Threat Dragon comes in two variants, a desktop application and a web application.
The web application can be run locally or from a server, and is downloaded from the Threat Dragon repo. There is some configuration necessary, so see the install instructions for configuring the application.
The web application is also provided in a Docker image, and this is provided by dockerhub. Follow the Docker instructions to download, configure and run a Docker container.
Various installers can be downloaded from the Threat Dragon releases area:
.rpm
for Red Hat Linux, AIX, CentOS, Fedora.deb
for debian based Linux such as Ubuntu, Trisqel and Debian itselfSee the desktop install instructions.
Threat Dragon: making threat modeling less threatening