01Standardized AND/OR node logic for mapping complex multi-step attack scenarios
02Automated pathfinding to identify the easiest, cheapest, or stealthiest attack routes
03Gap analysis tools to highlight attack vectors lacking specific mitigations
04Python-based data models for programmatic generation and export of attack trees
050 GitHub stars
06Attribute-based analysis including cost, time, skill level, and detection risk