List of Maltego Integrations

This is a list of platforms and tools that integrate with Maltego. This list is updated as of April 2025.

  • 1
    Leader badge
    Criminal IP Reviews & Ratings

    Criminal IP

    AI SPERA

    Enhance cybersecurity with real-time insights into vulnerabilities.
    More Information
    Company Website
    Company Website
    Criminal IP functions as a cyber threat intelligence search engine designed to identify real-time vulnerabilities in both personal and corporate digital assets, enabling users to engage in proactive measures. The concept behind this platform is that by acquiring insights into potentially harmful IP addresses beforehand, individuals and organizations can significantly enhance their cybersecurity posture. With a vast database exceeding 4.2 billion IP addresses, Criminal IP offers crucial information related to malicious entities, including harmful IP addresses, phishing sites, malicious links, certificates, industrial control systems, IoT devices, servers, and CCTVs. Through its four primary features—Asset Search, Domain Search, Exploit Search, and Image Search—users can effectively assess risk scores and vulnerabilities linked to specific IP addresses and domains, analyze weaknesses for various services, and identify assets vulnerable to cyber threats in visual formats. By utilizing these tools, organizations can better understand their exposure to cyber risks and take necessary actions to safeguard their information.
  • 2
    Leader badge
    Kasm Workspaces Reviews & Ratings

    Kasm Technologies

    Seamless access to your workspace, anywhere, anytime.
    More Information
    Company Website
    Company Website
    Kasm Workspaces enables you to access your work environment seamlessly through your web browser, regardless of the device or location you are in. This innovative platform is transforming the delivery of digital workspaces for organizations by utilizing open-source, web-native container streaming technology, which allows for a contemporary approach to Desktop as a Service, application streaming, and secure browser isolation. Beyond just a service, Kasm functions as a versatile platform equipped with a powerful API that can be tailored to suit your specific requirements, accommodating any scale of operation. Workspaces can be implemented wherever necessary, whether on-premise—including in Air-Gapped Networks—within cloud environments (both public and private), or through a hybrid approach that combines elements of both. Additionally, Kasm's flexibility ensures that it can adapt to the evolving needs of modern businesses.
  • 3
    Polonious Reviews & Ratings

    Polonious

    Polonious Systems

    Streamlined investigation workflows, secure compliance, enhanced operational productivity.
    More Information
    Company Website
    Company Website
    Polonious serves as an investigation management workflow solution that adheres to ISO27001 standards, built upon three foundational principles: 1 - Security 2 - Process orientation 3 - Adaptability and customization This framework empowers users to design workflows that not only safeguard data and evidence in a secure, ISO27001 certified manner but also streamline compliance with regulatory obligations with minimal hassle, thanks to workflows that are inherently compliant. Furthermore, the platform eliminates the need for costly and time-intensive coding alterations, allowing users to make modifications independently through an intuitive graphical user interface (GUI). Additionally, Polonious offers the capability to generate comprehensive reports on case outcomes, timelines, and financial metrics, which can be analyzed by case types, investigators, and investigation statuses. This functionality not only demonstrates value to higher management but also aids in pinpointing inefficiencies, paving the way for enhanced operational productivity. By leveraging these insights, organizations can continually refine their investigation processes to achieve better results.
  • 4
    threatYeti by alphaMountain Reviews & Ratings

    threatYeti by alphaMountain

    alphaMountain AI

    Empower your cybersecurity with swift, comprehensive threat analysis.
    AlphaMountain transforms both security experts and enthusiasts into advanced IP threat analysts through its threatYeti platform. This web-based tool provides immediate threat assessments for any URL, domain, or IP address found online. With threatYeti, users can quickly evaluate the potential risk associated with a domain using a straightforward color-coded scale ranging from 1.00 (indicating low risk) to 10.00 (indicating high risk). ThreatYeti serves to safeguard cyber threat analysts and their networks from dangerous websites. Its no-click categorization feature classifies sites into one or more of 83 distinct categories, eliminating the need for analysts to visit potentially harmful sites that could lead to malware downloads or exposure to inappropriate content. Additionally, threatYeti offers insights into related hosts, various threat factors, passive DNS certificates, redirect chains, and more, equipping analysts with a comprehensive understanding of any host. The end result is a more efficient and secure investigation process, empowering organizations to respond decisively to domain and IP threats while enhancing their overall cybersecurity posture.
  • 5
     Videoma Intelion Reviews & Ratings

