Open navigation

Use Cases

Modified on: Wed, 27 Apr, 2022 at 2:03 PM

Maltego has a brilliant community which develops use cases, not only for their own companies, but also for ours.

We at Maltego often find that while many users are interested in using Maltego, they feel a tad "lost in the haze" as to what their first exploration task could be. Therefore to start you off, spark some ideas and clear out the haze, here is a list of a few use cases that we promise to update regularly for your convenience. 

If you have requests, ideas or use cases you built that you want to share, write to us, and mention your "price" (aka free/discounted licenses or evaluation clients) and enjoy having the Maltego team officially endorse your ideas. T&C apply! In return, we will make sure that Maltego keeps you on your toes!

Investigating Emails with the Holehe Transform for Maltego Cybersecurity Investigation TutorialJoseph Jones - OS2INT08 Apr 2022
Exposing an Active Kaseya Ransomware Attack Infrastructure
Cybersecurity InvestigationWhoisXML AMPI03 Nov 2021
The Many Tentacles of Magecart Group 8Cybersecurity InvestigationJérôme Segura13 Sept 2021
How Do You Run a Cybercrime Gang?Cybersecurity InvestigationBushido Token04 Sept 2021
Pivoting off of a Phishing DomainCybersecurity InvestigationJohn Hammond27 Aug 2021
Protect Your Organization with NIST NVD and Maltego 
Cybersecurity Investigation Tutorial
12 Aug 2021
Identify and Understand Malware with Maltego and URLHaus by Cybersecurity Investigation TutorialMaltego04 Aug 2021
Chasing DarkSide Affiliates: Identifying Threat Actors Connected to Darkside Ransomware Using Maltego & Intel 471 
Cybersecurity Investigation Tutorial
22 June 2021
Introducing The New Silobreaker Transforms for Maltego Cybersecurity Investigation TutorialMaltego14 Jun 2021
Password Attacks 101 Cybersecurity Investigation
Cesar Anjos11 Jun 2021
DittoTRX: A Maltego Transform Server for IDN Homograph Attacks - Part 1 Setting Up 
Cybersecurity Investigation
Maltego31 May 2021
DittoTRX: A Maltego Transform Server for IDN Homograph Attacks - Part 2 Investigation 
Cybersecurity Investigation
Maltego31 May 2021
Comprehensive information gathering with Maltego Product TutorialDavid Artykov28 May 2021
Cryptocurrency scam schemes: following the money Cryptocurrency Fraud InvestigationWhat The Fraud - Kypexin26 May 2021
How to Conduct Person of Interest Investigations using OSINT and MaltegoPerson of Interest InvestigationMaltego25 Feb 2021
Vulnerabilities Related to The Use of VPNs in COVID-19 Remote Working Situation
Cybersecurity InvestigationMaltego21 Oct 2020
Zeek Log Reconnaissance with Network Graphs Using Maltego Casefile Cybersecurity InvestigationRicky Tan21 Sept 2020
Conduct Investigations Securely and Privately Using Maltego's Stealth ModeProduct TutorialMaltego24 Aug 2020
Enrich your Maltego Graph with Visual Information by Customizing Entity Overlay IconsProduct TutorialMaltego13 Aug 2020
Vulnerabilities Related to The Use of VPNs in COVID-19 Remote Working SituationCybersecurity InvestigationMaltego21 Oct 2020
Identifying Risky Bitcoin Transactions with Maltego and CipherTrace Blockchain Intelligence
Fraud Investigation
Maltego31 July 2020
Naikon APT: Cyber Espionage ReloadedCybersecurity InvestigationCheck Point Research07 May 2020
How to Identify Company’s Hacked Email Addresses Using Maltego & HaveIbeenPwned Cybersecurity InvestigationIrfaan Shakeel25 Apr 2020
Data Scraping and Visualizing using Instant Data Scraper,, and Maltego Product TutorialMicah Hoffman15 Apr 2020
The Iron March Data Dump Provides a Window Into How White Supremacists Communicate and Recruit Person of Interest InvestigationJacques Singer-Emery27 Feb 2020

Network Footprinting with Machines in Maltego

Cybersecurity Investigation
Maltego12 Nov 2019
Fighting Cyberbullies and Harassment with Martial Art and Maltego
Person of Interest Investigation
Maltego28 Oct 2019
Maltego and OSINT for Crime Scene AnalysisCybersecurity InvestigationAndrew Fordred02 July 2018
Using Maltego for Cellphone Analysis and Geolocation with OSINTCybersecurity InvestigationAndrew Fordred17 Jun 2018
Spying on a budget (Inside a Phishing Operation with Targets in the Tibetan Community) Cybersecurity InvestigationMasashi Crete-Nishihata, Jakub Dalek, Etienne Maynier, and John Scott-Railton
30 Jan 2018
Uncovering a New Angler-Bedep ActorPerson of Interest InvestigationJohn D Swanson12 Apr 2016

Did you find it helpful? Yes No

Send feedback
Sorry we couldn't be helpful. Help us improve this article with your feedback.