You have been redirected from paterva.com. Maltego.com is the new home for all information regarding Maltego products. Read more about this in a message from the Paterva team and in this blog post and FAQ . close
As of , we are your new and primary home for all information about Maltego products, services and news.
Since , Maltego has empowered over a million investigations worldwide, and we are far from being done. How can Maltego support you?
)
Maltego
is an open source intelligence (OSINT) and graphical link analysis tool for gathering and connecting information for investigative tasks.
Mine.
Easily gather information from dispersed data sources.
Merge.
Automatically link and combine all information into one graph.
Map.
Visually explore relationships in your data.
Install Maltego
To get started, download the appropriate installer for your machine.
Download Maltego
Maltego Data Sources
Integrate data from public sources (OSINT), commercial vendors, and internal sources via the Maltego Transform Hub. All data comes pre-packaged as Transforms ready to be used in investigations.
Transforms are small pieces of code that automatically fetch data from different sources and return the results as visual entities in the desktop client. Transforms are the central elements of Maltego which enable its users to unleash the full potential of the software whilst using a point-and-click logic to run analyzes.
ic_lightbulb_outline
ic_autorenew
Automate in a click. Execute a set of Transforms in a pre-defined sequence to automate routines and workflows.
ic_fingerprint
Create your own queries. Use the Transform Development Toolkit to write and customize your own Transforms, and to integrate new data sources.
How Investigators use Maltego
Cyber Threat Intelligence
Visualize and understand the attack surface. Help prevent potential threats to the infrastructure.
Digital Risk Protection
Investigate and help protect against unwanted asset exposure resulting from Digital Transformation efforts.
Easily gather information from dispersed data sources.
Merge.
Automatically link and combine all information into one graph.
Map.
Visually explore relationships in your data.
Install Maltego
To get started, download the appropriate installer for your machine.
Download Maltego
Maltego Data Sources
Integrate data from public sources (OSINT), commercial vendors, and internal sources via the Maltego Transform Hub. All data comes pre-packaged as Transforms ready to be used in investigations.
Transforms are small pieces of code that automatically fetch data from different sources and return the results as visual entities in the desktop client. Transforms are the central elements of Maltego which enable its users to unleash the full potential of the software whilst using a point-and-click logic to run analyzes.
ic_lightbulb_outline
ic_autorenew
Automate in a click. Execute a set of Transforms in a pre-defined sequence to automate routines and workflows.
ic_fingerprint
Create your own queries. Use the Transform Development Toolkit to write and customize your own Transforms, and to integrate new data sources.
How Investigators use Maltego
Cyber Threat Intelligence
Visualize and understand the attack surface. Help prevent potential threats to the infrastructure.
Digital Risk Protection
Investigate and help protect against unwanted asset exposure resulting from Digital Transformation efforts.
Merge.
Automatically link and combine all information into one graph.
Automatically link and combine all information into one graph.
Map.
Visually explore relationships in your data.
Install Maltego
To get started, download the appropriate installer for your machine.
Download Maltego
Maltego Data Sources
Integrate data from public sources (OSINT), commercial vendors, and internal sources via the Maltego Transform Hub. All data comes pre-packaged as Transforms ready to be used in investigations.
Transforms are small pieces of code that automatically fetch data from different sources and return the results as visual entities in the desktop client. Transforms are the central elements of Maltego which enable its users to unleash the full potential of the software whilst using a point-and-click logic to run analyzes.
ic_lightbulb_outline
ic_autorenew
Automate in a click. Execute a set of Transforms in a pre-defined sequence to automate routines and workflows.
ic_fingerprint
Create your own queries. Use the Transform Development Toolkit to write and customize your own Transforms, and to integrate new data sources.
How Investigators use Maltego
Cyber Threat Intelligence
Visualize and understand the attack surface. Help prevent potential threats to the infrastructure.
Digital Risk Protection
Investigate and help protect against unwanted asset exposure resulting from Digital Transformation efforts.
To get started, download the appropriate installer for your machine.
Download Maltego
Integrate data from public sources (OSINT), commercial vendors, and internal sources via the Maltego Transform Hub. All data comes pre-packaged as Transforms ready to be used in investigations.
Transforms are small pieces of code that automatically fetch data from different sources and return the results as visual entities in the desktop client. Transforms are the central elements of Maltego which enable its users to unleash the full potential of the software whilst using a point-and-click logic to run analyzes.
ic_lightbulb_outline
ic_autorenew
Automate in a click. Execute a set of Transforms in a pre-defined sequence to automate routines and workflows.
ic_fingerprint
Create your own queries. Use the Transform Development Toolkit to write and customize your own Transforms, and to integrate new data sources.
How Investigators use Maltego
Cyber Threat Intelligence
Visualize and understand the attack surface. Help prevent potential threats to the infrastructure.
Digital Risk Protection
Investigate and help protect against unwanted asset exposure resulting from Digital Transformation efforts.
Cyber Threat Intelligence
Visualize and understand the attack surface. Help prevent potential threats to the infrastructure.
Digital Risk Protection
Investigate and help protect against unwanted asset exposure resulting from Digital Transformation efforts.
GIPHY App Key not set. Please check settings