    Videoma Intelion

    ISID

    Revolutionizing investigations with automated video and audio analysis.
    Videoma Intelion serves as an advanced solution for analyzing video and audio, tailored specifically for law enforcement and intelligence organizations. By streamlining the review and documentation process, it greatly enhances the speed of investigations, utilizing automation to handle content gathered from various sources such as surveillance footage, recordings, or social media. This adaptable tool is beneficial not only for forensic analysis after incidents but also provides real-time assistance in the midst of active investigations, making it an invaluable resource for professionals in the field. Its innovative features contribute to more efficient case resolutions and improved situational awareness during critical operations.
  • 6
    Netlas.io Reviews & Ratings

    Netlas.io

    Netlas

    Unlock the Internet’s secrets with comprehensive network insights.
    Netlas.io serves as a search engine that functions as a network scanner for the Internet. It conducts extensive scans of DNS records for billions of domain names, along with analyzing hundreds of millions of HTTP responses and SSL certificates. Users can access this wealth of information through a variety of tools. The platform enables users to explore the findings from its Internet scans. Netlas employs non-intrusive scanning methods, continuously monitoring internet-accessible hosts while meticulously storing their responses. DNS Search compiles domain names alongside their corresponding IP addresses and other DNS records. The IP WHOIS feature provides insights into the ownership and management of an IP address, detailing the range of the address and the name of the network provider. For domains, the Domain WHOIS component reveals ownership information, which includes contact details, registrar specifics, and both registration and expiration dates. Additionally, the Certificates feature boasts a comprehensive database of SSL certificates sourced from multiple origins. Given its extensive capabilities, Netlas is an essential tool for cybersecurity professionals seeking to enhance their understanding of the internet landscape. Its various functionalities make it invaluable for conducting thorough investigations and assessments in the realm of cybersecurity.
  • 7
    Tisane Reviews & Ratings

    Tisane

    Tisane Labs

    Empowering law enforcement with advanced multilingual content detection.
    The Tisane API serves as a natural language understanding tool specifically designed for law enforcement and the detection of abusive content. It is adept at identifying various issues, including but not limited to: • Hate speech • Cyberbullying • Criminal behavior • Sexual propositions • Efforts to make unauthorized external contact Furthermore, Tisane not only highlights the problematic areas within the text but can also offer explanations for review or verification purposes. Impressively, the API supports 30 different languages, effectively managing even those that incorporate slang or disguised language. This versatility enhances its utility in diverse linguistic environments.
  • 8
    Intel 471 TITAN Reviews & Ratings

    Intel 471 TITAN

    Intel 471

    Empower your security with real-time, actionable intelligence solutions.
    Cybercriminals remain constantly active, underscoring the necessity for ongoing threat intelligence to anticipate and track their strategies against your organization. Clients place their confidence in TITAN, a highly accessible intelligence software-as-a-service platform crafted by specialists in intelligence and security for their peers in the industry. This platform delivers organized information, customizable dashboards, prompt alerts, and comprehensive intelligence reports that can be accessed via both a web portal and API integration. Beyond its core features, TITAN offers advanced capabilities. By leveraging TITAN's programmable RESTful API, users can develop an array of connectors and integrations, allowing for the seamless integration of personalized intelligence into their security operations. With consistently updated structured technical and non-technical data sourced from our global team and automated systems, TITAN guarantees that users benefit from high-quality intelligence with minimal irrelevant information. Consequently, your team can focus on tackling the most urgent threats while remaining ahead of potential attacks. Additionally, TITAN not only streamlines security processes but also fosters a proactive approach to threat management, ultimately enabling organizations to significantly strengthen their defenses in a rapidly changing cyber threat landscape.
  • 9
    Google Digital Risk Protection Reviews & Ratings

    Google Digital Risk Protection

    Google

    Empower your security with unparalleled digital risk insights.
    Gaining a clear understanding of a digital risk protection solution can greatly improve your preparedness by uncovering the identities of your adversaries, their goals, and the strategies they might employ to compromise your security. Google Digital Risk Protection delivers a thorough digital risk protection offering that includes both self-service SaaS products and a comprehensive managed service model. Each option empowers security professionals to extend their focus beyond their organization, identify critical attack vectors, and uncover malicious activities originating from the deep and dark web, along with ongoing attack campaigns on the surface web. Additionally, the Google Digital Risk Protection solution provides in-depth insights into the profiles of threat actors, including their strategies, techniques, and operational methods, which enriches your understanding of cyber threats. By effectively mapping out your attack surface and monitoring activities across the deep and dark web, you can obtain crucial visibility into risk factors that could threaten your entire enterprise and its supply chain. Such a proactive stance not only fortifies your organization but also builds greater resilience against emerging threats, ensuring you are better prepared for any future challenges. This comprehensive approach allows for ongoing adjustments and enhancements to your security posture, facilitating continuous improvement in risk management strategies.
  • 10
    Filigran Reviews & Ratings

