Open-Source Threat Intelligence
Threat intelligence
for the rest of us
A lightweight, self-hosted platform that aggregates threat feeds, filters by your stack, and surfaces what actually matters — without the six-figure price tag.
View on GitHub →Threat intel shouldn't require
a six-figure budget
Small teams are stuck choosing between enterprise platforms they can't afford, open-source tools they can't staff, or spreadsheets that don't scale.
$100K+
per year for commercial CTI
Recorded Future, Mandiant, Intel471
Days
to set up MISP or OpenCTI
Requires dedicated analyst staff
1000s
of unfiltered alerts
No relevance to your actual stack
Everything you need, nothing you don't
Purpose-built for small teams who need actionable intelligence, not another platform to babysit.
Feed Aggregation
CISA KEV, AlienVault OTX, Abuse.ch, NVD, and EPSS — normalized and unified in a single dashboard.
Tech-Stack Filtering
Declare what you run. OpFor surfaces only the threats, CVEs, and IOCs relevant to your infrastructure.
Vulnerability Prioritization
EPSS scores, CISA KEV status, and exploit availability — not just CVSS. Fix what matters first.
ATT&CK Mapping
Map threat activity to MITRE ATT&CK techniques. Identify detection gaps in your coverage.
Up and running in 30 minutes
One docker compose up and you're in business.
Define your stack
Tell OpFor what you run — operating systems, services, frameworks, cloud providers. Takes 2 minutes.
Connect feeds
Out-of-the-box integrations with CISA KEV, OTX, Abuse.ch, NVD, and EPSS. Toggle on what you need.
Get actionable intel
Filtered, prioritized threat data relevant to your environment. IOCs to block, CVEs to patch, TTPs to watch.
100% Open Source
Built for practitioners, by practitioners
OpFor is free, self-hosted, and community-driven. No vendor lock-in, no telemetry, no surprise pricing. Your data stays yours.
The Team
The humans behind the platform.

Nisanth
Founder & Lead Developer
Offensive security practitioner and security engineer. Building the threat intel platform he wished existed.
“Fueled by CVEs and cold brew”