Skip to content
Go to file

Latest commit

fix "[Errno 111] Connection refused" after fail to run p0f for first time

Git stats


Failed to load latest commit information.
Latest commit message
Commit time

Sploitego - Maltego's (Local) Partner in Crime

1.0 - Introduction

Sploitego is a local pen-test transform package that uses the Canari Framework for local transform execution in Maltego. The framework was first introduced at DEFCON 20 and has since picked up steam.

2.0 - Installing Sploitego

2.1 - Supported Platforms

Sploitego has currently been tested on Mac OS X and Linux.

2.2 - Requirements

Sploitego is only supported on Python version 2.6. The setup script will automatically download and install most of the prerequisite modules, however, some modules will still need to be installed manually. The following modules require manual installation:

Some of the transforms require external command-line tools (e.g. nmap, amap, p0f, etc.). The following command-line tools are currently supported:

2.3 - Installation

Once you've installed the necessary prerequisites, installing Sploitego is a cinch. Just run:

$ sudo python install

This will install all the necessary modules and download any dependencies (other than what's required above) automatically. Once Sploitego has been installed, it's time to install the transforms. First, make sure Maltego has been run for the first time and initialized (i.e. logged in, transforms discovered, etc.). Once initialized, shutdown Maltego and run the following command:

$ canari install-package sploitego

Contact Info

Right now we only have one contributor:

  • Nadeem Douba: @ndouba on Twitter

Contact us any time! Sploitego is currently looking for help in various areas of the project.


Maltego Penetration Testing Transforms



No releases published


You can’t perform that action at this time.