    Filigran

    Filigran

    Proactively manage cyber threats with strategic insights and responses.
    Take a proactive stance toward managing cyber threats, encompassing everything from anticipation to effective response strategies. This approach is crafted to bolster cybersecurity through a thorough understanding of threat information, sophisticated adversary simulations, and strategic solutions for managing cyber risks. Enhanced decision-making capabilities, along with a comprehensive perspective on the threat landscape, will enable quicker responses to incidents. It is crucial to organize and distribute your cyber threat intelligence to enhance understanding and share valuable insights. By consolidating threat data from various sources, you can gain a unified view. Transforming raw data into actionable insights is essential for effective cybersecurity. Ensure that these insights are shared across teams and integrated into various tools for maximum impact. Streamline your incident response process with robust case-management features that allow for a more organized approach. Develop flexible attack scenarios that are designed to ensure accurate, timely, and effective responses to real-world incidents. These scenarios can be customized to meet the unique requirements of different industries. Providing instant feedback on responses not only enhances the learning experience but also fosters improved team collaboration and efficiency. By continuously refining these processes, your organization can stay ahead in the ever-evolving landscape of cyber threats.
  • 11
    IPQS Device Fingerprinting Reviews & Ratings

    IPQS Device Fingerprinting

    IPQualityScore

    Unlock robust fraud detection with advanced device fingerprinting technology.
    Leverage over 25 unique data metrics to gain in-depth insights into device fingerprinting that evaluates both risks and device traits. The device fingerprinting solution offered by IPQS serves as a remarkable fraud detection tool, adept at identifying even the most cunning fraudsters, malicious actors, and cybercriminals. By examining more than 300 data points—including operating systems, screen resolutions, and installed fonts—it successfully reveals counterfeit devices, location spoofing, and dubious behavior linked to a user’s online presence. This innovative technology is capable of recognizing bots, automated actions, device impersonation, and other signs that may indicate fraudulent motives. You can opt for JavaScript device fingerprinting for web environments or utilize our SDKs tailored for mobile applications across both iOS and Android platforms. With its powerful risk assessment features, IPQS effectively identifies fraudulent accounts, chargeback attempts, credential stuffing incidents, and automated activities that suggest misuse. Moreover, the Device Fingerprinting solution from IPQS is proficient in uncovering advanced fraud strategies, including those involving cutting-edge emulator software, thereby providing a holistic defense against emerging threats. This state-of-the-art detection system not only bolsters security measures but also plays a pivotal role in helping businesses preserve trust among their genuine users, ensuring a safer digital ecosystem. Overall, the comprehensive analysis delivered by this technology enables organizations to stay one step ahead of potential fraud.
  • 12
    alphaMountain Threat Intelligence APIs and Feeds Reviews & Ratings

    alphaMountain Threat Intelligence APIs and Feeds

    alphaMountain AI

    Elevate your cybersecurity with real-time threat intelligence updates.
    The AlphaMountain domain and IP threat intelligence is integral to numerous leading cybersecurity solutions worldwide. Fresh updates on threats are provided every hour, featuring updated URL classifications, threat ratings, and intelligence concerning over 2 billion hosts, which includes both domains and IP addresses. KEY BENEFITS Obtain precise classifications and threat ratings for any URL, ranging from 1.00 to 10.0. Get hourly updates on new categorizations and threat ratings through API or threat feeds. Access information on threat factors and additional intelligence that aids in forming threat assessments. Practical applications include utilizing threat feeds to enhance your network security tools, such as secure web portals, secure email gateways, and advanced firewalls. You can integrate the AlphaMountain API within your SIEM for in-depth threat investigations or connect it to your SOAR for automated actions such as blocking threats or updating policies. Furthermore, you can identify URLs that may be suspicious, harbor malware, or represent phishing threats, as well as determine the specific content categories they fall into, of which there are 89. This comprehensive intelligence is crucial for maintaining robust cybersecurity postures.
  • Previous
  • You're on page 1
  • Next