EN
ENNA

OpenCTI vs TheHive

GitHub Stats

9.1k
Stars
3.9k
1.3k
Forks
683
1848
Issues
834
2d ago
Updated
8mo ago
-
License
AGPL-3.0
TypeScript/Python
Language
Scala/JavaScript

About OpenCTI

OpenCTI is an open-source platform for managing cyber threat intelligence knowledge and observables. Built on a STIX2-native data model, it provides a unified view of threat data including threat actors, intrusion sets, campaigns, malware, vulnerabilities, and their relationships. OpenCTI uses a graph database (Neo4j or Amazon Neptune) to store and visualize complex relationships between entities, making it easy to understand how threat actors, TTPs, and infrastructure are connected. It supports connectors for automatic ingestion from MISP, AlienVault, VirusTotal, Shodan, and dozens of other sources. The platform includes role-based access control, workflow management for analyst collaboration, and export capabilities for integration with SIEMs and SOAR platforms.

About TheHive

TheHive is a scalable, open-source Security Incident Response Platform (SIRP) designed to make life easier for SOCs, CSIRTs, and CERTs dealing with security incidents that need to be investigated and acted upon. It provides collaborative case management where multiple analysts can work on the same case simultaneously, with full audit trails and task assignment. TheHive integrates tightly with Cortex for automated observable analysis (IP lookups, hash checks, domain reputation) and with MISP for threat intelligence sharing. Cases can be created from email alerts, SIEM events, or manually, and each case supports tasks, observables, and evidence attachments. Its template system and custom fields make it adaptable to any organization's incident response workflow.

Platform Support

🐧linux
🐧linux

Tags

Shared

soc

OpenCTI only

threat-intelstix2knowledge-graphneo4jthreat-actors

TheHive only

incident-responsecase-managementcsirtcollaborationmisp