#maltego

2026-01-21

OSINT и цифровой след

Всем привет! Сегодня поговорим об Open Source Intelligence (далее по тексту — OSINT ), разведке на основе открытых источников. Это систематизированный процесс поиска в интернете — не взлом и не покупка слитых баз — общедоступной информации и ее дальнейшая аналитика. К методам OSINT прибегают как в легальных целях, так и с недобрым умыслом. Как все это выглядит на практике?

habr.com/ru/companies/rt-dc/ar

#osint #osint_tools #google_dorks #shodan #maltego #report #рткцод

you can run some things like spiderfoot which can find malicious apps and links - api heavy though #maltego

2025-11-17

OSINT Tools in C/C++: Used by Intelligence and Security Services
Modern intelligence and cyber-reconnaissance units increasingly rely on **C and C++ tools** when **speed, resource control, and minimal digital footprint** are critical. Below is an overview of key tools and why these languages are preferred.
Classic OSINT Tools in C/C++
1. **Nmap (C/C++)**
The cornerstone network scanner for most OSINT tasks.
**Function:** Active and passive host discovery, service detection, OS fingerprinting.
**Feature:** Supports NSE scripts for automated reconnaissance.
2. **ZMap (C)**
Mass IPv4 scanning (e.g., one port across the entire IPv4 space in ~5 minutes).
Used for large-scale SIGINT/OSINT operations.
3. **Masscan (C)**
U.S. counterpart to ZMap, optimized for maximum speed.
Ideal for instant “network snapshots.”
4. **Tcpdump / libpcap (C)**
Passive packet capture.
Forms the backbone for packet analysis in intelligence systems.
5. **Bro/Zeek (C++)**
Network event analysis framework.
Detects anomalies and covert channels.
6. **YARA / YARA Rules Engine (C/C++)**
Signature-based detection of malware, documents, and archives.
Widely used in cyber intelligence.
7. **OpenSSL Toolkit (C)**
Certificate and TLS channel analysis.
Used to examine cryptographic infrastructure.
8. **ExifTool (C++)**
Metadata analysis for images and documents: device, timestamp, GPS.
9. **Tshark (C)**
CLI version of Wireshark for covert traffic analysis.
10. **Osquery (C++)**
Live-forensics system turning the host into a SQL-queryable database.
Why C/C++ Matters in Intelligence
**Maximum speed**
Native code is crucial for mass network scanning, data streams, and crypto operations.
**Resource control**
Direct management of memory, threads, and network buffers without overhead.
**Low-level access**
Raw sockets, system calls, filesystem, network interfaces.
**Deterministic behavior**
Predictable response times, no garbage collection delays.
**Minimal dependencies & portability**
Statically compilable binaries for Linux, Windows, BSD, or embedded systems.
**Integration with high-performance libraries**
OpenSSL, libpcap, Boost, ZLib for crypto, networking, and compression.
**Hardware-level optimization**
SIMD, vectorization, inline functions, assembly inserts.
Performance: C/C++ vs Interpreted Languages
Example: scanning 100,000 IPs for open ports.
Language Execution Time Reason C 3–5 sec Native code, minimal overhead C++ + Boost.Asio 4–6 sec Asynchronous, thread control Go 10–15 sec Runtime overhead, garbage collection Python 180–300 sec Interpretation, GIL, extra wrappers
**Conclusion:** Porting Python → C/C++ can give **50–100× speedup** for CPU- and I/O-intensive tasks.
Summary
C/C++ are the languages of choice for professional OSINT and intelligence tools where **speed, control, and low-level system/network operations** are required.
**Hashtags**
#OSINT #CPlusPlus #CProgramming #CyberIntelligence #SIGINT #NetworkAnalysis #Maltego #Nmap #ZMap #CyberSecurity #Forensics #MetadataAnalysis #OpenSourceIntelligence #Recon
**Bibliography / Must-Have References**
Gordon UA. *Preparations for war against Poland underway – Polish Chief of Staff*. 2025.
Eurointegration. *Polish Army Chief warns about pre-war threats*. 2025.
TVN24. *Polish Army Chief: Prepare forces for full-scale conflict*. 2025.
Nmap Official Documentation. nmap.org
ZMap Project. zmap.io
ExifTool Documentation. exiftool.org
YARA Rules Engine. virustotal.github.io/yara
Osquery Documentation. osquery.io

Thomas Roccia :verified:fr0gger@infosec.exchange
2024-12-03

🤓 I’ve been using Maltego Graph for a while, and it’s one of the best tools for visualizing investigations and pivoting!

One of the best feature is the use of Machines to automate pivoting and enrichment! 🤖

🔍 For example, you can create a Machine to automatically enrich an IP address with WHOIS info and then pivot through associated email addresses with a single click.

I have created a cheat sheet you can refer to when using Maltego 👇

I’m curious — how many of you have already created Maltego automation with Machines?

@Maltego @maltegohq #threatintel #investigation #malware #IOCS #graphs #maltego

Kir4ik52 :blobfoxnerd:kir4ik52@mastodon.ml
2024-11-18

Maltego Telegram

Модуль Maltego для Telegram позволяет индексировать стикеры и эмодзи в канале, а также устанавливать создателей наборов стикеров/эмодзи с помощью их уникального идентификатора (UID).

