MISP icon
MISP icon

MISP

 1 like

MISP (core software) - Open Source Threat Intelligence and Sharing Platform.

MISP screenshot 1

License model

  • FreeOpen Source

Country of Origin

  • BE flagBelgium
  • European Union flagEU

Platforms

  • Linux
  No rating
1like
0comments
0news articles

Features

Suggest and vote on features
  1.  Malware Analysis
  2.  Fraud detection

 Tags

  • fraud-management
  • information-sharing
  • threat-hunting
  • information-security
  • threat-sharing
  • Security
  • information-exchange
  • threat intelligence
  • threat-intel
  • threatintel
  • threat-intelligence-platform
  • fraud-prevention
  • threat-analysis
  • misp
  • cti
  • stix
  • intelligence

MISP News & Activities

Highlights All activities

Recent activities

  • App icon
    sgnl05 added MISP as alternative to OpenCTI
    10 months ago
  • sgnl05 liked MISP
    10 months ago
Show all activities

MISP information

  • Developed by

    BE flagMISP
  • Licensing

    Open Source (AGPL-3.0) and Free product.
  • Written in

  • Alternatives

    3 alternatives listed
  • Supported Languages

    • English

AlternativeTo Category

Education & Reference

GitHub repository

  •  5,794 Stars
  •  1,473 Forks
  •  2740 Open Issues
  •   Updated Jul 14, 2025 
View on GitHub

Our users have written 0 comments and reviews about MISP, and it has gotten 1 likes

MISP was added to AlternativeTo by b4st1en on Jun 22, 2022 and this page was last updated Jun 22, 2022.
No comments or reviews, maybe you want to be first?
Post comment/review

What is MISP?

THE KEY IS AUTOMATION Isn’t it sad to have a lot of data and not use it because it’s too much work? Thanks to MISP you can store your IOCs in a structured manner, and thus enjoy the correlation, automated exports for IDS, or SIEM, in STIX or OpenIOC and synchronize to other MISPs. You can now leverage the value of your data without effort and in an automated manner.

SIMPLY THREATS The primary goal of MISP is to be used. This is why simplicity is the driving force behind the project. Storing and especially using information about threats and malware should not be difficult. MISP is there to help you get the maximum out of your data without unmanageable complexity.

BY GIVING YOU WILL RECEIVE Sharing is key to fast and effective detection of attacks. Quite often similar organizations are targeted by the same Threat Actor, in the same or different Campaign. MISP will make it easier for you to share with, but also to receive from trusted partners and trust-groups. Sharing also enabled collaborative analysis and prevents you from doing the work someone else already did before.

THREAT INTELLIGENCE Threat Intelligence is much more than Indicators of Compromise. This is why MISP provides metadata tagging, feeds, visualization and even allows you to integrate with other tools for further analysis thanks to its open protocols and data formats.

VISUALIZATION Having access to a large amount of Threat information through MISP Threat Sharing communities gives you outstanding opportunities to aggregate this information and take the process of trying to understand how all this data fits together telling a broader story to the next level. We are transforming technical data or indicators of compromise (IOCs) into cyber threat intelligence. MISP comes with many visualization options helping analysts find the answers they are looking for.

OPEN & FREE The MISP Threat Sharing ecosystem is all about accessibility and interoperability: The software is free to use, data format and API are completely open standards and for support you can rely on community and professional services.

Official Links