberpunk, matrix, and professional styles
- 100% offline operation - works in air-gapped environments
- Data sanitization for cloud AI usage
- Performance optimized - handles 500+ components
Enterprise Licensing
For commercial or enterprise use, please contact Threat Vector Security for licensing information.
System Requirements
Minimum:
- • 8GB RAM
- • 5GB available disk space
- • Intel Core i5 or equivalent
- • Dedicated graphics card
Recommended:
- • 16GB RAM or more
- • 10GB available disk space
- • Intel Core i7 or equivalent
- • Dedicated graphics card (2GB+ VRAM)
Note: Internet connection required only when using public AI services (OpenAI, Claude, Gemini).
Works fully offline with local AI providers.
Stay Updated
Get notified about new features, security updates, and important announcements