Для этого нужно сделать API-запрос, извлечь "ID" и выполнить битовое смещение вправо, после чего UID конвертируется в логин через бота tgdb, что помогает раскрыть профиль пользователя.

Кроме того, модуль может деанонимизировать автора канала, который не оставил контакты, путём сканирования канала и поиска его наборов стикеров с применением аналогичной методики.

Для настройки модуля необходимо клонировать репозиторий, установить зависимости, указать соответствующие API-данные в конфигурационном файле и импортировать нужные файлы в Maltego для тестирования работоспособности.

src: github.com/vognik/maltego-tele

#blacktriangle #github #opensource #maltego #osint #telegram

Kir4ik52 :blobfoxnerd:kir4ik52@mastodon.ml
2024-11-18

Администраторов Telegram каналов теперь можно деанонимизировать по кастомным стикерам и эмоджи.

Уязвимость заключается в том, что UID стикер-пака позволяет извлечь ID его создателя, что помогает раскрыть профиль пользователя.

Авторы Telegram-каналов заказывают у дизайнеров фирменные наклейки и «регистрируют» их в мессенджере с помощью бота Stickers, не подозревая о том, что это раскрывает их аккаунт всем.

Для популярной OSINT-утилиты Maltego даже уже разработали модуль позволяющий автоматизировать данную задачу.

src: github.com/vognik/maltego-tele

#blacktriangle #anonymity #deanonymization #maltego #telegram #opensource #osint

@cyb_detective osint like a pro means always doing osint in the background and daily reports #maltego graphs

Trending Tech Nieuwstechnieuws@infosec.exchange
2024-08-12

De cybersecurity trends van 2024: een diepgaande analyse trendingtech.news/trending-new #cybersecurity trends 2024 #lek van gegevensrecords #foute content waarschuwingen #Maltego en Criminal IP #overgang IT naar cybersecurity #Trending #News #Nieuws

Xavier Ashe :donor:Xavier@infosec.exchange
2024-08-09

@krypt3ia It's been a while, but I believe #Maltego requires more stickers to run successfully.

2024-08-07

How can you gather the most information for your #PersonOfInterest investigations? Use the convenient out-of-the-box access to a growing number of data sources included in #Maltego Data! Follow the steps in the updated cheat sheet to map out the digital footprint of your suspect NOW: maltego.com/blog/how-to-conduc

2024-07-30

Just like other major events, the #Olympics lead to a significant increase in social media engagement from both legitimate users and threat actors. This surge in online activity often includes the spread of genuine opinions but also #disinformation!

Discover how you can effectively monitor social media activities, understand public sentiment, and identify emerging threats early using real-time #OSINT data and AI-driven analysis with #Maltego Monitor: youtu.be/SUPbJGfhdTc?si=Vn1H_K

@gme now of course you are contributing to development of ai with all these platforms and that adds another layer and some nuance #maltego

2024-07-01

Events like Pride Month, the Olympics, and European football championships trigger strong interactions on social media, filled with supportive messages but also heated debates. Identifying genuine viewpoints versus those with harmful intentions can be challenging.

Join our deep dive on July 16th at 4 PM CET and learn how to capture the pulse of public sentiment and spot hostile patterns using #Maltego: maltego.com/event-registration

2024-06-25

The disintegration between security tools poses challenges for SOC teams, including tool fatigue, alert fatigue, and time expended on verifying false positives.

Find out how #Maltego helps combine disparate data into one interface: maltego.com/blog/how-to-integr

2024-06-25

[2/2] Collecting court-ready social media evidence is now available through our new capability: #Maltego Evidence! Curious to learn more? Discover our platform: maltego.com/blog/what-is-open-

2024-06-14

CTI investigations face complex challenges, making robust solutions for data integration and analysis vital for navigating vast data and countering sophisticated attacks. Our latest blog, "Incident Readiness with Maltego," explores the future of CTI, key challenges, essential capabilities, and how #Maltego ensures your team is always ready for threats.

Stay ahead with actionable intelligence: maltego.com/blog/incident-read

2024-06-13

In 2023, the average cost of data breaches surged to $4.45 million, making a 15% increase over three years. To mitigate this impact on your organization, use #Maltego to examine and analyze vulnerabilities, visualizing internal data and #IoCs within a single user interface. Our playbook demonstrates how to efficiently conduct a data breach investigation using Maltego, breaking down the process into five stages with mock-up graphs and detailed explanations. Learn more: maltego.com/blog/investigating

2024-06-04

make this shorter: Since 2008, #Maltego has been the trusted #OSINT platform for cyber threat intelligence. Now, we're launching new Professional and Organization plans to enhance your investigative capabilities.

Learn more about how our new plans can transform your investigations: maltego.com/blog/introducing-m

2024-06-03

Dealing with a potential seller of stolen goods? Discover how you can find traces of your #PersonOfInterest online, map the extent of their illegal activities, and understand their patterns to catch them red-handed. All within a couple of clicks in #Maltego using the ready workflow!

Start investigating with Maltego NOW: get.maltego.com/maltego-organi

2024-05-24

If you can only have one investigation tool, it's #Maltego: Data visualization, all data in one place, trusted by infosec and cybercrime experts worldwide.

Add Maltego to your essential toolkit like cybercrime experts worldwide already did:maltego.com/maltego-for-enterp

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst