
Mistborn
Mistborn aggregates threat intelligence from multiple sources to enrich, normalize, and distribute IOCs for security analysis and incident response workflows.

Mistborn is an open source threat intelligence aggregation service designed to collect indicators of compromise (IOCs) and related threat data from multiple sources, normalize it, and make it easier to consume for security operations. It helps teams centralize feeds, reduce duplication, and improve the usability of threat intel in downstream tooling.
Key Features
- Aggregates threat intelligence from multiple sources and feed formats
- Normalizes and de-duplicates common IOC types (such as IPs, domains, URLs, and hashes)
- Enrichment support to add context to indicators (where configured)
- Export-oriented design for integrating aggregated intel into other systems
- Designed for ongoing ingestion and updating of intelligence over time
Use Cases
- Consolidating multiple threat feeds into a single curated dataset
- Providing enriched IOC lists for SIEM, EDR, or firewall blocklists
- Supporting incident response investigations with centralized threat intel
Mistborn is a practical option for teams that want a lightweight, self-managed way to operationalize threat intelligence, especially when working with many disparate feeds. By unifying collection and normalization, it can reduce analyst overhead and improve consistency across security workflows.
